Waiting..
Auto Scroll
Sync
Top
Bottom
Select text to annotate, Click play in YouTube to begin
00:00:00
some of you may already know that there are cyber security benefits to using a virtual machine in fact that's why some security versions of Linux like cubes and honix uses virtual machines but what
00:00:12
most people don't know are the specific advantages of using a virtual machine for privacy there are some particular threats from the likes of the most evil
00:00:23
platform Facebook and meta in general that you can't completely beat unless you use a virtual machine in this video I will discuss six specific advantages
00:00:37
to a virtual machine that make this a privacy and security solution you cannot ignore this is a moderately Advanced topic since many of you may not have the
00:00:49
word withal to install a virtual machine but to educate the beginners I will show you how to install a simple virtual machine this particular solution is often overlooked as a privacy tool and
00:01:03
admittedly I don't talk about it as much as I have introduced some less complex Alternatives however the Alternatives do not solve all the problems while a virtual machine solution does if you
00:01:16
want to kick up your privacy skills up a notch by knowing this Tech and how it can benefit you stay right there to learn the six extra advantages of a virtual
00:01:28
machine in this video I'm going to install a virtual machine on a laptop running Windows 11 the virtual machine software I will use is the free Oracle VM virtual
00:01:44
box this same virtual machine can be installed on Mac OS and Linux on Linux you also have the option of using the free software KVM to create
00:01:56
virtual machines I have a video on KVM and I do have an older video on installing VM virtual box which is more detailed than what I will show here and of course there are other options on
00:02:08
Linux like toot the main concept of virtualization is that you can run a child operating system under the host operating system the main operating system called The Host is Windows 11 in
00:02:23
this example today it will make the child operating system which today will be Linux Mint think it is running inside an actual Intel machine but really it will not be
00:02:36
directly running under the Intel machine rather it will be running in a virtual computer and the host OS will be an intermediary by providing access to Hardware like the display keyboard mouse
00:02:48
memory and peripherals in modern computers the virtualization capability is built into the CPU now so the host OS barely interferes in the speed of Communications between the actual
00:03:02
machine and the virtual machine so a software tool like Oracle VM virtual box using the virtualization features of the CPU will make the OS think it is really
00:03:13
running inside a real machine so here's a quick demonstration of that here I'm running Windows on my host machine it is the actual operating system then here
00:03:26
using virtual box I have launched my pre-installed instance of Linux Mint so it's like having multiple operating systems at my disposal in this example this virtual machine window is running a
00:03:39
YouTube video as you can see it's pretty watchable however it's probably not that great for used with 4K video so it has limits by the way for better privacy it
00:03:51
is best to install Linux on your virtual machines as I did in this example Linux will be the most privacy safe as I'm showing here the host system is
00:04:03
Windows Windows has a lot of spyware most can be turned off but there are more being added by Microsoft constantly just recently Microsoft enabled co-pilot on this computer which is basically an
00:04:17
AI that I can talk to and who knows what other surveillance it is doing on this machine now I haven't had a chance to study this yet on Mac OS aside from the
00:04:29
continuous monitoring by Apple of data like location and usage statistics Mac OS just like iOS are currently the main devices that support client side scanning meaning the AI in the device
00:04:43
can search your local content and reported to HQ if a match is found pretty invasive but when you're running inside a virtual machine what you're doing is not directly visible to the
00:04:56
host OS so this should blunt any AI B content or usage scanning this is one benefit that I will tell you right now but there are very specific things that
00:05:08
will not be obvious that I'll tell you about later so this is a bonus benefit now before I get too deep let's begin by doing a quick install of a virtual machine I won't get into too much detail
00:05:21
here and I will speed up the video just to give you a quick picture I downloaded a couple of things in advance first I downloaded the latest version of Oracle VM virtual box which as of the time of
00:05:34
this video is 7.0.1 4 then I also downloaded an ISO image of Linux Mint which I got from the Linux Mint website I chose Linux Mint in
00:05:47
this example because it is a popular drro with beginners now in my experience it is problematic to have the files in some download folder because it causes
00:05:58
permission errors in Windows so I found that the easiest way to avoid problems is to make a folder and put all the files we are going to install in there and you need to be logged in as the
00:06:10
admin user so here it is in my case I have the virtual box files and the Linux Min files ready to go now let's do a quick install of virtual box this new version gives a warning message about
00:06:24
python core which we are not going to care about since we are not running python so just ignore that just accept the defaults and continue the installation now when you are done and
00:06:50
you run the virtual box application you will see this UI of virtual box what we are going to do is click on new then we will fill in the name and the folder
00:07:04
where we will install the virtual machines and then we specify the Linux Mint ISO file we need I'm just going to specify this as Linux
00:07:19
64bit I did an unattended installation here it's took a while so I'm speeding up this portion of the install here quite a bit [Music]
00:08:07
next I will turn on the virtual machine by double clicking the one I want and this will boot the virtual machine into a child OS this will basically start up
00:08:19
Linux Mint again make sure to remember the user and password you've given to your Linux user I won't show this in the video but I installed a Chromium browser on the VM I find that this is less buggy
00:08:33
than the default Firefox browser and seems faster as well for watching videos I also adjusted the screen display size so it is larger my host computer has Invidia so this VM may not
00:08:47
be completely using the GPU features right now [Music]
00:09:14
after the install I will shut down the VM and adjust a few settings as you see here I just want to check the amount of memory it allocated you can play with this later I have a lot of memory so I
00:09:26
can give it a bunch I took a quick glance at the other resources given and they appear to be fine so here's the final result I have the host machine on the main screen and
00:09:39
you can see the window in the middle which is running YouTube this window is Linux Mint in actual use it can be seamless you can run your normal stuff on Windows and then you also have the option to run a
00:09:51
virtual machine for when you want privacy or Security benefits now that we have the tools we need let me tell you why you would use a virtual machine and
00:10:03
what the benefits are I'm going to list cyber security and privacy benefits number one have a safe OS copy this will be important for later you can clone your virtual machine that you have
00:10:22
set up the way youd like and when you clone it you can easily restore it if and when your OS gets infected Ed with some malware so if you're in doubt as to the safety of a prior action you can
00:10:35
stop immediately and restore the latest clone copy of your OS this will wipe out any malware immediately number two sandbox your
00:10:49
email you can install your email client inside the virtual machine and not install it on your host machine this is a fact that the average person doesn't know probably 90% of all malware comes
00:11:03
from attachments and email the biggest source of attacks is when through social engineering some attacker makes you click an attachment and in this process infect your device would malware
00:11:16
fortunately if your emails inside the virtual machine it cannot infect your host machine all you have to do is restore your clone copy of the virtual machine and you are assured that your OS
00:11:28
is clean one again number three isolate your data in the VM if we have to worry about the AI in Windows or Mac OS looking at our content then the best way to prevent this AI
00:11:43
scanning is to put your content inside the virtual machine this would be important if you're a whistleblower a journalist or maybe an activist of some sort this type of isolation keeps your
00:11:56
content away from malicious spying usually the OS will give you the option to encrypt your VM hard disk so if this is a concern in your particular instance
00:12:09
then this is how you handle that by the way I don't usually worry about any AI scanning if my host system is Linux Linux is open- source and very safe but
00:12:20
the proprietary OS is from Microsoft and Apple do unknown things however sometimes we have no choice but to install Windows in our devices or we have a Macbook in which case it will be
00:12:32
running Macos the good news is that we can always install a virtual machine even in these cases number four Mac address collection let me tell you about a
00:12:47
surveillance scheme used by meta it's specified in the data policy of Facebook so this is something I've always known about a Facebook app if you use an app will run ARP address resolution protocol
00:13:01
which is a command I will demonstrate here on the command line if I go to a command line on Windows and run ARP it will actually show all the devices on your network and all the Mac addresses
00:13:13
well these Mac addresses are unique identifiers and they are assigned to your specific devices if ARP detects your mobile devices Facebook Instagram and WhatsApp will actually identify your
00:13:26
presence near a group of either other men users simply by the MAC address announcements in any other network you happen to be in this is a huge privacy
00:13:37
Invasion Danger from the most dangerous app ever now let me show you what happens when you run ARP in a virtual machine look at this because the virtual machine network is isolated it acts as
00:13:50
its own network subnet and thus other devices will not be visible on the host Network this is also very important because if some app runs AR on your network finding the same combinations of
00:14:02
Mac addresses is like a fingerprint and it will match each and every one of you in the network as part of a set this will allow identification even if you're using a VPN at the moment the only party
00:14:16
that states they are using this Tech is meta but obviously anyone can do this without telling you number five computer identity this is a problem on Windows
00:14:28
and Mac ma OS any app can find some unique identifier on your device this is equivalent to iOS or Android reading the IMI on your phone I will specifically
00:14:40
demonstrate this on Windows let me show you the most obvious identifier on Windows and this is the unique thing on your device which is the Windows product ID any app can read this data in the
00:14:54
Windows registry to demonstrate this I will go to the command line and run reg edit then going through the indices hkey local machine software Microsoft Windows
00:15:07
NT current [Laughter] version you can see these digital product ID digital product
00:15:24
id64 product ID but these ones I'm showing you are pretty obvious and I will be frank with you I have personally programmed apps that read these identifiers to check software licenses to apps I've made this
00:15:37
match to the product ID is unique now since any app can capture this product ID easily as you can see here then it's very easy to capture the device identity at all times however if you're running
00:15:51
Linux as we are demonstrating in our virtual machine example then you do not have a unique identifier in Linux certainly nothing as permanent as a Microsoft product ID this is a huge
00:16:04
Advantage with privacy using a virtual machine you can protect the device identity I'm actually concerned if Chrome or other browsers read these identifier so understand that they can
00:16:18
whether they do or not I don't know but better be safe than sorry number six Microsoft ID or Apple ID there are are other identifiers in
00:16:30
the registry that I've demonstrated in other videos for example you can see the product name and registered owner here now I've cleansed my system as I explained in a video last year so I removed all references to registered
00:16:43
owner which is the Microsoft ID in this case but again realize that this data can be captured again we show the advantage of a virtual machine here even if your host machine is running Windows
00:16:57
but whatever you deem could be a buing app like a Chrome browser for example will be sandboxed in Linux and will not be able to acquire the Microsoft ID your name and other little goodies in the
00:17:09
Windows registry and of course the equivalent Apple ID will not exist in a virtual machine running Linux just to make this little discussion complete if you're on a home
00:17:22
network you need to run a VPN on the host Os or use a VPN router like bra router in your networ networ then the virtual machine will also use the VPN since it gets its internet access from
00:17:34
the host machine there are more sophisticated techniques for connecting the virtual machine to another Network in the cloud I haven't tried that yet but I can see that as an available
00:17:45
feature on Virtual box the reason I've not been promoting the use of a virtual machine too much even though I've made several videos on it is that I've been talking about about the simpler solution which I call
00:18:01
browser isolation use multiple browsers and partition your activities into Google and non- gooogle using these browsers this will isolate the Google ID and prevent your activities outside of
00:18:15
Google from being tracked however this is not foolproof since some of the identifiers I mentioned here can be captured by Rogue apps specifically like
00:18:26
Facebook so if you Pur in using Facebook the only solution I can offer you is to isolate that use in a virtual machine it is not necessary to use a virtual machine for every activity but isolating
00:18:41
email Facebook and Google in separate virtual machines is a very sophisticated protection method and will protect you both from cyber security and privacy
00:18:52
threats I hope this information has been helpful folks I have a company that creates products made to protect your privacy this is available through my privacy focused social media site bra me
00:19:07
we have now exceeded 100,000 active users so join us there our store There features products like the Google phones the bra virtual phone bvpn Brax mail bra
00:19:22
rers and more I've created most of these products myself and you can discuss them with the community over at brme those are the actual users of these products so they will be honest with you thank
00:19:36
you for watching and see you next [Music] time
End of transcript