All language subtitles for 5. Connecting to TOR

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,680 --> 00:00:01,140 OK. 2 00:00:01,160 --> 00:00:08,030 So now that we understand that Toure is basically a network of devices connected to each other that 3 00:00:08,030 --> 00:00:12,830 we can use to improve our privacy and anonymity. 4 00:00:12,830 --> 00:00:16,760 The question is how can we connect to this network and use it. 5 00:00:17,810 --> 00:00:20,230 Well the answer is actually very simple. 6 00:00:20,230 --> 00:00:27,410 You can configure your computer regardless of what operating system it uses to rout all traffic through 7 00:00:27,410 --> 00:00:28,630 the Tor network. 8 00:00:28,730 --> 00:00:36,560 And that way hopefully everything will flow through the network protecting your privacy and anonymity. 9 00:00:36,560 --> 00:00:43,430 Sadly though this is not always the case as you probably have a lot of programs that I don't even know 10 00:00:43,430 --> 00:00:53,330 of that could leak information about you potentially revealing your location your IP and more information. 11 00:00:53,330 --> 00:01:00,320 Not only that but you could be running an unpublished version of Windows or Linux or even OSX. 12 00:01:00,440 --> 00:01:06,380 Also your browser could leak information about you even if you think you properly configured it to use 13 00:01:06,380 --> 00:01:07,620 Tor. 14 00:01:07,640 --> 00:01:15,200 Also a lot of us use browser plugins and browser extensions which also could potentially leak information. 15 00:01:15,230 --> 00:01:22,880 And finally we have the exit node problem and the previous lecture I already mentioned that when you 16 00:01:22,880 --> 00:01:31,040 connect to Tor all the data and green in here is sent encrypted and at any time none of the nodes know 17 00:01:31,130 --> 00:01:33,460 what web you want to go to. 18 00:01:33,470 --> 00:01:39,920 They only know the address of the next node so they can forward the data to the next node. 19 00:01:40,010 --> 00:01:48,020 But as I mentioned the Red Arrow in here means the data leaving in here will leave unencrypted unless 20 00:01:48,020 --> 00:01:49,890 he's TTP as is used. 21 00:01:49,910 --> 00:01:57,530 So you'll have to go and manually install TTP as everywhere to force data to be sent over hash TTP as 22 00:01:58,400 --> 00:02:01,130 also we have this node right here. 23 00:02:01,130 --> 00:02:03,640 This is known as the exit node. 24 00:02:03,830 --> 00:02:12,500 And the problem here is anybody can actually configure a computer to work as a node in the Tor network. 25 00:02:12,620 --> 00:02:20,780 And if your computer is an exit node you will be able to see this data leave an unencrypted. 26 00:02:20,900 --> 00:02:23,320 So you have to trust this person. 27 00:02:23,330 --> 00:02:30,550 If you're really using the detour network as they can potentially see everything you do now. 28 00:02:30,560 --> 00:02:37,340 Like I said in the previous lecture if the target's Web site uses hash TTP s or if you're using a plugin 29 00:02:37,520 --> 00:02:45,280 that will force hash TTP connections then this will be okay because the data will be encrypted by SSL 30 00:02:45,280 --> 00:02:48,940 cause he's TTP as encrypts the hash TTP data. 31 00:02:48,970 --> 00:02:50,180 So you'll be fine. 32 00:02:50,330 --> 00:02:55,100 But this is again another step that you have to take and another plug in that you have to install on 33 00:02:55,100 --> 00:03:00,800 your browser in order to make sure that your data is fully encrypted along the way. 34 00:03:00,860 --> 00:03:07,670 And even if someone is able to see this data such as the person running the exit node here or if there 35 00:03:07,670 --> 00:03:13,760 is someone in here intercepting the connection even if they capture the data they will not be able to 36 00:03:13,760 --> 00:03:17,400 read it because it will be encrypted. 37 00:03:17,510 --> 00:03:24,940 So like I said there is a lot of steps to do if you want to configure your computer to use data or network. 38 00:03:25,070 --> 00:03:31,730 And even if you do all of that you could miss a tiny or a small detail that could potentially leak information 39 00:03:31,940 --> 00:03:40,920 and reveal your identity therefore a better solution is to either use the Tor Browser and we'll talk 40 00:03:40,920 --> 00:03:42,780 about that in the next section. 41 00:03:42,780 --> 00:03:50,970 This is a web browser designed by the same people that run the Tor network throughout all the data through 42 00:03:50,970 --> 00:03:52,820 the terror network by default. 43 00:03:52,890 --> 00:04:00,030 It also has a lot of other features to prevent leaking your information and ensuring the data that you 44 00:04:00,030 --> 00:04:03,460 send is always encrypted. 45 00:04:03,480 --> 00:04:10,290 This is the simplest and a good solution a better solution would be to use tells which is a Linux distro 46 00:04:10,590 --> 00:04:14,000 designed for anonymity and privacy. 47 00:04:14,000 --> 00:04:23,190 And the best solution would be use in Cuba so as with Unix Gateway which is an amazing operating system 48 00:04:23,340 --> 00:04:32,670 that is very very secure and also can be configured to use Tor by default improving your security and 49 00:04:32,760 --> 00:04:35,660 anonymity and privacy. 50 00:04:35,710 --> 00:04:41,770 Now we will go over all of this in the next lectures starting with the simplest and easiest and will 51 00:04:41,800 --> 00:04:45,400 and with the more complex but the best approach. 5706

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.