Extreme Personal Privacy 2 - Advanced Tactics

- Description
- Curriculum
- FAQ
- Reviews
Extreme Personal Privacy 2 expands on the fundamental tactics demonstrated in Course #1, providing detailed strategies and resources to actively defend against specific types of threat actors who may seek to violate your privacy and do you harm. Important topics include:
Section 1 – Extreme Privacy and Incident Response
-
Defend Against Physical World Threat Actors (such as stalkers, harassers, criminals)
-
Defend Against Online Threat Actors (such as internet trolls and online abusers)
-
Combatting Non-Consensual Pornography (also known as “Revenge Porn”)
-
Address Confidentiality Programs (alternative address services offered by many states to help victims of abuse)
-
Extreme Healthcare Privacy Tactics (protecting your identity and privacy when researching or obtaining sensitive healthcare services, including reproductive healthcare services)
-
Protecting Minors from Abuse (including in-depth discussions and recommendations on preventing bullying, sexual abuse, and sextortion of minors)
Section 2 – Alias Considerations
-
Understand the reach of the Government
-
Developing a Working Alias (including developing an alternate identity, establishing an LLC and obtaining credit cards and other resources to mask your identity from prying eyes and the public).
Extreme Personal Privacy 2 draws upon the book Get Lost: Personal Privacy Strategies for Extremely Busy People, written by privacy experts Daniel Farber Huang and Theresa Menders. Extreme Personal Privacy 2 will show you how to take back control of your privacy and safety. Using clear, concise language and providing step-by-step instructions, this course provides actionable tactics, techniques, and procedures that you can activate immediately.
-
4Defend Against Physical World Threat ActorsVideo lesson
We provide many potential tactics for you to be aware of and to consider should you or someone you care about be targeted by physical world treat actors, such as stalkers, criminals, or harassers.
-
5Defend Against Physical World Threat Actors - Product GuideVideo lesson
-
6Defend Against Online Threat ActorsVideo lesson
We provide strategies and tactics to protect your privacy and safety against online threat actors such as internet trolls and online abusers.
-
7Combatting Non-Consensual Pornography (also known as "Revenge Porn")Video lesson
We provide information, recommendations, and strategies to protect yourself and your images from unauthorized sharing or publication, otherwise known as “non-consensual pornography” or “revenge porn.”
-
8Address Confidentiality ProgramsVideo lesson
Address confidentiality programs are offered by many U.S. states to help victims of abuse mask their residential address from public records.
-
10Introduction to this SectionVideo lesson
We provide information and recommendations on preventing bullying, sexual abuse, and sextortion of minors.
-
11Protecting Minors from BullyingVideo lesson
We provide information and recommendations on preventing bullying of minors.
-
12Protecting Minors from Sexual AbuseVideo lesson
We provide information and recommendations on preventing sexual abuse of minors.
-
13Protecting Minors from SextortionVideo lesson
We provide information and recommendations on preventing sextortion of minors.

External Links May Contain Affiliate Links read more