All language subtitles for 12. Connecting to Captive Portals

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,660 --> 00:00:06,510 Previously we learned how to install and use data or browser and in the previous lecture I showed you 2 00:00:06,510 --> 00:00:08,580 how to use it with tails. 3 00:00:08,580 --> 00:00:14,520 Now this will be the browser that will use most of the time to protect our anonymity and privacy and 4 00:00:14,520 --> 00:00:19,070 to access the hidden services or the darknet web. 5 00:00:19,140 --> 00:00:25,380 In this lecture though I want to show you another browser that comes with tails which is the insecure 6 00:00:25,500 --> 00:00:28,380 or unsafe browser. 7 00:00:28,490 --> 00:00:33,490 Now you might think why would they want to use an insecure or unsafe browser. 8 00:00:33,510 --> 00:00:41,280 See as we mentioned before unlike install and deter browser on other operating systems such as Windows 9 00:00:41,300 --> 00:00:48,200 OS X or Linux where only traffic going through the Tor browser will go through the Tor network and all 10 00:00:48,230 --> 00:00:53,170 other traffic will literally go directly to the Internet on tails. 11 00:00:53,240 --> 00:00:57,500 All traffic is forced to go through the Tor network. 12 00:00:57,500 --> 00:01:04,610 So regardless of what application generates this traffic even if it's a system update even if it's some 13 00:01:04,610 --> 00:01:12,380 malware that got downloaded and got executed on your system it will always be forced to go through the 14 00:01:12,380 --> 00:01:13,500 Tor network. 15 00:01:13,610 --> 00:01:17,010 Now like we said this is great because it prevents leaks. 16 00:01:17,120 --> 00:01:23,480 It improves our security and anonymity because no other programs can access the Internet directly. 17 00:01:23,480 --> 00:01:28,660 Therefore all of our connections are always going through to our network. 18 00:01:28,880 --> 00:01:33,220 So this is really really good and an amazing feature of tales. 19 00:01:33,230 --> 00:01:41,000 The only problem is sometimes you actually need to access the Internet directly or you need a browser 20 00:01:41,180 --> 00:01:44,090 that will not use data or network. 21 00:01:44,090 --> 00:01:50,750 For example if you're trying to connect to a captive portal what I mean by a captive foretell is a network 22 00:01:50,870 --> 00:01:57,500 similar to the networks you see in airports universities or coffee shops where once you connect you 23 00:01:57,500 --> 00:02:00,160 have to log in or you have to authenticate. 24 00:02:00,230 --> 00:02:04,460 Now usually the authentication is done using a web browser. 25 00:02:04,460 --> 00:02:11,240 Any web browser will work but the Tor browser will not work because as we know Tor browser will arrived 26 00:02:11,270 --> 00:02:19,750 traffic through the Tor network and therefore you want be able to authenticate with the local network. 27 00:02:19,750 --> 00:02:25,810 Now if you were running the Tor browser from a normal operating system like Linux Windows or OS X the 28 00:02:25,810 --> 00:02:27,380 solution to this is easy. 29 00:02:27,460 --> 00:02:33,340 You just go to one of your other browsers and like I said these will be access and the Internet directly. 30 00:02:33,340 --> 00:02:35,170 So that will be fine. 31 00:02:35,170 --> 00:02:41,030 The problem is as we mentioned Intel's everything is forced to go through the Tor network. 32 00:02:41,050 --> 00:02:46,510 So even if you had another web browser it will be forced to go through the Tor network and therefore 33 00:02:46,600 --> 00:02:50,350 you still won't be able to authenticate with these networks. 34 00:02:50,350 --> 00:02:57,550 Therefore for this reason and for any other cases where you would actually need to access the Internet 35 00:02:57,550 --> 00:03:01,410 directly tells comes with another web browser. 36 00:03:01,510 --> 00:03:09,100 It's actually called the unsafe browser because this is the only application on the operating system 37 00:03:09,340 --> 00:03:18,000 that can make direct connection to the Internet outside of the Tor network so you want to be very very 38 00:03:18,000 --> 00:03:23,400 careful when you're using this and you want to make sure that you know what you're doing because it 39 00:03:23,400 --> 00:03:25,070 is not using detailed network. 40 00:03:25,260 --> 00:03:31,680 It's going to be accessing the Internet directly revealing your location your IP and so on. 41 00:03:32,980 --> 00:03:42,490 So right here unpack a tails and if I go to my Wi-Fi networks and look for a Wi-Fi network you can see 42 00:03:42,490 --> 00:03:45,590 that there is a Starbucks Wi-Fi around me. 43 00:03:45,640 --> 00:03:51,680 So this is a coffee shop network and this is an example of a network that uses a captive portal. 44 00:03:51,760 --> 00:03:58,810 Like I said these networks are commonly used in coffee shops colleges hotels or airports. 45 00:03:59,020 --> 00:04:00,960 So it's all the same scenario. 46 00:04:01,060 --> 00:04:04,260 Once you connect so I'm going to click on it and connect. 47 00:04:04,570 --> 00:04:10,900 You'll see that I will be able to connect to the network but I won't have internet access. 48 00:04:12,130 --> 00:04:16,920 So if I go up here you can see that I am connected to the network. 49 00:04:17,140 --> 00:04:21,780 But as you can see the tour icon right here still has an X beside it. 50 00:04:21,790 --> 00:04:28,900 So I'm not able to connect to the tower network and even if I go and run my Tor Browser As you can see 51 00:04:28,900 --> 00:04:32,210 it's telling me that the Tor network is not ready yet. 52 00:04:32,320 --> 00:04:36,030 So the browser will probably not be able to access the Internet. 53 00:04:36,550 --> 00:04:39,250 And even if you wait for this it's not going to connect. 54 00:04:39,580 --> 00:04:41,910 So I'm going to click on start anyway. 55 00:04:46,360 --> 00:04:50,920 And as you can see nothing will load will be stuck at the welcome page. 56 00:04:50,920 --> 00:04:56,920 And even if you try to go to any Web site it's not going to load because the captive portal needs you 57 00:04:56,920 --> 00:04:58,780 to first authenticate with it. 58 00:04:58,780 --> 00:05:05,890 So this network is configured in a way that the users have to authenticate using a web interface first 59 00:05:07,000 --> 00:05:11,640 see usually on normal operating systems when you launch your browser. 60 00:05:11,830 --> 00:05:19,390 You'll see the authentication web interface the authentication page by default but because Thales is 61 00:05:19,450 --> 00:05:26,470 configured so that it routes all traffic through the network the web interface or the authentication 62 00:05:26,470 --> 00:05:29,200 page is inaccessible to us. 63 00:05:29,950 --> 00:05:36,820 Therefore the only way around this is to go ahead and use the insecure browser which accesses the Internet 64 00:05:36,850 --> 00:05:46,500 directly to do this we're going to go to applications Internet and we're going to click on the unsafe 65 00:05:46,500 --> 00:05:47,730 browser. 66 00:05:47,870 --> 00:05:51,660 It's going to show us a warning telling us that this will access the Internet directly. 67 00:05:51,660 --> 00:05:53,170 You will not be anonymous. 68 00:05:53,220 --> 00:05:54,270 So be careful. 69 00:05:54,450 --> 00:05:56,250 I've explained all this to you. 70 00:05:56,250 --> 00:06:04,060 So we're going to click on launch and as you can see we get another web browser with a big warning again 71 00:06:04,120 --> 00:06:06,590 about the implications of using this browser. 72 00:06:06,880 --> 00:06:09,450 But we know what we're doing so that's fine. 73 00:06:09,490 --> 00:06:16,120 And now you can use this browser similar to the way that you use any web browser on any other operating 74 00:06:16,120 --> 00:06:23,570 system that does not force traffic through the Tor network so you probably already connected such networks 75 00:06:23,600 --> 00:06:25,250 in hotels or airports. 76 00:06:25,250 --> 00:06:30,970 Once you connect to it you open your web browser and you can go to any Web site you want. 77 00:06:31,070 --> 00:06:33,830 For example I'm going to go to Dr. Cole dot com 78 00:06:37,890 --> 00:06:44,880 and as you can see the Web site that I want will not load but I will get the page for the captive portal. 79 00:06:44,970 --> 00:06:47,970 Now some captive portals will ask you for a name and e-mail. 80 00:06:47,970 --> 00:06:49,790 They might ask for your phone number. 81 00:06:49,950 --> 00:06:52,110 You can fill this with any information you want. 82 00:06:52,110 --> 00:06:54,450 You don't have to give valid information. 83 00:06:54,540 --> 00:06:57,410 And once you do this you can click on Connect. 84 00:06:57,480 --> 00:07:01,080 In my case I can just connect without filling any information. 85 00:07:01,230 --> 00:07:04,790 And as you can see I'll get redirected to the Starbucks Web site. 86 00:07:04,830 --> 00:07:09,700 So I got authenticated with the network with the capped portal now. 87 00:07:09,780 --> 00:07:15,030 So now tails should be able to establish a connection with the terror network and the terror browser 88 00:07:15,030 --> 00:07:22,340 should work for us as well and perfect as you can see we get a notification telling us now we can access 89 00:07:22,340 --> 00:07:23,900 the Internet on detail. 90 00:07:23,920 --> 00:07:24,290 Right. 91 00:07:24,290 --> 00:07:26,300 The X has disappeared. 92 00:07:26,300 --> 00:07:33,650 So if I go to check the Tor Project dot org as you can see we get a nice message telling us that we 93 00:07:33,650 --> 00:07:40,630 are connected properly to the TOR network our IP is changed and everything is working as expected. 94 00:07:40,640 --> 00:07:43,670 So now we don't need the unsafe browser anymore. 95 00:07:43,700 --> 00:07:48,680 We can close it because we have authenticated with the target network properly. 96 00:07:48,860 --> 00:07:54,830 And the network is going to allow us to access the Internet and then Thales is going to force all traffic 97 00:07:54,830 --> 00:08:00,530 through the Tor network which is exactly what we want which will improve our privacy and anonymity. 10593

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.