All language subtitles for 041 Tor Pluggable Transports and Traffic Obfuscation-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,550 --> 00:00:08,280 Tor pluggable transport's and of frustration of traffic if you are stuck behind a firewall or a search 2 00:00:08,280 --> 00:00:18,090 device such as the one here on the diagram that blocks pulls you may need to use relays that are open 3 00:00:18,390 --> 00:00:27,510 on port 80 and 443 or whatever ports are allowed by that device that is blocking you usually port 80 4 00:00:27,510 --> 00:00:32,480 and 443 are allowed as that is web traffic. 5 00:00:33,030 --> 00:00:39,450 And if you want to configure your TOR browser to go through a special port to get through that blocking 6 00:00:39,450 --> 00:00:47,520 device you need to go here Tor network settings and we want to go to this computer goes through a firewall 7 00:00:47,520 --> 00:00:55,890 that only allows connections to certain ports and then you want to specify the ports here and click 8 00:00:55,980 --> 00:00:57,240 OK. 9 00:00:57,270 --> 00:01:02,020 There are less relays that run on specific ports. 10 00:01:02,160 --> 00:01:09,390 So you may have trouble with your network connection if you specify some strange or unusual port but 11 00:01:09,420 --> 00:01:11,710 18:4 4:03 should be OK. 12 00:01:11,850 --> 00:01:14,290 But it may be slower. 13 00:01:14,430 --> 00:01:22,890 Another way that Torres blocks is through deep packet inspection or DP and active network analysis. 14 00:01:22,890 --> 00:01:30,690 This is because it's possible to identify ordinary Tor traffic based on byte patterns that appear in 15 00:01:30,690 --> 00:01:31,500 it. 16 00:01:31,500 --> 00:01:37,390 DPMI is probably Tor's greatest nemesis for blocking Tor. 17 00:01:37,410 --> 00:01:45,360 In fact DPR is the best defense for anyone trying to stop traffic that they don't want a number of countries 18 00:01:45,660 --> 00:01:46,760 are using. 19 00:01:46,870 --> 00:01:53,880 Deepak inspection GPI to classify Internet traffic flows by protocol. 20 00:01:53,880 --> 00:02:03,960 For example in 2011 the Great Firewall of China developed the ability to actively detect Tor Tor users 21 00:02:04,200 --> 00:02:11,060 bridge relays to get around a sensor that blocks known relays IP addresses. 22 00:02:11,060 --> 00:02:20,070 But a sensor that uses deep pack inspection to recognize and filter Tor traffic flows can if they see 23 00:02:20,070 --> 00:02:29,940 the traffic the Tor traffic block the connection standard toll bridges don't solve this problem. 24 00:02:29,970 --> 00:02:37,980 Bought something called pluggable transport's attempt to mitigate the blocking of toll through the packet 25 00:02:37,980 --> 00:02:39,330 inspection. 26 00:02:39,420 --> 00:02:45,660 Transports transformed the Tor traffic flow between the client and the bridge. 27 00:02:45,660 --> 00:02:50,870 If you see here this is what ordinary Tor traffic looks like. 28 00:02:50,880 --> 00:02:55,700 This is what all traffic looks like when it has been put through a pluggable transport. 29 00:02:55,710 --> 00:02:59,320 In this case it's the Avs to pluggable transport. 30 00:02:59,520 --> 00:03:02,650 And this is the AABs three pluggable transport. 31 00:03:02,730 --> 00:03:10,710 The traffic signature or fingerprint is changed from the ordinary Tor traffic to something else based 32 00:03:10,800 --> 00:03:12,460 on the pluggable transport. 33 00:03:12,630 --> 00:03:20,100 This way censors who monitor traffic between the client and the bridge will see innocent looking transform 34 00:03:20,100 --> 00:03:23,500 traffic instead of the actual Tor traffic. 35 00:03:23,790 --> 00:03:30,960 External programs can talk to talk clients and toll bridges using the pluggable transport API to make 36 00:03:30,960 --> 00:03:35,330 it easier to build interoperable programs. 37 00:03:36,210 --> 00:03:43,900 And here are some of luggable transports jobs proxy flash proxy F.T. scrambles Swee me. 38 00:03:44,160 --> 00:03:51,150 Obs for some transports trying to make the traffic look like another protocol and others try to make 39 00:03:51,150 --> 00:04:00,540 it look random and some transports are aimed at evading IP based blocks rather than content based blocks 40 00:04:00,560 --> 00:04:00,960 . 41 00:04:01,290 --> 00:04:03,080 So there's pluggable transport sounds cool. 42 00:04:03,090 --> 00:04:08,520 How do we can figure out browser to use pluggable transport's here. 43 00:04:08,850 --> 00:04:15,380 Tor network settings and select my internet service provider ISP blocks connections to the Tor network 44 00:04:16,680 --> 00:04:25,110 then select connect with provided bridges and there you have your different pluggable transport's the 45 00:04:25,110 --> 00:04:32,340 pluggable transport must be supported by the bridge or relays that you connect to no one transport will 46 00:04:32,340 --> 00:04:33,600 solve the problem. 47 00:04:33,660 --> 00:04:40,410 The transports need to be variable and evolve as detection evolves. 48 00:04:40,410 --> 00:04:48,410 They need to look plausible but extra scrutiny by sensor will likely reveal what it is. 49 00:04:48,510 --> 00:04:52,110 But the idea is to get past the initial scrutiny. 50 00:04:52,110 --> 00:04:58,400 You could set a pluggable transfer on your own bridge and for example if you look here weve got meek 51 00:04:58,400 --> 00:04:58,520 . 52 00:04:58,530 --> 00:05:00,230 Amazon Meeke Google. 53 00:05:00,240 --> 00:05:09,170 If you were to use that this would look like you are connecting to Google and on and or Amazon. 54 00:05:09,210 --> 00:05:17,940 The idea here is that the sensor will find it hard to block the IP address associated with Amazon and 55 00:05:17,940 --> 00:05:25,710 Amazon services because obviously this is used by that company and it will be used for non Tor use as 56 00:05:25,710 --> 00:05:31,830 well which means wholesale blocking of those IP addresses could be a problem for the user community 57 00:05:31,920 --> 00:05:37,730 that the sensor is serving where you can see here is ordinary Tor. 58 00:05:37,920 --> 00:05:43,380 And this is a hex dump of the first thing that our client sends to it. 59 00:05:43,420 --> 00:05:52,140 And you know it's a tier less client hello message as the outer layer of the Tor protocol is in fact 60 00:05:52,170 --> 00:05:53,170 TLR. 61 00:05:53,280 --> 00:05:56,990 Here you can see the safest list in blue. 62 00:05:57,000 --> 00:06:02,910 The server name in green and the T.L. as extensions in this brown color. 63 00:06:02,910 --> 00:06:06,380 This is a de-code from Wireshark. 64 00:06:06,390 --> 00:06:17,580 This does not look the same as say Firefox or chrome connecting to a Web site via Haiti CPS using TLR 65 00:06:17,720 --> 00:06:17,940 . 66 00:06:18,030 --> 00:06:27,360 Which is why deep packet inspection can tell you are using Tor or is one method by which Deepak inspection 67 00:06:27,360 --> 00:06:30,260 can tell that you are using Tor. 68 00:06:30,900 --> 00:06:32,650 And here on the left we can see a client. 69 00:06:32,670 --> 00:06:33,200 Hello. 70 00:06:33,240 --> 00:06:35,810 Using the pulley will transport Meek. 71 00:06:35,910 --> 00:06:43,010 And on the right we can see a client hello of chrome 33 on Mac OSX. 72 00:06:43,110 --> 00:06:51,750 Is trying to pretend to look the same or at least similar enough so that DPMI doesn't flag it as being 73 00:06:51,750 --> 00:06:59,730 a problem as we can see one of the big differences is that Chrome is supporting 20 ciphers suites and 74 00:06:59,730 --> 00:07:01,770 me only 13. 75 00:07:01,830 --> 00:07:06,260 So it's these sort of differences that somebody using the API. 76 00:07:06,390 --> 00:07:12,930 And even with pluggable transports with closer examination they can tell that something is amiss. 77 00:07:13,020 --> 00:07:15,270 It is an OPSEC principle to be on. 78 00:07:15,270 --> 00:07:16,270 Interesting. 79 00:07:16,410 --> 00:07:24,840 And using anonymous bridges with a pro-global transport could make you on interesting on till the traffic 80 00:07:24,840 --> 00:07:28,470 is analyzed then you become more interesting. 81 00:07:28,500 --> 00:07:32,460 If getting caught for using Tor has serious consequences. 82 00:07:32,610 --> 00:07:37,140 Toll bridges and pluggable transports are not recommended. 83 00:07:37,140 --> 00:07:45,030 They are only short term work arounds and any adversary sophistication will identify that you are using 84 00:07:45,030 --> 00:07:45,550 them. 85 00:07:45,570 --> 00:07:52,860 If they start to pay closer examination to the traffic as I have illustrated other options to bypass 86 00:07:52,890 --> 00:08:00,270 toll being blocked which might be safer include tunneling tore through all the privacy and anonymity 87 00:08:00,270 --> 00:08:01,160 services. 88 00:08:01,230 --> 00:08:06,290 As I've already said like VPN is nested VPN is S-sh. 89 00:08:06,390 --> 00:08:14,190 Assuming they are allowed or they are viable where you are or using offsite locations or potentially 90 00:08:14,280 --> 00:08:19,710 mobile communication all of which rediscuss in it's own section 9827

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.