Skip to content

Privacy Pyramid The 4 Levels Of Digital Surveillance

Privacy Pyramid The 4 Levels Of Digital Surveillance

The Privacy Pyramid – 4 Levels of Digital Surveillance (Explained)

Whiteboard Crypto

885K subscribers

14,783 views Nov 13, 2023

Get first access to our privacy project, including the digital hygiene checklist, self background check, and invisible wallet for free: https://whiteboardcrypto.com/

ChaptersView all

Intro

0:00

Level 1 Basic Online anonymity

2:32

Level 2 Personal contacts

4:05

Level 3 Organizations

6:00

Level 4 Government Agencies

8:28Transcript

Follow along using the transcript.

Show transcript

Privacy Pyramid The 4 Levels Of Digital Surveillance

BROUGHT TO YOU BY:

CryptoGrizz.com

Privacy Coins

VISIT OUR OTHER SITES:

Check Out Our Crypto Privacy Site: CryptoGrizz.com

Check Out Our Global Crypto Privacy Site: GlobalCryptoPrivacy.com

Check Out Our Global Crypto Freedom Site:GlobalCryptoFreedom.org

Check Out Our Crypto Trading Site: CryptoGrizzTrader.com

Check Out Our Low Cap Altcoin Site: CryptoGrizzAltcoins.com

Check Out Our Prepper Site: PrepperGrizz.com

Check Out Our Prepper Survival Site: PrepperSurvival.org

Check Out Our Survival Gear Store Site: SurvivalGearStore.net

Check Out Our Global Crypto Survival Site: GlobalCryptoSurvival.com

Check Out Our Precious Metals Investment Guide: PreciousMetalsInvestmentGuide.org

FULL VIDEO TRANSCRIPT

Intro0:00

when people think about online privacy

0:01

most of the time they’re just thinking

0:03

about hiding their activities from the

0:04

seemingly endless trackers on the

0:06

internet all those cookies and targeted

0:08

ads and people selling your data to

0:10

Brokers it’s kind of invasive and

0:12

unsettling and most people want a way

0:14

out of that but some people have more

0:16

personal reasons for wanting to

0:17

disappear online maybe there’s a crazy

0:19

ex that they’re looking to hide from or

0:21

maybe they need to hide from private

0:22

investigators and maybe it’s so serious

0:25

they need to hide from governments or

0:27

specialized agencies like the National

0:29

Security Agency better known as the NSA

0:31

welcome to whiteboard crypto the number

0:33

one YouTube channel for crypto education

0:35

and here we explain topics of the

0:36

cryptocurrency world using analogies

0:39

stories and examples so that you can

0:41

easily understand them in this video

0:42

we’re going to be talking about the

0:44

attacker pyramid and how there are a

0:46

variety of reasons that some people

0:47

might want to completely disappear we’ll

0:49

be discussing the steps that are

0:50

important to take for each level and

0:52

give some examples to compare them the

0:54

next video in this series goes into

0:56

specifics about how to disappear online

0:58

and the video after that your specifics

1:00

about disappearing alog together but

1:02

before deciding if you want to disappear

1:04

at all it’s important to know why you

1:06

feel the need you want to do this and

1:07

what it might look like disappearing is

1:09

not easy you’re always going to be

1:11

trading convenience for privacy but

1:13

there’s varying degrees of anonymity or

1:16

being anonymous and so you can have more

1:18

or less inconvenience depending on your

1:20

privacy needs so let’s get into this

1:22

attacker pyramid if you’re a hacker or

1:24

you’re interested in cyber security

1:26

you’re probably pretty familiar with a

1:28

different attacker pyramid something

1:29

known as the Pyramid of pain which

1:32

explains the different kinds of hackers

1:34

that can be threats we’re developing our

1:35

own attacker pyramid although we didn’t

1:37

come up with a great name for it you

1:39

will find it useful if you’re working on

1:40

increasing your privacy instead of

1:42

looking at threats as only being hackers

1:44

out there trying to get you we’re

1:46

looking from a larger angle of not just

1:48

online but offline threats and the

1:50

different steps you need to take

1:51

depending on where you fall in the

1:53

pyramid so basically depending on who

1:55

you want to hide from your plans and

1:57

your strategy are going to be changing a

1:59

VPN will hide hide you from Facebook but

2:01

it may not hide you from the NSA a new

2:03

name May hide you from a crazy X but

2:06

it’s not going to hide you from a

2:07

government who you’re trying to hide

2:09

from will change your plan so our

2:10

Pyramid has four different levels of

2:12

reasons of why you might want to become

2:14

Anonymous first being less tracked by

2:17

big Tech or other online actors second

2:19

hiding from personal contacts or

2:21

specific individuals third hiding from

2:24

organizations or groups of people who

2:26

have skills and tools like private

2:27

investigators and fourth is hiding from

2:30

governments or other official agencies

Level 1 Basic Online anonymity2:32

level one basic online anonymity the

2:35

first thing we want to think about with

2:37

the levels of this pyramid is what the

2:38

tradeoff between privacy and convenience

2:41

is layer one has a very minimal

2:43

trade-off it’s not too inconvenient to

2:45

stay private online it might be a little

2:47

Annoying to set up at first but once

2:49

it’s set up and you understand how to do

2:51

it you don’t really have to think about

2:52

it again think about the last time that

2:54

you browsed online you might not have

2:56

been as alone as you thought or Journey

2:57

up the attacker pyramid begins with the

2:59

the base level basic online anonymity

3:02

this is about dodging the prying eyes of

3:05

big Tech and other digital trackers the

3:07

keyword we’re thinking about for this

3:08

level is becoming hard to track now most

3:11

of us are aware that when you hop online

3:12

to check your email you watch some

3:14

YouTube video maybe like this one or

3:15

scroll through social media companies

3:17

are often tracking what you’re doing

3:19

they want to know what you like what you

3:21

buy where you go because then they can

3:23

feed you more personalized ads that

3:25

you’re more likely to click on and so

3:27

they will make more money but why should

3:29

you care about that well it’s more than

3:31

just the ads it’s about your digital

3:33

footprint the trail that you leave

3:35

behind our online lives are the first

3:37

place people in the rest of the attacker

3:39

pyramid will look when they try to find

3:41

us so no matter where you land in this

3:43

pyramid you’ll want to start here this

3:45

level will require things like changing

3:46

your privacy settings using a browser

3:48

that blocks tracking cookies using a

3:50

virtual private Network or VPN and using

3:53

intend encrypted messaging apps and

3:55

emails Honestly though these are really

3:57

basic things that everyone should be

3:58

doing anyways you can watch the the next

3:59

video in the series how to disappear

4:01

online to learn specifically what to do

4:03

and how to do it moving on though let’s

Level 2 Personal contacts4:05

get to level two level two is personal

4:07

contacts okay so the next step up our

4:10

pyramid is for people who are trying to

4:11

hide from a crazy ex or a demanding

4:13

parent or even a creepy coworker while

4:16

big Tech is interested in everybody it’s

4:18

in the second level that things start to

4:19

become personal basically this level is

4:22

for people who don’t understand

4:23

boundaries but don’t have the resources

4:25

to hire someone with more skill to track

4:27

you down you have the power to build

4:29

your own digital Fortress by limiting

4:31

who has access to your personal info

4:33

you’re taking that control back in this

4:35

level the focus is on limiting your

4:37

entire online life you want to become

4:39

hard to hack and hard to track your

4:41

crazy X might actually be able to guess

4:43

your passwords so you need to make sure

4:44

that they’re secure and not the same on

4:46

the other hand a government such as one

4:49

that’s at the top of the pyramid they

4:50

will have people who will know how to

4:52

hack even secure passwords or honestly

4:54

they could use a warrant to skip that

4:56

part but your creepy cooworker probably

4:58

won’t know how to do that so after a few

4:59

attempts they’ll probably give up on

5:00

cracking your account unfortunately

5:02

though this level has a larger

5:04

convenience versus privacy tradeoff it’s

5:06

going to be a lot more inconvenient for

5:08

you because you’ll have to keep changing

5:10

things like your password and you might

5:11

need to even change your name where you

5:13

live or what job you have that way a

5:15

crazy X can’t track you down these

5:17

things will cost time and money and you

5:19

need to be very careful about what

5:21

information you give out and to whom

5:22

you’re giving it to for example let’s

5:24

say that you change your name you move

5:26

to a new neighborhood or a new city and

5:28

you make sure that you use new new

5:29

social media accounts that your ex

5:31

doesn’t have access to these things

5:33

might work for an individual in your

5:34

life if you’re trying to avoid but the

5:36

government or an agency will have all

5:39

the paperwork for your move and your

5:40

name change so if you’re trying to hide

5:42

from a private investigator or a

5:43

government agency as we move up the

5:45

pyramid these things won’t be enough

5:47

you’ll have to start disappearing alt

5:49

together for the rest of these levels

5:50

you’ll start to get more techsavvy the

5:52

first level is about being difficult to

5:54

track and the second level is about

5:56

being difficult to track and difficult

5:58

to hack both on online and offline next

Level 3 Organizations6:01

up let’s go into level three

6:03

organizations the stakes are starting to

6:05

get higher now we’re dodging

6:07

organizations with resources like

6:09

private investigators hired to dig into

6:11

your life they’ve got the tools and

6:13

resources and the time to take a closer

6:15

look than most would maybe your crazy X

6:17

realized that they didn’t have the

6:19

skills to track you down but they’re so

6:20

desperate that they hired a private

6:22

investigator this level in the pyramid

6:24

is when you need to start looking for

6:25

privacy offline too at this level you’ll

6:28

probably want to take a look at the

6:29

video in this series titled How to

6:31

Disappear Completely it’s going to be

6:32

coming out soon so if you haven’t

6:34

already hit the Subscribe button because

6:35

we’re actually getting really close to a

6:36

million subscribers and you could be a

6:38

part of that plus you’re already here so

6:40

it’s really convenient to click the

6:41

Subscribe button on the other hand level

6:43

three is inconvenient but you get more

6:46

privacy too so far in the pyramid we’ve

6:48

made you difficult to track and

6:49

difficult to hack online and offline in

6:52

this level you really need to tighten up

6:53

your data trail this means checking even

6:56

your public records like your voter or

6:58

property registrations if you’re a

6:59

business owner most of your information

7:01

is going to be public too all this

7:03

public information and these documents

7:04

are a gold mine for snoopers consider

7:07

using a PO Box instead of your home

7:08

address whenever possible maybe even

7:10

create a private company so that you can

7:12

use it on public documents instead of

7:14

your own name at this level you’ll want

7:15

to think about the places where your

7:17

information could be old job

7:18

applications signup sheets even loyalty

7:21

programs at stores limit what you share

7:23

and ask who else could see this whenever

7:25

you share personal data if you’re in

7:27

level one or two of this pyramid you

7:29

probably don’t have to change too much

7:30

about your day-to-day life and level two

7:32

you may have to change which yoga studio

7:34

you frequent which grocery store you use

7:37

or which bank you go to but you can

7:39

pretty much stick with these new places

7:40

without much trouble but for level three

7:42

you will start to have to change your

7:44

habits alt together if you used to do

7:46

yoga you don’t anymore if you used to

7:47

use a particular Bank you don’t use that

7:49

one anymore if you walk your dog you’re

7:51

going to have to use new trails

7:52

regularly basically not only will you

7:54

need to change your online life you’re

7:56

also changing your offline life you may

7:58

even have to start to cut out people

7:59

that you know from your life stop seeing

8:01

certain friends or families or even

8:03

neighbors so now it’s clear the further

8:05

up this pyramid you go the more

8:06

inconvenient it is to maintain the same

8:09

level of privacy and it’s not just

8:11

inconvenient either it’s also

8:12

emotionally draining and stressful at

8:14

this level you’re probably worried about

8:16

who you can trust and every new person

8:17

you meet is a possible threat some

8:19

people might even call you paranoid you

8:21

definitely weren’t worried about that in

8:22

the first level and only mildly worried

8:25

about it in the second level but now

8:26

it’s a major Focus moving on we have

Level 4 Government Agencies8:29

level four governments and agencies if

8:32

the inconvenience and stress of level

8:34

three wasn’t enough we’re now at the top

8:36

of the attacker pyramid where we find

8:37

the most skilled attackers governments

8:40

agencies and massive International

8:42

organizations if you’ve got the

8:43

attention of these folks you’re in a lot

8:45

more trouble than we can help in a short

8:47

YouTube video These entities have vast

8:49

tools at their disposal probably ones we

8:51

don’t even know about to monitor

8:52

individuals that they’re interested in

8:54

escaping their radar requires diligence

8:56

and often a deeper understanding of

8:58

digital and off offline privacy for this

9:00

level of attacker you’ll definitely want

9:02

to watch both of our other videos in

9:03

this series you’ll need to disappear

9:05

online because as we said earlier that’s

9:07

the first place everyone’s going to look

9:08

you’ll also need to disappear offline

9:11

because these agencies are super skilled

9:12

at tracking people down even if they

9:14

have a completely anonymous online

9:16

presence one wrong move and you’ll be

9:18

caught as an example while a private

9:20

investigator from level three might be

9:21

pretty skilled at tracking you down they

9:23

just simply won’t have the resources or

9:25

time that these people from level four

9:27

have a VPN alone is not going to help

9:29

you hide from the CIA in fact it might

9:31

actually make it easier for them to find

9:32

you this level is extremely inconvenient

9:35

maintaining your privacy will be a

9:37

constant all day every day for the rest

9:39

of your life inconvenience you’ll need

9:41

to take on a whole new identity cut out

9:43

the people in places you’ve ever known

9:45

and make sure you leave no Trail you’ll

9:47

probably have to transition strictly to

9:48

cash and have zero electronic devices a

9:51

note about this though this level gets

9:52

us to a gray hat area of morality you’re

9:55

either working at the edges of the law

9:57

or past it and it’s no joke the stress

9:59

will be intense but if you’re doing the

10:01

right stuff you’re here probably because

10:02

your life is at stake thankfully most

10:05

people will never have a need to know

10:06

about this let alone act within it while

10:08

there is some inconvenience in changing

10:09

your online passwords regularly it’s no

10:12

inconvenience at all compared to the

10:13

extremes you have to go through in level

10:15

four as we’ve climbed the attacker

10:17

pyramid from Big Tech trackers to

10:18

government agencies it’s clear that

10:20

privacy isn’t a one-size fits-all

10:22

solution each layer presents its own

10:24

challenges and requires specific

10:25

strategies to navigate successfully that

10:27

was a lot of jargon but I’m working on

10:29

my conclusions wherever you stand on the

10:31

attacker pyramid take a moment to

10:33

reflect on your privacy practices small

10:35

changes can lead to Big improvements and

10:37

how secure you feel both online and off

10:39

so ask yourself how Anonymous do I want

10:42

to be your privacy matters no matter who

10:44

might be interested in that data what

10:46

steps are you going to take today to

10:47

ensure that your privacy remains intact

10:49

if you want a digital hygiene checklist

10:51

an in-depth guide on how to perform your

10:53

own background check and my own personal

10:55

recommendations for hard wallets you can

10:57

go to the whiteb crypto.com homepage

10:59

page and enter your email by the way you

11:01

can use a privacy focused email and you

11:02

can join our mailing list I’ve actually

11:04

been sharing a ton of personal stuff

11:05

lately and apparently everyone’s been

11:07

loving it so you probably will too plus

11:09

I’m going to be giving those freebies

11:11

that I just mentioned to you anyways

11:12

thank you so much for watching I hope

11:14

you enjoy this video I really hope that

11:16

you’ve learned something maybe something

11:17

useful and most of all I hope to see you

11:19

in our next

11:27

video

English (auto-generated)

Leave a Reply

Your email address will not be published. Required fields are marked *