Privacy Pyramid The 4 Levels Of Digital Surveillance
The Privacy Pyramid – 4 Levels of Digital Surveillance (Explained)
885K subscribers
14,783 views Nov 13, 2023
Get first access to our privacy project, including the digital hygiene checklist, self background check, and invisible wallet for free: https://whiteboardcrypto.com/
ChaptersView all
Intro
0:00
Level 1 Basic Online anonymity
2:32
Level 2 Personal contacts
4:05
Level 3 Organizations
6:00
Level 4 Government Agencies
8:28Transcript
Follow along using the transcript.
Show transcript
Privacy Pyramid The 4 Levels Of Digital Surveillance
BROUGHT TO YOU BY:
VISIT OUR OTHER SITES:
Check Out Our Crypto Privacy Site: CryptoGrizz.com
Check Out Our Global Crypto Privacy Site: GlobalCryptoPrivacy.com
Check Out Our Global Crypto Freedom Site:GlobalCryptoFreedom.org
Check Out Our Crypto Trading Site: CryptoGrizzTrader.com
Check Out Our Low Cap Altcoin Site: CryptoGrizzAltcoins.com
Check Out Our Prepper Site: PrepperGrizz.com
Check Out Our Prepper Survival Site: PrepperSurvival.org
Check Out Our Survival Gear Store Site: SurvivalGearStore.net
Check Out Our Global Crypto Survival Site: GlobalCryptoSurvival.com
Check Out Our Precious Metals Investment Guide: PreciousMetalsInvestmentGuide.org
FULL VIDEO TRANSCRIPT
Intro0:00
when people think about online privacy
0:01
most of the time they’re just thinking
0:03
about hiding their activities from the
0:04
seemingly endless trackers on the
0:06
internet all those cookies and targeted
0:08
ads and people selling your data to
0:10
Brokers it’s kind of invasive and
0:12
unsettling and most people want a way
0:14
out of that but some people have more
0:16
personal reasons for wanting to
0:17
disappear online maybe there’s a crazy
0:19
ex that they’re looking to hide from or
0:21
maybe they need to hide from private
0:22
investigators and maybe it’s so serious
0:25
they need to hide from governments or
0:27
specialized agencies like the National
0:29
Security Agency better known as the NSA
0:31
welcome to whiteboard crypto the number
0:33
one YouTube channel for crypto education
0:35
and here we explain topics of the
0:36
cryptocurrency world using analogies
0:39
stories and examples so that you can
0:41
easily understand them in this video
0:42
we’re going to be talking about the
0:44
attacker pyramid and how there are a
0:46
variety of reasons that some people
0:47
might want to completely disappear we’ll
0:49
be discussing the steps that are
0:50
important to take for each level and
0:52
give some examples to compare them the
0:54
next video in this series goes into
0:56
specifics about how to disappear online
0:58
and the video after that your specifics
1:00
about disappearing alog together but
1:02
before deciding if you want to disappear
1:04
at all it’s important to know why you
1:06
feel the need you want to do this and
1:07
what it might look like disappearing is
1:09
not easy you’re always going to be
1:11
trading convenience for privacy but
1:13
there’s varying degrees of anonymity or
1:16
being anonymous and so you can have more
1:18
or less inconvenience depending on your
1:20
privacy needs so let’s get into this
1:22
attacker pyramid if you’re a hacker or
1:24
you’re interested in cyber security
1:26
you’re probably pretty familiar with a
1:28
different attacker pyramid something
1:29
known as the Pyramid of pain which
1:32
explains the different kinds of hackers
1:34
that can be threats we’re developing our
1:35
own attacker pyramid although we didn’t
1:37
come up with a great name for it you
1:39
will find it useful if you’re working on
1:40
increasing your privacy instead of
1:42
looking at threats as only being hackers
1:44
out there trying to get you we’re
1:46
looking from a larger angle of not just
1:48
online but offline threats and the
1:50
different steps you need to take
1:51
depending on where you fall in the
1:53
pyramid so basically depending on who
1:55
you want to hide from your plans and
1:57
your strategy are going to be changing a
1:59
VPN will hide hide you from Facebook but
2:01
it may not hide you from the NSA a new
2:03
name May hide you from a crazy X but
2:06
it’s not going to hide you from a
2:07
government who you’re trying to hide
2:09
from will change your plan so our
2:10
Pyramid has four different levels of
2:12
reasons of why you might want to become
2:14
Anonymous first being less tracked by
2:17
big Tech or other online actors second
2:19
hiding from personal contacts or
2:21
specific individuals third hiding from
2:24
organizations or groups of people who
2:26
have skills and tools like private
2:27
investigators and fourth is hiding from
2:30
governments or other official agencies
Level 1 Basic Online anonymity2:32
level one basic online anonymity the
2:35
first thing we want to think about with
2:37
the levels of this pyramid is what the
2:38
tradeoff between privacy and convenience
2:41
is layer one has a very minimal
2:43
trade-off it’s not too inconvenient to
2:45
stay private online it might be a little
2:47
Annoying to set up at first but once
2:49
it’s set up and you understand how to do
2:51
it you don’t really have to think about
2:52
it again think about the last time that
2:54
you browsed online you might not have
2:56
been as alone as you thought or Journey
2:57
up the attacker pyramid begins with the
2:59
the base level basic online anonymity
3:02
this is about dodging the prying eyes of
3:05
big Tech and other digital trackers the
3:07
keyword we’re thinking about for this
3:08
level is becoming hard to track now most
3:11
of us are aware that when you hop online
3:12
to check your email you watch some
3:14
YouTube video maybe like this one or
3:15
scroll through social media companies
3:17
are often tracking what you’re doing
3:19
they want to know what you like what you
3:21
buy where you go because then they can
3:23
feed you more personalized ads that
3:25
you’re more likely to click on and so
3:27
they will make more money but why should
3:29
you care about that well it’s more than
3:31
just the ads it’s about your digital
3:33
footprint the trail that you leave
3:35
behind our online lives are the first
3:37
place people in the rest of the attacker
3:39
pyramid will look when they try to find
3:41
us so no matter where you land in this
3:43
pyramid you’ll want to start here this
3:45
level will require things like changing
3:46
your privacy settings using a browser
3:48
that blocks tracking cookies using a
3:50
virtual private Network or VPN and using
3:53
intend encrypted messaging apps and
3:55
emails Honestly though these are really
3:57
basic things that everyone should be
3:58
doing anyways you can watch the the next
3:59
video in the series how to disappear
4:01
online to learn specifically what to do
4:03
and how to do it moving on though let’s
Level 2 Personal contacts4:05
get to level two level two is personal
4:07
contacts okay so the next step up our
4:10
pyramid is for people who are trying to
4:11
hide from a crazy ex or a demanding
4:13
parent or even a creepy coworker while
4:16
big Tech is interested in everybody it’s
4:18
in the second level that things start to
4:19
become personal basically this level is
4:22
for people who don’t understand
4:23
boundaries but don’t have the resources
4:25
to hire someone with more skill to track
4:27
you down you have the power to build
4:29
your own digital Fortress by limiting
4:31
who has access to your personal info
4:33
you’re taking that control back in this
4:35
level the focus is on limiting your
4:37
entire online life you want to become
4:39
hard to hack and hard to track your
4:41
crazy X might actually be able to guess
4:43
your passwords so you need to make sure
4:44
that they’re secure and not the same on
4:46
the other hand a government such as one
4:49
that’s at the top of the pyramid they
4:50
will have people who will know how to
4:52
hack even secure passwords or honestly
4:54
they could use a warrant to skip that
4:56
part but your creepy cooworker probably
4:58
won’t know how to do that so after a few
4:59
attempts they’ll probably give up on
5:00
cracking your account unfortunately
5:02
though this level has a larger
5:04
convenience versus privacy tradeoff it’s
5:06
going to be a lot more inconvenient for
5:08
you because you’ll have to keep changing
5:10
things like your password and you might
5:11
need to even change your name where you
5:13
live or what job you have that way a
5:15
crazy X can’t track you down these
5:17
things will cost time and money and you
5:19
need to be very careful about what
5:21
information you give out and to whom
5:22
you’re giving it to for example let’s
5:24
say that you change your name you move
5:26
to a new neighborhood or a new city and
5:28
you make sure that you use new new
5:29
social media accounts that your ex
5:31
doesn’t have access to these things
5:33
might work for an individual in your
5:34
life if you’re trying to avoid but the
5:36
government or an agency will have all
5:39
the paperwork for your move and your
5:40
name change so if you’re trying to hide
5:42
from a private investigator or a
5:43
government agency as we move up the
5:45
pyramid these things won’t be enough
5:47
you’ll have to start disappearing alt
5:49
together for the rest of these levels
5:50
you’ll start to get more techsavvy the
5:52
first level is about being difficult to
5:54
track and the second level is about
5:56
being difficult to track and difficult
5:58
to hack both on online and offline next
Level 3 Organizations6:01
up let’s go into level three
6:03
organizations the stakes are starting to
6:05
get higher now we’re dodging
6:07
organizations with resources like
6:09
private investigators hired to dig into
6:11
your life they’ve got the tools and
6:13
resources and the time to take a closer
6:15
look than most would maybe your crazy X
6:17
realized that they didn’t have the
6:19
skills to track you down but they’re so
6:20
desperate that they hired a private
6:22
investigator this level in the pyramid
6:24
is when you need to start looking for
6:25
privacy offline too at this level you’ll
6:28
probably want to take a look at the
6:29
video in this series titled How to
6:31
Disappear Completely it’s going to be
6:32
coming out soon so if you haven’t
6:34
already hit the Subscribe button because
6:35
we’re actually getting really close to a
6:36
million subscribers and you could be a
6:38
part of that plus you’re already here so
6:40
it’s really convenient to click the
6:41
Subscribe button on the other hand level
6:43
three is inconvenient but you get more
6:46
privacy too so far in the pyramid we’ve
6:48
made you difficult to track and
6:49
difficult to hack online and offline in
6:52
this level you really need to tighten up
6:53
your data trail this means checking even
6:56
your public records like your voter or
6:58
property registrations if you’re a
6:59
business owner most of your information
7:01
is going to be public too all this
7:03
public information and these documents
7:04
are a gold mine for snoopers consider
7:07
using a PO Box instead of your home
7:08
address whenever possible maybe even
7:10
create a private company so that you can
7:12
use it on public documents instead of
7:14
your own name at this level you’ll want
7:15
to think about the places where your
7:17
information could be old job
7:18
applications signup sheets even loyalty
7:21
programs at stores limit what you share
7:23
and ask who else could see this whenever
7:25
you share personal data if you’re in
7:27
level one or two of this pyramid you
7:29
probably don’t have to change too much
7:30
about your day-to-day life and level two
7:32
you may have to change which yoga studio
7:34
you frequent which grocery store you use
7:37
or which bank you go to but you can
7:39
pretty much stick with these new places
7:40
without much trouble but for level three
7:42
you will start to have to change your
7:44
habits alt together if you used to do
7:46
yoga you don’t anymore if you used to
7:47
use a particular Bank you don’t use that
7:49
one anymore if you walk your dog you’re
7:51
going to have to use new trails
7:52
regularly basically not only will you
7:54
need to change your online life you’re
7:56
also changing your offline life you may
7:58
even have to start to cut out people
7:59
that you know from your life stop seeing
8:01
certain friends or families or even
8:03
neighbors so now it’s clear the further
8:05
up this pyramid you go the more
8:06
inconvenient it is to maintain the same
8:09
level of privacy and it’s not just
8:11
inconvenient either it’s also
8:12
emotionally draining and stressful at
8:14
this level you’re probably worried about
8:16
who you can trust and every new person
8:17
you meet is a possible threat some
8:19
people might even call you paranoid you
8:21
definitely weren’t worried about that in
8:22
the first level and only mildly worried
8:25
about it in the second level but now
8:26
it’s a major Focus moving on we have
Level 4 Government Agencies8:29
level four governments and agencies if
8:32
the inconvenience and stress of level
8:34
three wasn’t enough we’re now at the top
8:36
of the attacker pyramid where we find
8:37
the most skilled attackers governments
8:40
agencies and massive International
8:42
organizations if you’ve got the
8:43
attention of these folks you’re in a lot
8:45
more trouble than we can help in a short
8:47
YouTube video These entities have vast
8:49
tools at their disposal probably ones we
8:51
don’t even know about to monitor
8:52
individuals that they’re interested in
8:54
escaping their radar requires diligence
8:56
and often a deeper understanding of
8:58
digital and off offline privacy for this
9:00
level of attacker you’ll definitely want
9:02
to watch both of our other videos in
9:03
this series you’ll need to disappear
9:05
online because as we said earlier that’s
9:07
the first place everyone’s going to look
9:08
you’ll also need to disappear offline
9:11
because these agencies are super skilled
9:12
at tracking people down even if they
9:14
have a completely anonymous online
9:16
presence one wrong move and you’ll be
9:18
caught as an example while a private
9:20
investigator from level three might be
9:21
pretty skilled at tracking you down they
9:23
just simply won’t have the resources or
9:25
time that these people from level four
9:27
have a VPN alone is not going to help
9:29
you hide from the CIA in fact it might
9:31
actually make it easier for them to find
9:32
you this level is extremely inconvenient
9:35
maintaining your privacy will be a
9:37
constant all day every day for the rest
9:39
of your life inconvenience you’ll need
9:41
to take on a whole new identity cut out
9:43
the people in places you’ve ever known
9:45
and make sure you leave no Trail you’ll
9:47
probably have to transition strictly to
9:48
cash and have zero electronic devices a
9:51
note about this though this level gets
9:52
us to a gray hat area of morality you’re
9:55
either working at the edges of the law
9:57
or past it and it’s no joke the stress
9:59
will be intense but if you’re doing the
10:01
right stuff you’re here probably because
10:02
your life is at stake thankfully most
10:05
people will never have a need to know
10:06
about this let alone act within it while
10:08
there is some inconvenience in changing
10:09
your online passwords regularly it’s no
10:12
inconvenience at all compared to the
10:13
extremes you have to go through in level
10:15
four as we’ve climbed the attacker
10:17
pyramid from Big Tech trackers to
10:18
government agencies it’s clear that
10:20
privacy isn’t a one-size fits-all
10:22
solution each layer presents its own
10:24
challenges and requires specific
10:25
strategies to navigate successfully that
10:27
was a lot of jargon but I’m working on
10:29
my conclusions wherever you stand on the
10:31
attacker pyramid take a moment to
10:33
reflect on your privacy practices small
10:35
changes can lead to Big improvements and
10:37
how secure you feel both online and off
10:39
so ask yourself how Anonymous do I want
10:42
to be your privacy matters no matter who
10:44
might be interested in that data what
10:46
steps are you going to take today to
10:47
ensure that your privacy remains intact
10:49
if you want a digital hygiene checklist
10:51
an in-depth guide on how to perform your
10:53
own background check and my own personal
10:55
recommendations for hard wallets you can
10:57
go to the whiteb crypto.com homepage
10:59
page and enter your email by the way you
11:01
can use a privacy focused email and you
11:02
can join our mailing list I’ve actually
11:04
been sharing a ton of personal stuff
11:05
lately and apparently everyone’s been
11:07
loving it so you probably will too plus
11:09
I’m going to be giving those freebies
11:11
that I just mentioned to you anyways
11:12
thank you so much for watching I hope
11:14
you enjoy this video I really hope that
11:16
you’ve learned something maybe something
11:17
useful and most of all I hope to see you
11:19
in our next
11:27
video
English (auto-generated)