Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,680 --> 00:00:01,140
OK.
2
00:00:01,160 --> 00:00:08,030
So now that we understand that Toure is basically a network of devices connected to each other that
3
00:00:08,030 --> 00:00:12,830
we can use to improve our privacy and anonymity.
4
00:00:12,830 --> 00:00:16,760
The question is how can we connect to this network and use it.
5
00:00:17,810 --> 00:00:20,230
Well the answer is actually very simple.
6
00:00:20,230 --> 00:00:27,410
You can configure your computer regardless of what operating system it uses to rout all traffic through
7
00:00:27,410 --> 00:00:28,630
the Tor network.
8
00:00:28,730 --> 00:00:36,560
And that way hopefully everything will flow through the network protecting your privacy and anonymity.
9
00:00:36,560 --> 00:00:43,430
Sadly though this is not always the case as you probably have a lot of programs that I don't even know
10
00:00:43,430 --> 00:00:53,330
of that could leak information about you potentially revealing your location your IP and more information.
11
00:00:53,330 --> 00:01:00,320
Not only that but you could be running an unpublished version of Windows or Linux or even OSX.
12
00:01:00,440 --> 00:01:06,380
Also your browser could leak information about you even if you think you properly configured it to use
13
00:01:06,380 --> 00:01:07,620
Tor.
14
00:01:07,640 --> 00:01:15,200
Also a lot of us use browser plugins and browser extensions which also could potentially leak information.
15
00:01:15,230 --> 00:01:22,880
And finally we have the exit node problem and the previous lecture I already mentioned that when you
16
00:01:22,880 --> 00:01:31,040
connect to Tor all the data and green in here is sent encrypted and at any time none of the nodes know
17
00:01:31,130 --> 00:01:33,460
what web you want to go to.
18
00:01:33,470 --> 00:01:39,920
They only know the address of the next node so they can forward the data to the next node.
19
00:01:40,010 --> 00:01:48,020
But as I mentioned the Red Arrow in here means the data leaving in here will leave unencrypted unless
20
00:01:48,020 --> 00:01:49,890
he's TTP as is used.
21
00:01:49,910 --> 00:01:57,530
So you'll have to go and manually install TTP as everywhere to force data to be sent over hash TTP as
22
00:01:58,400 --> 00:02:01,130
also we have this node right here.
23
00:02:01,130 --> 00:02:03,640
This is known as the exit node.
24
00:02:03,830 --> 00:02:12,500
And the problem here is anybody can actually configure a computer to work as a node in the Tor network.
25
00:02:12,620 --> 00:02:20,780
And if your computer is an exit node you will be able to see this data leave an unencrypted.
26
00:02:20,900 --> 00:02:23,320
So you have to trust this person.
27
00:02:23,330 --> 00:02:30,550
If you're really using the detour network as they can potentially see everything you do now.
28
00:02:30,560 --> 00:02:37,340
Like I said in the previous lecture if the target's Web site uses hash TTP s or if you're using a plugin
29
00:02:37,520 --> 00:02:45,280
that will force hash TTP connections then this will be okay because the data will be encrypted by SSL
30
00:02:45,280 --> 00:02:48,940
cause he's TTP as encrypts the hash TTP data.
31
00:02:48,970 --> 00:02:50,180
So you'll be fine.
32
00:02:50,330 --> 00:02:55,100
But this is again another step that you have to take and another plug in that you have to install on
33
00:02:55,100 --> 00:03:00,800
your browser in order to make sure that your data is fully encrypted along the way.
34
00:03:00,860 --> 00:03:07,670
And even if someone is able to see this data such as the person running the exit node here or if there
35
00:03:07,670 --> 00:03:13,760
is someone in here intercepting the connection even if they capture the data they will not be able to
36
00:03:13,760 --> 00:03:17,400
read it because it will be encrypted.
37
00:03:17,510 --> 00:03:24,940
So like I said there is a lot of steps to do if you want to configure your computer to use data or network.
38
00:03:25,070 --> 00:03:31,730
And even if you do all of that you could miss a tiny or a small detail that could potentially leak information
39
00:03:31,940 --> 00:03:40,920
and reveal your identity therefore a better solution is to either use the Tor Browser and we'll talk
40
00:03:40,920 --> 00:03:42,780
about that in the next section.
41
00:03:42,780 --> 00:03:50,970
This is a web browser designed by the same people that run the Tor network throughout all the data through
42
00:03:50,970 --> 00:03:52,820
the terror network by default.
43
00:03:52,890 --> 00:04:00,030
It also has a lot of other features to prevent leaking your information and ensuring the data that you
44
00:04:00,030 --> 00:04:03,460
send is always encrypted.
45
00:04:03,480 --> 00:04:10,290
This is the simplest and a good solution a better solution would be to use tells which is a Linux distro
46
00:04:10,590 --> 00:04:14,000
designed for anonymity and privacy.
47
00:04:14,000 --> 00:04:23,190
And the best solution would be use in Cuba so as with Unix Gateway which is an amazing operating system
48
00:04:23,340 --> 00:04:32,670
that is very very secure and also can be configured to use Tor by default improving your security and
49
00:04:32,760 --> 00:04:35,660
anonymity and privacy.
50
00:04:35,710 --> 00:04:41,770
Now we will go over all of this in the next lectures starting with the simplest and easiest and will
51
00:04:41,800 --> 00:04:45,400
and with the more complex but the best approach.
5706
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.