All language subtitles for 6. TOR Bridges _ Pluggable Transports

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,170 --> 00:00:01,620 OK. 2 00:00:01,650 --> 00:00:08,440 So now that we have Tor Browser installed let us go ahead and make sure that it's working as expected 3 00:00:08,680 --> 00:00:13,630 and is routing all of the traffic through the Tor network. 4 00:00:13,690 --> 00:00:20,650 Now I'm going to be using detailed browser on Windows but as seen before the interface is identical 5 00:00:20,650 --> 00:00:24,630 on Windows Linux and OS X the installation is different. 6 00:00:24,640 --> 00:00:28,650 And I showed you how to install it on all of these operating systems. 7 00:00:28,690 --> 00:00:34,480 So once it's installed using the browser is exactly the same. 8 00:00:34,480 --> 00:00:37,090 So I'm going to double click the launcher 9 00:00:40,160 --> 00:00:46,370 and as you can see you get a normal browser window and don't maximize this window ever. 10 00:00:46,400 --> 00:00:52,490 And I'll talk about that later but for now just to check to make sure that Tor is working. 11 00:00:52,490 --> 00:00:56,800 I'm gonna go to check that Tor Project dot org 12 00:00:59,590 --> 00:01:02,160 and as you can see it's saying congratulations. 13 00:01:02,170 --> 00:01:10,840 This browser is configured to use tour and it's given us the IP that our browser appears to be coming 14 00:01:10,840 --> 00:01:11,230 from. 15 00:01:11,230 --> 00:01:13,300 So this is not my real IP. 16 00:01:13,300 --> 00:01:17,560 This is the IP that I will appear that I'm coming from. 17 00:01:18,340 --> 00:01:24,540 So this is all perfect and I'll talk about more tor settings in a future lecture. 18 00:01:25,120 --> 00:01:29,770 But right now I want to show you how to bypass tor being blocked. 19 00:01:30,010 --> 00:01:37,480 So in case you came to this Web site and it didn't load or if you so a warning here say in tour is not 20 00:01:37,480 --> 00:01:45,370 working then this could be because your network administrator or your Internet service provider is blocking 21 00:01:45,370 --> 00:01:47,930 you from using Tor. 22 00:01:48,250 --> 00:01:55,460 See when you tried to access tor as I mentioned before the first thing you'll have to do is connect 23 00:01:55,490 --> 00:02:02,030 to the TOR network and send your traffic to a random TOR node so you're going to pick one of these nodes 24 00:02:02,390 --> 00:02:07,370 and you're going to send your traffic through it as the first node. 25 00:02:07,400 --> 00:02:15,410 The problem is before you can actually connect and send data to this node your data can easily be intercepted 26 00:02:15,650 --> 00:02:24,820 by your network administrator or your Internet service provider before it even reaches the first node. 27 00:02:24,890 --> 00:02:29,520 And before it's even able to connect to the TOR network. 28 00:02:29,600 --> 00:02:38,300 So what your Internet service provider or ISP can do is they could identify all the available tor nodes 29 00:02:38,300 --> 00:02:43,080 right here the white circles because they are publicly available. 30 00:02:43,220 --> 00:02:49,040 And then just block them all prevents you from connecting to any of these wide circles. 31 00:02:49,490 --> 00:02:55,070 So therefore whenever you try to connect to Tor your person by Internet service provider which is running 32 00:02:55,070 --> 00:03:02,210 a firewall checking if you're trying to connect to any of these nodes and if you are to block your connection 33 00:03:03,110 --> 00:03:09,560 the result of this is when you come in to load this page it will either not load or it's going to tell 34 00:03:09,560 --> 00:03:17,400 you that you're not using the Tor network a simple solution to this is to use at Tower Bridge as the 35 00:03:17,400 --> 00:03:21,340 first node what we mean by Todd Bridges. 36 00:03:21,340 --> 00:03:26,100 They are normal nodes similar to all the white circles that we can see in here. 37 00:03:26,320 --> 00:03:29,790 But they are not publicly available. 38 00:03:29,860 --> 00:03:37,000 So the only way that the Internet service provider was able to block us is because they know all the 39 00:03:37,000 --> 00:03:43,480 white circles they know all the public nodes and they have a rule in their firewall to prevent any user 40 00:03:43,540 --> 00:03:47,170 from connecting to any of these white circles. 41 00:03:47,170 --> 00:03:53,200 So to bypass this we can't just use a node that is not publicly available. 42 00:03:53,200 --> 00:04:00,520 It's not being advertised that way when we try to connect to it the Internet service provider will not 43 00:04:00,520 --> 00:04:07,150 have this node in its list and therefore we can connect to it and then continue using Tor going out 44 00:04:07,180 --> 00:04:12,810 to another Web site or even going in and accessing an online service. 45 00:04:12,830 --> 00:04:20,780 So this is pretty good it's a pretty good solution until firewalls and service providers became smarter 46 00:04:20,810 --> 00:04:28,190 and implemented more advanced methods what they started doing is they started using deep packet filtering 47 00:04:28,340 --> 00:04:37,640 or what's known as the API to identify towards traffic and block it so they don't even care about which 48 00:04:37,640 --> 00:04:39,490 node you're trying to connect to. 49 00:04:39,500 --> 00:04:46,970 They started analyzing all traffic that you sent out of your computer and they managed to identify what 50 00:04:46,970 --> 00:04:49,400 Tor traffic looks like. 51 00:04:49,400 --> 00:04:56,690 So like I said before when you use Tor they can't really see which websites you're trying to go to but 52 00:04:56,930 --> 00:05:03,800 they'll be able to see that you're trying to use the Tor network either by identifying the note that 53 00:05:03,800 --> 00:05:10,250 you're trying to connect to or by using deep packet filtering which will tell them that the traffic 54 00:05:10,250 --> 00:05:14,060 of this user match is a signature of Tor traffic. 55 00:05:14,060 --> 00:05:16,330 Therefore this user is using tour. 56 00:05:16,370 --> 00:05:25,440 Therefore we will block this traffic so the solution to this is to use applicable transport plug all 57 00:05:25,460 --> 00:05:31,780 transport will try to make your traffic look similar to any other normal traffic. 58 00:05:32,410 --> 00:05:39,040 So when you're trying to connect to a bridge we're going to use a bridge that can use applicable transport 59 00:05:39,460 --> 00:05:45,160 and this way all the traffic that we're going to send will not look like Tor traffic. 60 00:05:45,200 --> 00:05:51,070 It will look similar to traffic that's generated when you're trying to access Google or Facebook or 61 00:05:51,070 --> 00:05:56,290 any other Web site similar to any normal web traffic. 62 00:05:56,370 --> 00:05:58,280 Now this is a pretty good solution. 63 00:05:58,290 --> 00:06:03,870 It will work in many cases but it can still fail in some instances. 64 00:06:04,140 --> 00:06:10,290 But the worst case scenario even if it fails the Internet service provider will be able to know that 65 00:06:10,290 --> 00:06:16,690 you're using tour but again they won't really know which websites you're trying to access unless they're 66 00:06:16,690 --> 00:06:20,670 on a more sophisticated attack. 67 00:06:20,750 --> 00:06:24,470 Now keep in mind this will slow down your connection. 68 00:06:24,590 --> 00:06:31,790 So if you were able to browse this page and still knew that everything is working then maybe you don't. 69 00:06:31,790 --> 00:06:33,500 You shouldn't really use them. 70 00:06:33,500 --> 00:06:40,910 It really depends on your case and in the next lecture I'm going to show you how to configure Tor to 71 00:06:40,910 --> 00:06:47,690 use a bridge with a local transport to access the Tor network even if it's being blocked. 8123

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.