Go Incognito
A guide to
watch Premium
Enroll Now
Note: Go Incognito v2 is being produced now. All premium students will be grandfathered into future versions of the project.
Course Overview
Section 1 - Introduction
- Section 1 Introduction
- Why Should You Care?
- Security vs Privacy
- FOSS
- Metadata
- The Convenience Line
- Supporting Go Incognito
Section 2 - A Clean Slate
- Section 2 Introduction
- Minimalism
- Erasing Your Local Identity
- Erasing Your Online Identity
- Section 2 Finale
Section 3 - Basic Digital Protection
- Section 3 Introduction
- Stay Updated!
- Permissions & Settings
- Passwords
- Two-Factor Authentication
- Search Engines
- Your Browser
- Hardening Your Browser
- Your Browsing Habits
- Browser Uniqueness
- Proxies & VPNs
- Antiviruses & Malware
- File Deletion
- Storage & Encryption
- Safe Communication
- Section 3 Finale
Section 4 - Advanced Digital Protection
- Section 4 Introduction
- Desktop Operating Systems
- Mobile Operating Systems
- Expendable Operating Systems
- Tor
- Cryptocurrencies
- Audits
- Section 4 Finale
Section 5 - Physical Privacy & Security
- Section 5 Introduction
- The Basics
- MAC
- Networking
- Radios
- Device Separation
- Section 5 Finale
Section 6 - Living The Lifestyle
- Section 6 Introduction
- Who Can You Trust?
- Minimizing Data Access
- Anon/Pseudonymization
- Shopping Safely
- Lifestyle Changes
- Pre-Configured Hard/Software
- Downsides to Safety
- Becoming an Activist
- Section 6 Finale
Section 7 - A New Beginning
- Course Summary
- Congratulations!