This course will teach you how to clean up your digital footprint and take privacy to the extreme. The instructor has spent that past five years investigating methods for disappearing from all known databases while maintaining a "normal" existence. He has also researched the best ways to protect your data, communications, and overall online presence. This presentation of successes (and failures) will help you establish your own strategy for disappearing from public view. Overall, this course will explain how to be invisible. You will make your communications private, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, and home address hidden. You will legally create and strengthen aliases that will be used more often than your true identity. You will remove all personal details from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will remove yourself from the system. When taken to the extreme, you will be impossible to compromise.
Among many other techniques, the attendees will learn how to LEGALLY:
- Apply basic security protocols to your current operating system
- Configure web browsers for optimal security
- Prepare anonymous communications for data removal techniques
- Assess your current level of exposure through public resources
- Conduct a complete self-background check to identify vulnerabilities
- Properly secure all important online accounts
- Completely remove historic social network activity
- Remove personal information from online data brokers
- Properly secure your credit, SSN, and IRS information
- Obtain credit cards in an alias name
- Obtain truly covert prepaid physical credit cards
- Obtain truly covert prepaid virtual credit cards
- Establish an alias for daily use
- Obtain acceptable identification in an alias name
- Obtain a completely anonymous cell phone and service plan
- Use encrypted VOIP connections for calls and messages
- Create a free Wi-Fi phone for alias use only
- Execute data encryption across all devices
- Properly use VPN's at all times
- Provide disinformation in order to protect true details
- Monitor for future compromises to real data
- Replace non-secure communications with secure options
- Use bootable USB 3.0 operating systems for sensitive actions
- Establish an anonymous physical address for ID and mail
- Purchase/rent a home anonymously using an alias
- Tackle data leakage before irreversible damage
- Complete every step toward complete anonymity