Sounded ID: 9781982748494
ISBN: 9781982748494
Publication Date: April 15, 2019
Publisher: Instafo
Language: English
Author Name: Derek Drake
Narrator Name: Instafo
ALERT: Shhh! Don’t move right now! You don’t know me, but I know you. I am watching you at this moment. I know all your dirty secrets and offensive behaviors. I am copying your data without you knowing so I can steal your identity, invade your privacy, and commit fraud framing you.
Who am I?
I am the result of your carelessness and your unwillingness to take “ME” - your personal information, private data, and online security - seriously. Thus, I have taken on the new identity of “YOU” with all your information at my disposal.
Either you send me money to an offshore account, or I...
ALERT: Shhh! Don’t move right now! You don’t know me, but I know you. I am watching you at this moment. I know all your dirty secrets and offensive behaviors. I am copying your data without you knowing so I can steal your identity, invade your privacy, and commit fraud framing you.
Who am I?
I am the result of your carelessness and your unwillingness to take “ME” - your personal information, private data, and online security - seriously. Thus, I have taken on the new identity of “YOU” with all your information at my disposal.
Either you send me money to an offshore account, or I will continue to transgress under your name and continue to harass, blackmail, and threaten to reveal your intimate details and unpopular opinions that others will not like to shame you, tarnish your reputation, ruin your relationship, make you lose your job and become victim of others’ bullying.
Moral: Prevent, prepare, and protect yourself from identity theft, privacy invasion, stolen information, and all sorts of cyber crimes and real-life threats through the “Power of Anonymity.”
You can obtain this power by learning how to “Anonymize Yourself.”
* How to protect yourself ONLINE from getting your identity stolen or privacy invaded, your accounts hacked or profiles hijacked, and your computer infected with malicious viruses.
* How to protect yourself OFFLINE from real-world threats, violence, harassment, stalking, and lawsuits from predatory people, especially if you have money, assets, or anything of value that others want or envy.
* How to pursue all your guilty pleasures and passions that others may not like or are considered society’s taboos, as well as achieve your success and goals without competitors or enemies standing in your way.
...and that’s barely exposing all the anonymity's amenities.
Anonymity is the greatest secret power that will redefine, reshape, and reclaim your desired reality.
Who am I now? It doesn’t matter. I am nobody. I am anonymous.
- Anonymous You
# | Title | Duration |
---|---|---|
1. | Opening-AnonymizeYourself |
0 mins 21 secs |
2. | Operation1.1-The24-7Surveillance |
4 mins 00 secs |
3. | Operation1.2-TheDangerofFame |
2 mins 09 secs |
4. | Operation1.3-TheMediaVirus |
3 mins 09 secs |
5. | Operation1.4-TheAnonymousProtectionProgram |
3 mins 37 secs |
6. | Operation2.1-ThePuppet-MasterApproach |
3 mins 45 secs |
7. | Operation2.2-TheAtomicAnonymousWeapon |
1 mins 09 secs |
8. | Operation2.3-TheEarly-ModernHistory-AncientAgents |
2 mins 01 secs |
9. | Operation2.4-TheMid-ModernHistory-SecretSociety |
1 mins 40 secs |
10. | Operation2.5-TheContemporaryHistory-CriminalOrganizations |
3 mins 52 secs |
11. | Operation2.6-TheOn-GoingGovernmentAgencies-CovertOperations |
3 mins 39 secs |
12. | Operation2.7-TheModern-DayExample-ActivistActivities |
2 mins 21 secs |
13. | Operation2.8-TheInfamousTakeaway |
2 mins 06 secs |
14. | Operation3.1-TheAnonymityinPolitics |
2 mins 06 secs |
15. | Operation3.2-TheAnonymityinNegativity |
3 mins 30 secs |
16. | Operation3.3-TheAnonymityinWealth |
3 mins 16 secs |
17. | Operation4.1-TheStateofIncognito |
2 mins 33 secs |
18. | Operation4.2-TheSecurityMeasure-IdentityTheft |
4 mins 57 secs |
19. | Operation4.3-TheSecurityMeasure-Self-DestructiveSocialMedia |
3 mins 56 secs |
20. | Operation4.4-TheSecurityMeasure-Cyberstalking |
1 mins 38 secs |
21. | Operation4.5-TheSecurityMeasure-GreyMarket |
1 mins 31 secs |
22. | Operation5.1-TheUnpluggedMatrix |
0 mins 56 secs |
23. | Operation5.2-TheProtectionPlan-FalseImpersonator |
1 mins 35 secs |
24. | Operation5.3-TheProtectionPlan-ObsessivePredator |
1 mins 42 secs |
25. | Operation5.4-TheProtectionPlan-ReputationRuiner |
1 mins 52 secs |
26. | Operation6.1-TheTechnicalOffense |
2 mins 05 secs |
27. | Operation6.2-Tactic1-ProxyServer |
3 mins 59 secs |
28. | Operation6.3-Tactic2-VirtualPrivateNetworkVPN |
2 mins 16 secs |
29. | Operation6.4-Tactic3-TorBrowser |
2 mins 21 secs |
30. | Operation6.5-Tactic4-LocationSettingDeactivation |
0 mins 58 secs |
31. | Operation7.1-TheEmailCloak |
1 mins 42 secs |
32. | Operation7.2-TheMessagingEncryption |
1 mins 06 secs |
33. | Operation7.3-TheFileSharingDiscretion |
0 mins 31 secs |
34. | Operation7.4-TheFinalTidbits |
0 mins 37 secs |
35. | Operation8.1-TheBackgroundCheck |
1 mins 12 secs |
36. | Operation8.2-TheCleanupProcess |
1 mins 05 secs |
37. | Operation9.1-TheMedalofAnonymity |
0 mins 57 secs |
38. | Operation9.2-TheProtectionandPreventionAct |
0 mins 59 secs |
39. | Closing-AnonymizeYourself |
0 mins 13 secs |