Stop being watched - lessons in internet privacy

A video course on protecting your internet privacy and online security. Be anonymous online.
6 reviews
TAUGHT BY
  • Andrew Bassett Veteran Hacker, Entrepreneur, Goofball

    Andrew is the network operations manager for an all fiber-optic ISP in Oregon, having worked his way up from being the only other technician there over mumble mumble years ago. He keeps his staff simultaneously entertained and fearing for their safety.

    He has spent twenty five years in various technology fields - including assembly language and driver development, writing web services in Python, network troubleshooting and penetration testing, deployment of VoIP services, and domain-specific language design. Returning from nearly every vacation he's ever taken, the office has been described as "eerily quiet" while he was away.

    Andrew is a lifelong polymath, and strives to bring students a nonlinear teaching style full of interesting side notes, etymology, pertinent historical perspective, and the je ne sais quoi of his own bombastic personal narrative.

    He demonstrates code related to udemy at this site.

WHAT'S INSIDE
  • Lifetime access to 13 lectures
  • A community of 200+ students learning together!
SHARE

Stop being watched - lessons in internet privacy

A video course on protecting your internet privacy and online security. Be anonymous online.
6 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

The long war with Eurasia drags on, and your dangerous doublethink is starting to pique the interest of those of us that know best for you.

Of course, you have nothing to hide.

Have you.


The watchers are watching - and they're getting better at it.  You need tools.   Let's go over them, as well as the current best practices to use them effectively.

Let's also have a bit of snarky fun.






WARNING:

  Course may include Adult Situations and Language, Mild Violence, Nudity, Firearms, Burning buildings, and Colonel Sanders.  Viewer discretion is advised.






    • DVD Reader/Writer
    • USB flash drive
    • Over 13 lectures and 53 mins of content!
    • Lower your profile online
    • Limit the amount of data leaks in your communications
    • Make Bruce Schneier proud.
    • Introverts
    • Everyone NOT employed by the NSA
    • Anyone that knows what "COMSEC" stands for

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • 1
    Introduction & Risk assessment
    11:14
    Welcome to stop being watched.

    Here's my "mashup" introduction.

    My use of rage faces is, of course, ironic - because I am a cypherpunk hipster.

    AND FOR THOSE OF YOU THAT LOVE LINKS: Tor, tor tor tor tortortorotortorrtorotrotorto On blockchains
  • SECTION 1:
    Browsing
  • 2
    A brief introduction to Tor
    08:39

    An introduction to Tor, via the TBB


    Adjust the rearview, empty the ashtray, pop the clutch, loosen your scarf.

    Here are some you might find interesting:
  • 3
    A safer alternative to the browser bundle
    05:59
  • SECTION 2:
    Email
  • 4
    Generating a key
    02:08

    Side note: I really really promise to get a better audio rig once I've shoveled my way out from under your veritable snowdrifts of money.

    This section is about using TAILS to set up an email account with tormail.


    Here's the command to generate a key:

    gpg --gen-key
    Here's how to export yours so others can use it:
    gpg --armor --export
  • 5
    Importing a key
    01:43

    Here is how to import a key (use CTRL-D when you're done):

    gpg --import

    Some gentlemen bandits signing each other's keys - and how to be like them.

  • 6
    Creating an account
    01:12
    Tormail - a free email service that bridges .onion sites and the "real" internet - to sign up you'll need to visit their .onion
  • 7
    Configuring Claws
    01:33
    Configuring claws with pincers:

    Setting up Claws - IMAP:

    1. Your Name: PROBABLY NOT YOUR REAL NAME
    2. Your email address: Your chosen address @tormail.org
    3. Server type: IMAP
    4. Server address: jhiwjjlqpyawmpjx.onion
    5. Username: EMAIL ADDRESS without '@tormail.org'
    6. Password: 1234 (your password)
    7. Uncheck "Use SSL to connect..."

    Setting up Claws - SMTP:

    1. SMTP server address: jhiwjjlqpyawmpjx.onion
    2. SMTP username: EMAIL ADDRESS without '@tormail.org'
    3. SMTP password: 1234 (your password)
    4. Uncheck "Use SSL to connect..."

  • 8
    Sending & Receiving
    03:45
    1234

    Choosing a passphrase can be daunting, but here are some protips.

    Web of trust

    I keep avoiding it, because in my experience for webs of radius greater than about two, the SNR gets to be so high that you may as well not be using it. Either people make mistakes and sign keys they didn't mean to, or you're conversing with someone you'll never meet in person anyway. SSL certificates suffer from the same sorts of problems. See also.

  • 9
    Coda
    01:01

    WE MADE IT.

    I will now return to a more irreverent form of instruction, as I was about ready to launch my monitor through the window after recording this.
  • SECTION 3:
    Chat
  • 10
    Getting synchronous with your bad self
    05:55
  • SECTION 4:
    Gotchas and No-Nos
  • 11
    All the things you want to do, but shouldn't
    07:30

    Postscript (a language used by .pdfs) is Turing complete.

    How a clipboard slip can ruin your whole day.

    Ken Thompson (who, along with Dennis Richie invented Unix) said it very well in 1984: quis custodiet ipsos custodes?

    Thinking like a security pro is easy for Bruce Schneier - and he has some awesome commentary in this old but not outdated essay.

  • SECTION 5:
    Denouement
  • 12
    Fare thee well
    02:08
    The end


    Those of you that have a firm grasp on visages of random historical figures should be in for a treat! Hoo hoo! Try to keep your vicious knee-slapping to a minimum so that you do not disrupt the rest of the class.

  • 13
    Double Plus Conclusion
    1 page

    Sorry the links don't come through the in-browser .pdf viewer...  Thanks, guys.

    If you download it, you can click through to all sorts of exciting, freemium content!

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,800,000
Students

RATING

  • 3
  • 2
  • 1
  • 0
  • 0
AVERAGE RATING
NUMBER OF RATINGS
6

REVIEWS

  • Ron
    I learned somthing

    Lessons presented with a free style voice and very creatif slides. I learned a few new things thx.

  • Betty Bassett
    Excellent Course! Engaging style!

    Mr. Bassett made it clear in his course why it wasn't a good idea to have posted that picture of my credit card labeled with my Social Security number on Facebook. How refreshing to hear a course with an animated and informed speaker! Great job!

  • 30 day money back guarantee!
  • Lifetime Access. No Limits!
  • Mobile Accessibility
  • Certificate of Completion
STUDENTS WHO VIEWED THIS COURSE ALSO VIEWED: