All language subtitles for 3. Introduction to TOR

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,920 --> 00:00:09,260 So what is store tour is short for the onion router and it's basically a network of computers or servers 2 00:00:09,530 --> 00:00:13,850 designed to improve anonymity and privacy. 3 00:00:13,910 --> 00:00:21,290 It's the most common and an amazing network with the most amount of users and it also allows connected 4 00:00:21,290 --> 00:00:25,970 users to offer hidden services or online services. 5 00:00:25,970 --> 00:00:32,900 So these are basically deep net or darknet Web sites and that's what most people refer to when they're 6 00:00:32,900 --> 00:00:36,410 talking about darknet or the deep net Web sites. 7 00:00:36,500 --> 00:00:44,390 Even though it could mean many other anon amazing networks and hidden services networks I should also 8 00:00:44,390 --> 00:00:48,740 note that Tor relies on online routing. 9 00:00:48,740 --> 00:00:56,990 This is a technique that was designed by the US Army in order to protect their intelligence communications. 10 00:00:56,990 --> 00:01:01,310 You might want to use Tor even if you don't want to access the deep net. 11 00:01:01,340 --> 00:01:07,930 You can literally just use it if you want to protect your privacy and anonymity. 12 00:01:08,210 --> 00:01:14,680 So while you might want to do that well let's see what happens when you connect to our Web site. 13 00:01:14,780 --> 00:01:20,540 So let's say for example you open your browser and you navigate to Google dot com or Facebook dot com 14 00:01:21,020 --> 00:01:24,550 by default without really doing or trying anything. 15 00:01:24,620 --> 00:01:31,250 These Web sites will be able to see your location your browser version your operating system and much 16 00:01:31,250 --> 00:01:32,760 more information. 17 00:01:32,990 --> 00:01:39,090 And it doesn't stop there for example because you use google to search for a lot of things. 18 00:01:39,140 --> 00:01:46,140 Google can see everything you search right now and even everything that you searched before. 19 00:01:46,220 --> 00:01:50,740 Not only that but again big Web sites such as Google and Facebook. 20 00:01:50,870 --> 00:01:58,070 They can even potentially access your activity outside of these Web sites. 21 00:01:58,160 --> 00:02:02,610 They use this relying on the features they offer to other Web sites. 22 00:02:02,720 --> 00:02:08,210 For example any Web site that would have a Google or a Facebook share button would have a piece of code 23 00:02:08,210 --> 00:02:11,800 from Google or from Facebook running on their Web site. 24 00:02:11,810 --> 00:02:17,160 And again Google and Facebook use this code in order to see which websites you visit. 25 00:02:17,330 --> 00:02:23,270 And obviously they use that in order to serve you ads related to you we all know that you search for 26 00:02:23,270 --> 00:02:27,650 something and you start seeing it everywhere else but it doesn't stop there. 27 00:02:27,650 --> 00:02:34,220 We've all read the Cambridge analytics scandal and how they were able to access private information 28 00:02:34,280 --> 00:02:36,140 about Facebook users. 29 00:02:36,140 --> 00:02:38,880 And it doesn't even stop at this. 30 00:02:38,930 --> 00:02:46,430 There are several reports reporting that Web sites such as Facebook creates ghost profiles so profiles 31 00:02:46,430 --> 00:02:50,600 for people that don't even have a Facebook account. 32 00:02:50,660 --> 00:02:53,890 So you might think OK I don't have a Facebook account. 33 00:02:53,900 --> 00:02:55,490 They can't really track me. 34 00:02:55,490 --> 00:03:02,480 No they still probably have a profile about you because like I said any Web site that you visit that 35 00:03:02,480 --> 00:03:09,130 has a Facebook like button or a Facebook share button will collect data about you. 36 00:03:09,200 --> 00:03:11,420 And Facebook is not going to stop there. 37 00:03:11,420 --> 00:03:13,130 They will create a profile. 38 00:03:13,130 --> 00:03:19,400 They'll add some name to it or some identity to it and they'll have all the things related to you what 39 00:03:19,400 --> 00:03:21,890 you like what websites you visit. 40 00:03:21,920 --> 00:03:24,050 What did you purchase recently. 41 00:03:24,100 --> 00:03:32,010 And one this is only what's been reported so you can only imagine what's happening without getting caught. 42 00:03:32,030 --> 00:03:37,380 And without being reported so what's the solution. 43 00:03:37,380 --> 00:03:41,010 Well Toure is actually a pretty good solution to prevent this. 44 00:03:41,490 --> 00:03:50,370 So when you connect to Tor you can imagine Toure being this really big network and it has a large number 45 00:03:50,400 --> 00:03:57,190 of servers so each circle in here is literally server and detour network. 46 00:03:57,660 --> 00:04:02,820 So you'll connect to tour and let's say you want to go to Google dot com. 47 00:04:02,820 --> 00:04:09,270 What's going to happen is your request is going to bounce over three different servers or three different 48 00:04:09,330 --> 00:04:13,590 nodes before it goes to Google. 49 00:04:13,590 --> 00:04:21,990 So Google can only see the last node or the last server or the last computer that the request was sent 50 00:04:21,990 --> 00:04:22,830 from. 51 00:04:22,890 --> 00:04:27,230 It can't see you or the original user. 52 00:04:27,240 --> 00:04:30,180 Keep in mind that these servers are shared. 53 00:04:30,180 --> 00:04:36,120 So at any point of time there would be millions of users using data or network. 54 00:04:36,120 --> 00:04:40,320 So there would be lots of requests going in and out of each node. 55 00:04:40,320 --> 00:04:45,780 So when you're going into this node you're not the only user access in this node so there are lots of 56 00:04:45,780 --> 00:04:48,260 requests coming in and out of here. 57 00:04:48,300 --> 00:04:51,370 Same in here and same in here. 58 00:04:51,390 --> 00:04:58,380 So this node could potentially be sending thousands of requests out to a number of Web sites. 59 00:04:58,380 --> 00:05:06,390 Therefore wherever Web site these requests are going to it is very hard for it to profile that request 60 00:05:06,450 --> 00:05:10,000 or to know where that request came from. 61 00:05:10,110 --> 00:05:18,290 Also that sent within the Tor network is always encrypted so you can see the green arrows in here. 62 00:05:18,360 --> 00:05:26,580 These represent encrypted data and the only two times where your data is sent unencrypted is the Red 63 00:05:26,580 --> 00:05:27,270 Arrows. 64 00:05:27,300 --> 00:05:34,530 So it's when you try to send something to the terror network and it's when data leave the Tor network 65 00:05:35,750 --> 00:05:43,870 this arrow right here is not very important because if the Target's website uses hash TTP as or if you're 66 00:05:43,890 --> 00:05:51,480 using a browser plugin that forces a TTP as then this data right here will be encrypted by hasty CPS 67 00:05:51,510 --> 00:05:52,500 by SSL. 68 00:05:53,100 --> 00:06:00,820 So the only point where your data is sent unencrypted is when you're sending data to tour. 69 00:06:00,980 --> 00:06:08,780 Also keep in mind whenever you're sending data to Tor even to your Internet service provider they can 70 00:06:08,780 --> 00:06:14,390 see that you're trying to access tor but they want to be able to see the Web sites you're trying to 71 00:06:14,390 --> 00:06:15,150 access. 72 00:06:15,200 --> 00:06:20,750 So all they'll be able to see is this person right here is trying to access tor but they won't really 73 00:06:20,750 --> 00:06:24,740 be able to see that you're trying to go to Google dot com. 74 00:06:24,740 --> 00:06:30,380 So even if there was a hacker or even if there was censorship in place then you really want to be able 75 00:06:30,380 --> 00:06:32,580 to see which websites you're going to. 76 00:06:32,690 --> 00:06:36,740 They'll only be able to see that your access in detail network. 8292

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.