WisdomEye Logo
WisdomEye

How to Disappear Online and Become Untraceable

Summary

This video details a comprehensive five-step framework for erasing one's presence from the internet and physical public records, born out of the speaker's personal experience with a swatting incident in 2017. The progression moves from basic digital hygiene, such as ad-blocking, to advanced legal maneuvers like using trusts to hide asset ownership and living entirely without modern tracking devices. The content emphasizes the critical trade-off between privacy and convenience, providing actionable strategies for different levels of security while warning about the heightened complexity and paranoia required for total invisibility.

Key Insights

Digital surveillance is a tool for systemic financial and social discrimination.

Corporate surveillance goes beyond targeted advertising; companies build detailed profiles to practice 'digital discrimination'. This involves extracting roughly $700 per year from an individual's data, which can amount to $100,000 over a lifetime. For example, if tracking reveals a user utilizes high-end luxury computing equipment, corporations may automatically increase prices for services or products specifically for that user.

The strategy of 'Identity Siloing' prevents a single point of digital failure.

Managing your life through a single email account creates a catastrophic single point of failure. The recommended approach is to create separate identity stacks—consisting of a unique email, phone number, and name—for different silos of your life, such as one specifically for physical residential matters. This prevents a leak in one area from compromising all other aspects of a person's digital and physical existence.

Public records can be legally bypassed through the use of anonymous legal structures.

Property taxes, vehicle registrations, and real estate records are typically public and ingested by data brokers. To remain invisible, individuals can use corporations, trusts, and other legal entities to hold assets so that the 'true beneficial owner' remains hidden. Hiring wealth management attorneys experienced in privacy-preserving structures and using a 'decoy residence' for DMV requirements are essential tactics at this advanced stage.

Sections

Introduction: The Motivation for Vanishing

The speaker's decision to disappear was sparked by a traumatic 2017 swatting incident.

In 2017, the speaker was 'swatting' victims after an anonymous caller falsely told police he had murdered people and was holding hostages. This event, which included police storming his home, led him to research and implement steps to completely erase his presence from the internet to ensure peace of mind and personal safety.

The erasure process consists of five escalating steps with varying trade-offs.

There are five distinct stages to disappearing. The speaker reached stage four for personal comfort, noting that each step requires weighing the loss of modern convenience against the gain of security and privacy.


Step 1: Installing Ad Blockers

Ad blockers are the first line of defense against corporate surveillance and profiling.

Installing ad blockers is described as 'low-hanging fruit' to decrease corporate surveillance. It is less about avoiding annoying ads and more about stopping the 'surveillance machine' that builds profiles used for digital discrimination, such as jacking up prices based on the user's hardware profile.

Information extraction is a massive hidden cost to the average internet user.

Major tech companies extract an average of $700 per year from individual data profiles. Over a lifetime, this can cost a person upwards of $100,000. Furthermore, simple interactions like health-related searches are factored into these profiles.

Blocking ads can occasionally break certain website functionalities.

The primary trade-off for this step is that some internet services may not operate correctly or may completely break when ads and tracking scripts are blocked.


Step 2: Eliminating Smart Device Surveillance

Smart home devices act as 'spies' and 'wiretaps' within private residences.

Common household items like smart TVs and robotic vacuums act as surveillance tools, leaking data not just to the manufacturer but to dozens of 'trusted partners' and 'sub-processors,' which increases the risk of data leaks into the wild.

The Pi Hole offers a technical solution for network-wide privacy.

For devices that cannot be easily disconnected from Wi-Fi, the speaker suggests using a Pi Hole. This is software running on a cheap Raspberry Pi computer that acts as a 'black hole' for network traffic meant to leak data to third parties, preventing them from leaving the home network.

Network-level blocking adds technical complexity and potential points of failure.

Implementing a Pi Hole is not straightforward for non-technical users. If the device fails, it can cause various applications and other devices on the network to stop working entirely.


Step 3: Identity Segregation and Management

Avoid using a single email account for all internet services.

Having one email account is a dangerous decision because it serves as a central control point. If compromised, every linked service is at risk. The goal is to move toward 'living a hundred separate lives' through identity segregation.

Create segregated 'identity stacks' for specific life functions.

The speaker recommends creating identities tied to specific silos, such as one identity (name, email, phone, credit card) dedicated solely to things associated with a specific physical address. This limits the number of accounts to manage while keeping them separate.

Cross-contamination is the primary threat to segregated identities.

Users must be extremely careful not to mix data, such as using a phone number from one identity for a service owned by another. The assumption is that every identity stack will eventually leak, and segregation ensures the compromise does not ripple across your entire life.


Step 4: Burning the Paper Trail

Public records for property and vehicles are the easiest way to find someone.

Anything regularly taxed, like real estate or cars, creates a searchable public record. To hide this, the speaker uses corporations and trusts to ensure he is not the legal owner on record, making it difficult for data brokers to find his residence.

Use a decoy residence to satisfy DMV and utility requirements.

The DMV often requires proof of residence. The speaker suggests renting the cheapest possible apartment to serve as a decoy address for mail and utility bills, which satisfies government requirements while hiding the actual place of residence.

Proactively 'attack' yourself to find and fix privacy leaks.

At this level, one should hire professional private investigators and skip tracers to use their tools to see if any mistakes have been made in the paper trail, ensuring the individual cannot be doxed or swatted.


Step 5: Total Disappearance and Invisibility

Total invisibility requires abandoning all modern tracking hardware.

Step five involves the complete removal of phones, smart devices, and modern cars, which are described as 'surveillance devices on wheels.' This level is about erasing existence rather than just data hygiene.

Travel becomes restricted to methods that do not require government ID.

Any travel requiring 'Know Your Customer' (KYC) verification, like planes or trains checking government names, must be avoided. This limits travel mostly to cars, and even then, one must be wary of automated toll systems.

Use a passport instead of a driver's license for ID verification.

When ID is required, such as at hotels, use a passport rather than a driver's license. Passports do not list a home address, preventing staff from entering residential data into their systems.

The final goal is to avoid all human and system contact.

The only way to ensure no human ever leaks your information is to never give them the opportunity. This final frontier protects against corporations and bad actors, though it requires a high level of sacrifice and personal paranoia.


Ask a Question

*Uses 1 Wisdom coin from your coin balance

Watch Video

Open in YouTube