Extreme Privacy: What It Takes to Disappear (2nd Ed.)

"My Successes and Failures While Making People Disappear"

Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This 565-page textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out and provides explicit details of every step he takes to make someone completely disappear, including legal documents and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described. For many, this is the only privacy manual needed to secure a new digital life.

Content

International Note: Approximately 50% of the content of this book focuses exclusively on privacy tactics in America such as LLC's, Trusts, masked payments, nomad residency, and online exposure. The other half presents pivacy and security strategies which apply globally. I encourage international readers to modify the U.S.-focused lessons toward their own country.

Introduction to Extreme Privacy: This introduction presents a brief view into the work of making people disappear. Celebrities, billionaires, and everyday citizens have requested complete reboots of their privacy and security. This section sets the stage for the methods which are explained throughout the book.

CHAPTER 01: Ghost Addresses: This chapter introduces the idea of ghost addresses, and explains proper execution from beginning to end. You will be surprised to learn how easy a lifetime ghost address can be to obtain, and you will never need to provide a real home address in the future. Your mail will be automatically forwarded to a safe mail drop without any trail to your home.

New chapter content within this second edition: Minor updates and corrections

CHAPTER 02: Private Mobile Devices: All cell phones are tracking devices. This chapter presents complete instructions for the anonymous purchase of a phone and secondary Wi-Fi communications device, execution of anonymous service, proper usage of Faraday bags, configuration of communications software, number porting, and the ability to possess an unlimited amount of phone numbers associated with the device (for free).

New chapter content within this second edition: Device backup and restoration, Android options, microphone locks, camera covers, VPN configurations, mobile device firewalls, Firefox Focus, new messengers

CHAPTER 03: Private Digital Life: Privacy cannot exist without digital security. This chapter serves as a crash course in password managers, private communications, secure operating systems, data encryption, travel considerations, and private email usage.

New chapter content within this second edition: ProtonMail settings, Apple without Apple ID, disable Brew analytics, OTP vs U2F, content archiving, custom domain to email, encrypted calendar and contacts, new email forwarders, email importing, secure notes, file sharing, password manager updates

CHAPTER 04: Nomad Residency: This chapter explains every detail of the process of becoming a legal nomad within a new domicile state. While this is optional, it will provide a strong layer of privacy throughout the rest of the book. Complete tutorials are presented for multiple states including all required forms and documents.

New chapter content within this second edition: Online DL renewal options

CHAPTER 05: Legal Infrastructure: This is the most revealing chapter of the book. It discloses complete tutorials for creating various types of private trusts and LLCs. It includes sample templates with explanations of each legal document. This level of detail has never been shared in previous books and replicates the entire process of generating legal entities for clients.

New chapter content within this second edition: South Dakota LLC options

CHAPTER 06: Private Vehicles: This chapter presents the need for private vehicle purchases and registration. The details explain each step of the process including state forms and requirements. The example case walks you through an entire purchase and registration of a vehicle without publicly disclosing your personal information.

New chapter content within this second edition: New vehicle purchase through LLC (Nomad), auto supply store profiles, vehicle tracking, toll pass issues

CHAPTER 07: Private Temporary Housing: This chapter offers new strategies for anonymous lodging in hotels, extended stays, and rental homes.

New chapter content within this second edition: Reward program concerns, places to avoid

CHAPTER 08: Private Home Purchase: This lengthy chapter offers a complete tutorial for the purchase of a truly anonymous home. It begins with privacy concerns during home selection and ends with the closing of your new home without ever disclosing your name on any official record. Sample trust templates are provided along with tactics for preventing your name from appearing on any public document. This chapter presents details never shared in previous publications.

New chapter content within this second edition: Selling your home, nomad home purchase legalities

CHAPTER 09: Anonymous Utilities, Services, & Payments: Once you have your anonymous home, you will need to prevent your name from being associated with the utilities. This chapter explains numerous strategies, including phone call scripts, for enabling anonymous utility services at your new home.

New chapter content within this second edition: Secondary credit card concerns, new secondary credit card protocol, ID scanning and copying, virtual currencies, medical services

CHAPTER 10: Private Home Network: Previous books identified the importance of a secure home network behind a firewall with a dedicated bullet-proof VPN. This section continues that discussion with new options for a more secure solution. This includes explicit installation details and configurations, plus updates for encrypted DNS and VPN providers.

New chapter content within this second edition: PIA/ProtonVPN updates, travel router with pfSense, travel firewall with VPN, VPN issues, Netflix VPN strategy, ad-blocking, updated configuration files

CHAPTER 11: Private Employment: There is no such thing as complete privacy in terms of employment in America, but there are several things we can do to minimize our exposure. This chapter presents many ideas to assist with preventing your personal details from being exposed publicly. It attacks both standard employment and self-employment strategies.

New content within this second edition: Sole Proprietor EIN, employee ID issues, parking permit issues, virtual currencies

CHAPTER 12: Anonymous Pets: Surprisingly, obtaining and maintaining a pet anonymously takes a lot of effort. Paying cash to a home-based puppy breeder is easy, but every pet related encounter past that is extremely invasive. The shelters offering rescued pets are funded by pet marketing companies, veterinarians, and pet supply organizations. Many counties share vaccination records with third parties. In all of these scenarios, your personal information as a pet owner is valuable, and abused. This chapter explains how to prevent personal details from being shared and exposed.

New chapter content within this second edition: Public vaccination records, prescription issues, online pharmacies

CHAPTER 13: Beyond Extreme: You may believe that the privacy strategies presented this book are a bit too complex for your needs. For some clients, the previous content represents only the basics, and they desire the next level of privacy. This chapter tackles name changes, dual citizenship, and secondary residency options.

New chapter content within this second edition: Marriage considerations, birth considerations, death considerations, final arrangements document, living wills, traditional wills, Post-death data access, birth tourism

CHAPTER 14: Damage Control: If you applied most of the previous privacy strategies toward your life, you should be in good shape, for now. Around every corner is an invasive threat toward your privacy. Data mining companies, marketers, and government entities continue to want your information. It has extreme value in our data-obsessed world. If you want to keep the level of privacy you created, you must put forward effort to maintain it. This chapter presents many considerations for staying private and secure after all of your hard work, including disinformation campaigns, monitoring, personal data removal, online content removal, and credit freezes.

New chapter content within this second edition: Data removal shaming, smart TVs, DNA tests, financial data aggregators, E-readers, fitness devices, contact information abuse, private transaction records, census tactics, social media background services, CCPA, freeze+alert combination, additional credit freeze submissions, COVID-19 tracking

CHAPTER 15: Physical Privacy & Security: My attempt in this chapter is to briefly summarize the content in regard to physical privacy and security from my previous books in a way which can be easily digested. This includes home privacy, home security, and firearms considerations.

New chapter content within this second edition: This entire chapter is new.

CHAPTER 16: Advanced Private Digital Life: This chapter represents completely new material which was not present within the first edition. While writing the previous chapters about digital communications and secure devices, I refrained from including some strategies which may be considered a bit too extreme for some readers. In this chapter, I present tutorials about virtual machine usage, USB operating systems, advanced hardware 2FA, self-hosted VOIP service, and alternative Android operating systems.

New chapter content within this second edition: This entire chapter is new.

CHAPTER 17: My Successes and Failures: Jane Doe: I wish I could tell you this life has been easy. I wish I had a guide for all of this while I was experimenting. I have been forced to test new strategies on myself, and occasionally clients. I have made my share of mistakes, and I have learned valuable lessons from each. This chapter provides examples of my various successes and failures when trying to make people disappear. Specifically, I disclose my strategies to make "Jane Doe" disappear after leaving an abusive partner.

New chapter content within this second edition: None

CHAPTER 18: My Successes and Failures: Jim Doe: This chapter explains the relocation difficulties experienced when helping "Jim Doe" disappear after he found himself in a public spotlight.

New chapter content within this second edition: None

CHAPTER 19: My Successes and Failures: Mary Doe: This chapter presents many successes and even more failures while dealing with online revenge-porn. Many readers might be surprised at the lengths online attackers will go in order to shame and harass others.

New chapter content within this second edition: This entire chapter is new.

Conclusion: A final note to wrap-up the lessons learned throughout the book.

Available Now!





United States
Canada
UK
Germany
France
Italy
Spain
Japan
Mexico (Coming Soon)
Australia (Coming Soon)
India (Coming Soon)

Please note: We do not sell books directly, and we carry no stock. Many readers report the ability to order copies from local and national chain book stores. We have no control over distribution.

E-Book Availability

An e-book version of this release is not available. Only printed copies will be offered of this title. This is due to many reasons, including rampant piracy, counterfeit e-book sales, Kindle tracking, exclusivity requirements, and unpredictable content removal from Amazon. These reasons have convinced me to stay out of the e-book market. The size of this release (245,000 words) does not work well as an e-book, and is better served as a printed reference manual.

Bulk Orders

Our distributor requires a minimum order of 100 books in order to qualify for a bulk discount. We cannot offer direct bulk orders for anything less, but Amazon can facilitate individual orders.

LE/GOV Version

We no longer offer LE/GOV/MIL versions of our books. This edition contains all of the content submitted for legal approval.