All language subtitles for 041 Tor Pluggable Transports and Traffic Obfuscation-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,550 --> 00:00:08,280 Tor pluggable transport's and of frustration of traffic if you are stuck behind a firewall or a search 2 00:00:08,280 --> 00:00:18,090 device such as the one here on the diagram that blocks pulls you may need to use relays that are open 3 00:00:18,390 --> 00:00:27,510 on port 80 and 443 or whatever ports are allowed by that device that is blocking you usually port 80 4 00:00:27,510 --> 00:00:32,480 and 443 are allowed as that is web traffic. 5 00:00:33,030 --> 00:00:39,450 And if you want to configure your TOR browser to go through a special port to get through that blocking 6 00:00:39,450 --> 00:00:47,520 device you need to go here Tor network settings and we want to go to this computer goes through a firewall 7 00:00:47,520 --> 00:00:55,890 that only allows connections to certain ports and then you want to specify the ports here and click 8 00:00:55,980 --> 00:00:57,240 OK. 9 00:00:57,270 --> 00:01:02,020 There are less relays that run on specific ports. 10 00:01:02,160 --> 00:01:09,390 So you may have trouble with your network connection if you specify some strange or unusual port but 11 00:01:09,420 --> 00:01:11,710 18:4 4:03 should be OK. 12 00:01:11,850 --> 00:01:14,290 But it may be slower. 13 00:01:14,430 --> 00:01:22,890 Another way that Torres blocks is through deep packet inspection or DP and active network analysis. 14 00:01:22,890 --> 00:01:30,690 This is because it's possible to identify ordinary Tor traffic based on byte patterns that appear in 15 00:01:30,690 --> 00:01:31,500 it. 16 00:01:31,500 --> 00:01:37,390 DPMI is probably Tor's greatest nemesis for blocking Tor. 17 00:01:37,410 --> 00:01:45,360 In fact DPR is the best defense for anyone trying to stop traffic that they don't want a number of countries 18 00:01:45,660 --> 00:01:46,760 are using. 19 00:01:46,870 --> 00:01:53,880 Deepak inspection GPI to classify Internet traffic flows by protocol. 20 00:01:53,880 --> 00:02:03,960 For example in 2011 the Great Firewall of China developed the ability to actively detect Tor Tor users 21 00:02:04,200 --> 00:02:11,060 bridge relays to get around a sensor that blocks known relays IP addresses. 22 00:02:11,060 --> 00:02:20,070 But a sensor that uses deep pack inspection to recognize and filter Tor traffic flows can if they see 23 00:02:20,070 --> 00:02:29,940 the traffic the Tor traffic block the connection standard toll bridges don't solve this problem. 24 00:02:29,970 --> 00:02:37,980 Bought something called pluggable transport's attempt to mitigate the blocking of toll through the packet 25 00:02:37,980 --> 00:02:39,330 inspection. 26 00:02:39,420 --> 00:02:45,660 Transports transformed the Tor traffic flow between the client and the bridge. 27 00:02:45,660 --> 00:02:50,870 If you see here this is what ordinary Tor traffic looks like. 28 00:02:50,880 --> 00:02:55,700 This is what all traffic looks like when it has been put through a pluggable transport. 29 00:02:55,710 --> 00:02:59,320 In this case it's the Avs to pluggable transport. 30 00:02:59,520 --> 00:03:02,650 And this is the AABs three pluggable transport. 31 00:03:02,730 --> 00:03:10,710 The traffic signature or fingerprint is changed from the ordinary Tor traffic to something else based 32 00:03:10,800 --> 00:03:12,460 on the pluggable transport. 33 00:03:12,630 --> 00:03:20,100 This way censors who monitor traffic between the client and the bridge will see innocent looking transform 34 00:03:20,100 --> 00:03:23,500 traffic instead of the actual Tor traffic. 35 00:03:23,790 --> 00:03:30,960 External programs can talk to talk clients and toll bridges using the pluggable transport API to make 36 00:03:30,960 --> 00:03:35,330 it easier to build interoperable programs. 37 00:03:36,210 --> 00:03:43,900 And here are some of luggable transports jobs proxy flash proxy F.T. scrambles Swee me. 38 00:03:44,160 --> 00:03:51,150 Obs for some transports trying to make the traffic look like another protocol and others try to make 39 00:03:51,150 --> 00:04:00,540 it look random and some transports are aimed at evading IP based blocks rather than content based blocks 40 00:04:00,560 --> 00:04:00,960 . 41 00:04:01,290 --> 00:04:03,080 So there's pluggable transport sounds cool. 42 00:04:03,090 --> 00:04:08,520 How do we can figure out browser to use pluggable transport's here. 43 00:04:08,850 --> 00:04:15,380 Tor network settings and select my internet service provider ISP blocks connections to the Tor network 44 00:04:16,680 --> 00:04:25,110 then select connect with provided bridges and there you have your different pluggable transport's the 45 00:04:25,110 --> 00:04:32,340 pluggable transport must be supported by the bridge or relays that you connect to no one transport will 46 00:04:32,340 --> 00:04:33,600 solve the problem. 47 00:04:33,660 --> 00:04:40,410 The transports need to be variable and evolve as detection evolves. 48 00:04:40,410 --> 00:04:48,410 They need to look plausible but extra scrutiny by sensor will likely reveal what it is. 49 00:04:48,510 --> 00:04:52,110 But the idea is to get past the initial scrutiny. 50 00:04:52,110 --> 00:04:58,400 You could set a pluggable transfer on your own bridge and for example if you look here weve got meek 51 00:04:58,400 --> 00:04:58,520 . 52 00:04:58,530 --> 00:05:00,230 Amazon Meeke Google. 53 00:05:00,240 --> 00:05:09,170 If you were to use that this would look like you are connecting to Google and on and or Amazon. 54 00:05:09,210 --> 00:05:17,940 The idea here is that the sensor will find it hard to block the IP address associated with Amazon and 55 00:05:17,940 --> 00:05:25,710 Amazon services because obviously this is used by that company and it will be used for non Tor use as 56 00:05:25,710 --> 00:05:31,830 well which means wholesale blocking of those IP addresses could be a problem for the user community 57 00:05:31,920 --> 00:05:37,730 that the sensor is serving where you can see here is ordinary Tor. 58 00:05:37,920 --> 00:05:43,380 And this is a hex dump of the first thing that our client sends to it. 59 00:05:43,420 --> 00:05:52,140 And you know it's a tier less client hello message as the outer layer of the Tor protocol is in fact 60 00:05:52,170 --> 00:05:53,170 TLR. 61 00:05:53,280 --> 00:05:56,990 Here you can see the safest list in blue. 62 00:05:57,000 --> 00:06:02,910 The server name in green and the T.L. as extensions in this brown color. 63 00:06:02,910 --> 00:06:06,380 This is a de-code from Wireshark. 64 00:06:06,390 --> 00:06:17,580 This does not look the same as say Firefox or chrome connecting to a Web site via Haiti CPS using TLR 65 00:06:17,720 --> 00:06:17,940 . 66 00:06:18,030 --> 00:06:27,360 Which is why deep packet inspection can tell you are using Tor or is one method by which Deepak inspection 67 00:06:27,360 --> 00:06:30,260 can tell that you are using Tor. 68 00:06:30,900 --> 00:06:32,650 And here on the left we can see a client. 69 00:06:32,670 --> 00:06:33,200 Hello. 70 00:06:33,240 --> 00:06:35,810 Using the pulley will transport Meek. 71 00:06:35,910 --> 00:06:43,010 And on the right we can see a client hello of chrome 33 on Mac OSX. 72 00:06:43,110 --> 00:06:51,750 Is trying to pretend to look the same or at least similar enough so that DPMI doesn't flag it as being 73 00:06:51,750 --> 00:06:59,730 a problem as we can see one of the big differences is that Chrome is supporting 20 ciphers suites and 74 00:06:59,730 --> 00:07:01,770 me only 13. 75 00:07:01,830 --> 00:07:06,260 So it's these sort of differences that somebody using the API. 76 00:07:06,390 --> 00:07:12,930 And even with pluggable transports with closer examination they can tell that something is amiss. 77 00:07:13,020 --> 00:07:15,270 It is an OPSEC principle to be on. 78 00:07:15,270 --> 00:07:16,270 Interesting. 79 00:07:16,410 --> 00:07:24,840 And using anonymous bridges with a pro-global transport could make you on interesting on till the traffic 80 00:07:24,840 --> 00:07:28,470 is analyzed then you become more interesting. 81 00:07:28,500 --> 00:07:32,460 If getting caught for using Tor has serious consequences. 82 00:07:32,610 --> 00:07:37,140 Toll bridges and pluggable transports are not recommended. 83 00:07:37,140 --> 00:07:45,030 They are only short term work arounds and any adversary sophistication will identify that you are using 84 00:07:45,030 --> 00:07:45,550 them. 85 00:07:45,570 --> 00:07:52,860 If they start to pay closer examination to the traffic as I have illustrated other options to bypass 86 00:07:52,890 --> 00:08:00,270 toll being blocked which might be safer include tunneling tore through all the privacy and anonymity 87 00:08:00,270 --> 00:08:01,160 services. 88 00:08:01,230 --> 00:08:06,290 As I've already said like VPN is nested VPN is S-sh. 89 00:08:06,390 --> 00:08:14,190 Assuming they are allowed or they are viable where you are or using offsite locations or potentially 90 00:08:14,280 --> 00:08:19,710 mobile communication all of which rediscuss in it's own section 9827

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.