Stop being watched - Online Privacy Bootcamp

Initialize your OPSEC and PERSEC online.
4.4 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
324 students enrolled
25% off
Take This Course
  • Lectures 13
  • Length 1 hour
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2013 English

Course Description

The long war with Eurasia drags on, and your dangerous doublethink is starting to pique the interest of those of us that know best for you.

Of course, you have nothing to hide.

Have you.

The watchers are watching - and they're getting better at it.  You need tools.   Let's go over them, as well as the current best practices to use them effectively.

Let's also have a bit of snarky fun.


  Course may include Adult Situations and Language, Mild Violence, Nudity, Firearms, Burning buildings, and Colonel Sanders.  Viewer discretion is advised.

What are the requirements?

  • DVD Reader/Writer
  • USB flash drive

What am I going to get from this course?

  • Lower your profile online
  • Limit the amount of data leaks in your communications
  • Make Bruce Schneier proud.

Who is the target audience?

  • Introverts
  • Everyone NOT employed by the NSA
  • Anyone that knows what "COMSEC" stands for

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Welcome to stop being watched.

Here's my "mashup" introduction.

My use of rage faces is, of course, ironic - because I am a cypherpunk hipster.

AND FOR THOSE OF YOU THAT LOVE LINKS: Tor, tor tor tor tortortorotortorrtorotrotorto On blockchains
Section 1: Browsing

An introduction to Tor, via the TBB

Adjust the rearview, empty the ashtray, pop the clutch, loosen your scarf.

Here are some you might find interesting:
Section 2: Email

Side note: I really really promise to get a better audio rig once I've shoveled my way out from under your veritable snowdrifts of money.

This section is about using TAILS to set up an email account with tormail.

Here's the command to generate a key:

gpg --gen-key
Here's how to export yours so others can use it:
gpg --armor --export

Here is how to import a key (use CTRL-D when you're done):

gpg --import

Some gentlemen bandits signing each other's keys - and how to be like them.

Tormail - a free email service that bridges .onion sites and the "real" internet - to sign up you'll need to visit their .onion
Configuring claws with pincers:

Setting up Claws - IMAP:

  2. Your email address: Your chosen address
  3. Server type: IMAP
  4. Server address: jhiwjjlqpyawmpjx.onion
  5. Username: EMAIL ADDRESS without ''
  6. Password: 1234 (your password)
  7. Uncheck "Use SSL to connect..."

Setting up Claws - SMTP:

  1. SMTP server address: jhiwjjlqpyawmpjx.onion
  2. SMTP username: EMAIL ADDRESS without ''
  3. SMTP password: 1234 (your password)
  4. Uncheck "Use SSL to connect..."


Choosing a passphrase can be daunting, but here are some protips.

Web of trust

I keep avoiding it, because in my experience for webs of radius greater than about two, the SNR gets to be so high that you may as well not be using it. Either people make mistakes and sign keys they didn't mean to, or you're conversing with someone you'll never meet in person anyway. SSL certificates suffer from the same sorts of problems. See also.



I will now return to a more irreverent form of instruction, as I was about ready to launch my monitor through the window after recording this.
Section 3: Chat
Section 4: Gotchas and No-Nos

Postscript (a language used by .pdfs) is Turing complete.

How a clipboard slip can ruin your whole day.

Ken Thompson (who, along with Dennis Richie invented Unix) said it very well in 1984: quis custodiet ipsos custodes?

Thinking like a security pro is easy for Bruce Schneier - and he has some awesome commentary in this old but not outdated essay.

Section 5: Denouement
The end

Those of you that have a firm grasp on visages of random historical figures should be in for a treat! Hoo hoo! Try to keep your vicious knee-slapping to a minimum so that you do not disrupt the rest of the class.

1 page

Sorry the links don't come through the in-browser .pdf viewer...  Thanks, guys.

If you download it, you can click through to all sorts of exciting, freemium content!

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Andrew Bassett, Veteran Hacker, Entrepreneur, Goofball

Andrew is the network operations manager for an all fiber-optic ISP in Oregon, having worked his way up from being the only other technician there over mumble mumble years ago. He keeps his staff simultaneously entertained and fearing for their safety.

He has spent twenty five years in various technology fields - including assembly language and driver development, writing web services in Python, network troubleshooting and penetration testing, deployment of VoIP services, and domain-specific language design. Returning from nearly every vacation he's ever taken, the office has been described as "eerily quiet" while he was away.

Andrew is a lifelong polymath, and strives to bring students a nonlinear teaching style full of interesting side notes, etymology, pertinent historical perspective, and the je ne sais quoi of his own bombastic personal narrative.

He demonstrates code related to udemy at this site.

Ready to start learning?
Take This Course