Test your privacy acumen (Technology)- Novice Level

After testing yourself here, you will realize how the luxury of tehcnology we carry around as our second self turns your concept of ‘being private’ into the infinite abyss of nothingness.

Or, you will learn that you are in fact private because you have taken control of the luxury rather than the other way.

For further information on how you use disinformation to create a clone double of your online ‘identity’ using technological luxury, while going your way without some stranger who have programmed a bot with personality disorder counting the hairs on your asshole, be certain to join the waiting list for the 1-on-1 course.

Please enable JavaScript in your browser to complete this form.
Step 1 of 2
1. ‘Client-side scanning’ is:
2. ‘Client-side scanning’ is a type of method generally known as:
3. The popular use of a man-in-the-middle attack is to:
4. Is it possible for you to create a misinformation database of your name, and records like arrest records, home address and phone number that others can publicly access?
5. Even if you have an LLC in a State like Wyoming that does not list your personal name publicly, can someone curious enough still find information about you?
6. Which of the below lists cannot be found publicly without a forensic audit or a subpoena?
7. What is the legal term, when you create layers that preserve the integrity of what you have, and do.
8. What are the main problems with mobile devices when it comes to privacy?
9. What is responsible for routing calls and text, internet connection in phone networks?
10. Which laws requires access to the SS7 of your mobile device?
11. What types of phones do not reveal your unque identity and share user data among apps in your mobile device?
12. Stingray attack method is originally known as, and performed using which of the following?
13. On a very basic level, how is a stingray attack done?
14. What is the purpose of using the above correct wave to attach any mobile device?
15. The stingray method attacks which portion of your mobile device?
16. What is another benefit for the user of an IMSI Catcher
17. Are e-SIMs safe from the IMSI catcher method?
18. When you mobile is device is off, which functions remains active that allows it to send signals that any curious parties or data miners can use to identify you? For instance, how the social media is able to suggest or show you contents on an item you just bought at a very certain place, or what you are preparing to do.
19. What are the two main purposes of a Virtual private Network(VPN)
20. Can location tracking be done on you even if you have a VPN?
21. How does big technology and data mining company like Google keep track of you?
22. Where are the most common areas stringray methods are performed on people
23. How is stingray executed?
24. Has stringray method evolved since 5G?
25. What type of circumstance is stingray used?
26. What is the simple but dangerous issue most people have with phone numbers and online websites?

15% coupon for non Patreon members: " Subtlecode777 " ***** 40% coupon for all Patreon members (Send Patreon DM or email for code). Dismiss