Stop being watched - Online Privacy Bootcamp
4.3 (11 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
334 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Stop being watched - Online Privacy Bootcamp to your Wishlist.

Add to Wishlist

Stop being watched - Online Privacy Bootcamp

Initialize your OPSEC and PERSEC online.
4.3 (11 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
334 students enrolled
Created by Andrew Bassett
Last updated 8/2013
Price: $20
30-Day Money-Back Guarantee
  • 1 hour on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Lower your profile online
  • Limit the amount of data leaks in your communications
  • Make Bruce Schneier proud.
View Curriculum
  • DVD Reader/Writer
  • USB flash drive

The long war with Eurasia drags on, and your dangerous doublethink is starting to pique the interest of those of us that know best for you.

Of course, you have nothing to hide.

Have you.

The watchers are watching - and they're getting better at it.  You need tools.   Let's go over them, as well as the current best practices to use them effectively.

Let's also have a bit of snarky fun.


  Course may include Adult Situations and Language, Mild Violence, Nudity, Firearms, Burning buildings, and Colonel Sanders.  Viewer discretion is advised.

Who is the target audience?
  • Introverts
  • Everyone NOT employed by the NSA
  • Anyone that knows what "COMSEC" stands for
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Introduction & Risk assessment
1 Lecture 11:14
Welcome to stop being watched.

Here's my "mashup" introduction.

My use of rage faces is, of course, ironic - because I am a cypherpunk hipster.

AND FOR THOSE OF YOU THAT LOVE LINKS: Tor, tor tor tor tortortorotortorrtorotrotorto On blockchains
Preview 11:14
2 Lectures 14:38

An introduction to Tor, via the TBB

Adjust the rearview, empty the ashtray, pop the clutch, loosen your scarf.

Here are some you might find interesting:
A brief introduction to Tor

A safer alternative to the browser bundle
6 Lectures 11:22

Side note: I really really promise to get a better audio rig once I've shoveled my way out from under your veritable snowdrifts of money.

This section is about using TAILS to set up an email account with tormail.

Here's the command to generate a key:

gpg --gen-key
Here's how to export yours so others can use it:
gpg --armor --export
Generating a key

Here is how to import a key (use CTRL-D when you're done):

gpg --import

Some gentlemen bandits signing each other's keys - and how to be like them.

Importing a key

Tormail - a free email service that bridges .onion sites and the "real" internet - to sign up you'll need to visit their .onion
Creating an account

Configuring claws with pincers:

Setting up Claws - IMAP:

  2. Your email address: Your chosen address
  3. Server type: IMAP
  4. Server address: jhiwjjlqpyawmpjx.onion
  5. Username: EMAIL ADDRESS without ''
  6. Password: 1234 (your password)
  7. Uncheck "Use SSL to connect..."

Setting up Claws - SMTP:

  1. SMTP server address: jhiwjjlqpyawmpjx.onion
  2. SMTP username: EMAIL ADDRESS without ''
  3. SMTP password: 1234 (your password)
  4. Uncheck "Use SSL to connect..."

Configuring Claws


Choosing a passphrase can be daunting, but here are some protips.

Web of trust

I keep avoiding it, because in my experience for webs of radius greater than about two, the SNR gets to be so high that you may as well not be using it. Either people make mistakes and sign keys they didn't mean to, or you're conversing with someone you'll never meet in person anyway. SSL certificates suffer from the same sorts of problems. See also.

Sending & Receiving


I will now return to a more irreverent form of instruction, as I was about ready to launch my monitor through the window after recording this.
1 Lecture 05:55
Getting synchronous with your bad self
Gotchas and No-Nos
1 Lecture 07:30

Postscript (a language used by .pdfs) is Turing complete.

How a clipboard slip can ruin your whole day.

Ken Thompson (who, along with Dennis Richie invented Unix) said it very well in 1984: quis custodiet ipsos custodes?

Thinking like a security pro is easy for Bruce Schneier - and he has some awesome commentary in this old but not outdated essay.

All the things you want to do, but shouldn't
2 Lectures 02:08
The end

Those of you that have a firm grasp on visages of random historical figures should be in for a treat! Hoo hoo! Try to keep your vicious knee-slapping to a minimum so that you do not disrupt the rest of the class.

Fare thee well

Sorry the links don't come through the in-browser .pdf viewer...  Thanks, guys.

If you download it, you can click through to all sorts of exciting, freemium content!

Double Plus Conclusion
1 page
About the Instructor
Andrew Bassett
4.3 Average rating
11 Reviews
334 Students
1 Course
Veteran Hacker, Entrepreneur, Goofball

Andrew is the network operations manager for an all fiber-optic ISP in Oregon, having worked his way up from being the only other technician there over mumble mumble years ago. He keeps his staff simultaneously entertained and fearing for their safety.

He has spent twenty five years in various technology fields - including assembly language and driver development, writing web services in Python, network troubleshooting and penetration testing, deployment of VoIP services, and domain-specific language design. Returning from nearly every vacation he's ever taken, the office has been described as "eerily quiet" while he was away.

Andrew is a lifelong polymath, and strives to bring students a nonlinear teaching style full of interesting side notes, etymology, pertinent historical perspective, and the je ne sais quoi of his own bombastic personal narrative.

He demonstrates code related to udemy at this site.