What’s Wrong with Signal, Whatsapp, Telegram, Protonmail, Tutanota?

Some are quick to promote apps as being safe for your use just because they are encrypted. I will talk about how many of the popular apps that are commonly thought to be safe because of encryption are actually wrought with danger because pundits who claim this knowledge haven’t really thought about the flaws of each of these apps. The main flaw is something called a relationship map. Because of the meta data surrounding the use of each of these apps, this flaw can result in complete identification of all parties involved in a conversation and their profiles. I will explain how this occurs and how understanding how this works is part of what the intelligence community calls SIGINT (Signals Intelligence). Watch and learn about this little puzzle that will challenge your brain and your thought process. If you’re interested in setting up a NextCloud server, or some other cloud Linux server look into: Linode ($100 60 day credit offer) ----------------- I’m the Internet Privacy Guy. I’m a public interest technologist. I’m here to educate. You are losing your Internet privacy and Internet security every day if you don’t fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email. I like alternative communication technology like Amateur Radio and data communications using Analog. I’m a licensed HAM operator. Support this channel on Patreon! Contact Rob on the App (@robbraxman) for encrypted conversations (open source platform) Store for BytzVPN, BraxWifi Router, De-googled Privacy AOSP Phones, Linux phones, and merchandise Premium VPN with Cloud-Based TOR Routing Cybersecurity Reference Privacy Focused Social Media - Open Source My GPG Public Key Please follow me on Odysee! (Previously ) $/invite/@RobBraxmanTech:6
Back to Top