Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,920 --> 00:00:09,260
So what is store tour is short for the onion router and it's basically a network of computers or servers
2
00:00:09,530 --> 00:00:13,850
designed to improve anonymity and privacy.
3
00:00:13,910 --> 00:00:21,290
It's the most common and an amazing network with the most amount of users and it also allows connected
4
00:00:21,290 --> 00:00:25,970
users to offer hidden services or online services.
5
00:00:25,970 --> 00:00:32,900
So these are basically deep net or darknet Web sites and that's what most people refer to when they're
6
00:00:32,900 --> 00:00:36,410
talking about darknet or the deep net Web sites.
7
00:00:36,500 --> 00:00:44,390
Even though it could mean many other anon amazing networks and hidden services networks I should also
8
00:00:44,390 --> 00:00:48,740
note that Tor relies on online routing.
9
00:00:48,740 --> 00:00:56,990
This is a technique that was designed by the US Army in order to protect their intelligence communications.
10
00:00:56,990 --> 00:01:01,310
You might want to use Tor even if you don't want to access the deep net.
11
00:01:01,340 --> 00:01:07,930
You can literally just use it if you want to protect your privacy and anonymity.
12
00:01:08,210 --> 00:01:14,680
So while you might want to do that well let's see what happens when you connect to our Web site.
13
00:01:14,780 --> 00:01:20,540
So let's say for example you open your browser and you navigate to Google dot com or Facebook dot com
14
00:01:21,020 --> 00:01:24,550
by default without really doing or trying anything.
15
00:01:24,620 --> 00:01:31,250
These Web sites will be able to see your location your browser version your operating system and much
16
00:01:31,250 --> 00:01:32,760
more information.
17
00:01:32,990 --> 00:01:39,090
And it doesn't stop there for example because you use google to search for a lot of things.
18
00:01:39,140 --> 00:01:46,140
Google can see everything you search right now and even everything that you searched before.
19
00:01:46,220 --> 00:01:50,740
Not only that but again big Web sites such as Google and Facebook.
20
00:01:50,870 --> 00:01:58,070
They can even potentially access your activity outside of these Web sites.
21
00:01:58,160 --> 00:02:02,610
They use this relying on the features they offer to other Web sites.
22
00:02:02,720 --> 00:02:08,210
For example any Web site that would have a Google or a Facebook share button would have a piece of code
23
00:02:08,210 --> 00:02:11,800
from Google or from Facebook running on their Web site.
24
00:02:11,810 --> 00:02:17,160
And again Google and Facebook use this code in order to see which websites you visit.
25
00:02:17,330 --> 00:02:23,270
And obviously they use that in order to serve you ads related to you we all know that you search for
26
00:02:23,270 --> 00:02:27,650
something and you start seeing it everywhere else but it doesn't stop there.
27
00:02:27,650 --> 00:02:34,220
We've all read the Cambridge analytics scandal and how they were able to access private information
28
00:02:34,280 --> 00:02:36,140
about Facebook users.
29
00:02:36,140 --> 00:02:38,880
And it doesn't even stop at this.
30
00:02:38,930 --> 00:02:46,430
There are several reports reporting that Web sites such as Facebook creates ghost profiles so profiles
31
00:02:46,430 --> 00:02:50,600
for people that don't even have a Facebook account.
32
00:02:50,660 --> 00:02:53,890
So you might think OK I don't have a Facebook account.
33
00:02:53,900 --> 00:02:55,490
They can't really track me.
34
00:02:55,490 --> 00:03:02,480
No they still probably have a profile about you because like I said any Web site that you visit that
35
00:03:02,480 --> 00:03:09,130
has a Facebook like button or a Facebook share button will collect data about you.
36
00:03:09,200 --> 00:03:11,420
And Facebook is not going to stop there.
37
00:03:11,420 --> 00:03:13,130
They will create a profile.
38
00:03:13,130 --> 00:03:19,400
They'll add some name to it or some identity to it and they'll have all the things related to you what
39
00:03:19,400 --> 00:03:21,890
you like what websites you visit.
40
00:03:21,920 --> 00:03:24,050
What did you purchase recently.
41
00:03:24,100 --> 00:03:32,010
And one this is only what's been reported so you can only imagine what's happening without getting caught.
42
00:03:32,030 --> 00:03:37,380
And without being reported so what's the solution.
43
00:03:37,380 --> 00:03:41,010
Well Toure is actually a pretty good solution to prevent this.
44
00:03:41,490 --> 00:03:50,370
So when you connect to Tor you can imagine Toure being this really big network and it has a large number
45
00:03:50,400 --> 00:03:57,190
of servers so each circle in here is literally server and detour network.
46
00:03:57,660 --> 00:04:02,820
So you'll connect to tour and let's say you want to go to Google dot com.
47
00:04:02,820 --> 00:04:09,270
What's going to happen is your request is going to bounce over three different servers or three different
48
00:04:09,330 --> 00:04:13,590
nodes before it goes to Google.
49
00:04:13,590 --> 00:04:21,990
So Google can only see the last node or the last server or the last computer that the request was sent
50
00:04:21,990 --> 00:04:22,830
from.
51
00:04:22,890 --> 00:04:27,230
It can't see you or the original user.
52
00:04:27,240 --> 00:04:30,180
Keep in mind that these servers are shared.
53
00:04:30,180 --> 00:04:36,120
So at any point of time there would be millions of users using data or network.
54
00:04:36,120 --> 00:04:40,320
So there would be lots of requests going in and out of each node.
55
00:04:40,320 --> 00:04:45,780
So when you're going into this node you're not the only user access in this node so there are lots of
56
00:04:45,780 --> 00:04:48,260
requests coming in and out of here.
57
00:04:48,300 --> 00:04:51,370
Same in here and same in here.
58
00:04:51,390 --> 00:04:58,380
So this node could potentially be sending thousands of requests out to a number of Web sites.
59
00:04:58,380 --> 00:05:06,390
Therefore wherever Web site these requests are going to it is very hard for it to profile that request
60
00:05:06,450 --> 00:05:10,000
or to know where that request came from.
61
00:05:10,110 --> 00:05:18,290
Also that sent within the Tor network is always encrypted so you can see the green arrows in here.
62
00:05:18,360 --> 00:05:26,580
These represent encrypted data and the only two times where your data is sent unencrypted is the Red
63
00:05:26,580 --> 00:05:27,270
Arrows.
64
00:05:27,300 --> 00:05:34,530
So it's when you try to send something to the terror network and it's when data leave the Tor network
65
00:05:35,750 --> 00:05:43,870
this arrow right here is not very important because if the Target's website uses hash TTP as or if you're
66
00:05:43,890 --> 00:05:51,480
using a browser plugin that forces a TTP as then this data right here will be encrypted by hasty CPS
67
00:05:51,510 --> 00:05:52,500
by SSL.
68
00:05:53,100 --> 00:06:00,820
So the only point where your data is sent unencrypted is when you're sending data to tour.
69
00:06:00,980 --> 00:06:08,780
Also keep in mind whenever you're sending data to Tor even to your Internet service provider they can
70
00:06:08,780 --> 00:06:14,390
see that you're trying to access tor but they want to be able to see the Web sites you're trying to
71
00:06:14,390 --> 00:06:15,150
access.
72
00:06:15,200 --> 00:06:20,750
So all they'll be able to see is this person right here is trying to access tor but they won't really
73
00:06:20,750 --> 00:06:24,740
be able to see that you're trying to go to Google dot com.
74
00:06:24,740 --> 00:06:30,380
So even if there was a hacker or even if there was censorship in place then you really want to be able
75
00:06:30,380 --> 00:06:32,580
to see which websites you're going to.
76
00:06:32,690 --> 00:06:36,740
They'll only be able to see that your access in detail network.
8292
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.