Extreme Personal Privacy 2 expands on the fundamental tactics demonstrated in Course #1, providing detailed strategies and resources to actively defend against specific types of threat actors who may seek to violate your privacy and do you harm. Important topics include:
Section 1 - Extreme Privacy and Incident Response
Defend Against Physical World Threat Actors (such as stalkers, harassers, criminals)
Defend Against Online Threat Actors (such as internet trolls and online abusers)
Combatting Non-Consensual Pornography (also known as “Revenge Porn”)
Address Confidentiality Programs (alternative address services offered by many states to help victims of abuse)
Extreme Healthcare Privacy Tactics (protecting your identity and privacy when researching or obtaining sensitive healthcare services, including reproductive healthcare services)
Protecting Minors from Abuse (including in-depth discussions and recommendations on preventing bullying, sexual abuse, and sextortion of minors)
Section 2 – Alias Considerations
Understand the reach of the Government
Developing a Working Alias (including developing an alternate identity, establishing an LLC and obtaining credit cards and other resources to mask your identity from prying eyes and the public).
Extreme Personal Privacy 2 draws upon the book Get Lost: Personal Privacy Strategies for Extremely Busy People, written by privacy experts Daniel Farber Huang and Theresa Menders. Extreme Personal Privacy 2 will show you how to take back control of your privacy and safety. Using clear, concise language and providing step-by-step instructions, this course provides actionable tactics, techniques, and procedures that you can activate immediately.