Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,690 --> 00:00:07,230
Now before diving into the course content I'd like to give you a quick overview of the content of the
2
00:00:07,230 --> 00:00:07,760
course.
3
00:00:08,280 --> 00:00:15,360
So as you know in this course we're going to be covering four main topics anonymity privacy the dark
4
00:00:15,360 --> 00:00:20,350
web and security so we'll start with anonymity.
5
00:00:20,430 --> 00:00:25,800
And we're going to introduce you to the tour network which is the anonymous rising network there that
6
00:00:25,800 --> 00:00:31,560
we're going to use throughout the whole course you're going to learn how it works and how to connect
7
00:00:31,560 --> 00:00:37,530
to it to improve our privacy and anonymity and to access the dark web.
8
00:00:37,560 --> 00:00:44,790
So we'll start with the basics of the Tor Browser how to properly install it on Linux Windows and OS
9
00:00:44,820 --> 00:00:53,190
X configure it for maximum security and anonymity and bypass censorship to connect to the terror network
10
00:00:53,400 --> 00:00:59,580
even if it's blocked once done with the basics will move to the next level where we're going to use
11
00:00:59,580 --> 00:01:05,650
an operating system that is designed to be more private and more anonymous.
12
00:01:05,850 --> 00:01:12,420
First I'm going to teach you how to properly configure it and install it on a USB stick so we can use
13
00:01:12,420 --> 00:01:20,850
this USB stick to use this operating system from any computer to anonymously access both the darknet
14
00:01:20,940 --> 00:01:24,360
and the clear net without affecting this computer.
15
00:01:24,360 --> 00:01:32,430
And without leaving any traces on it then the course is divided into a number of subsections or modules
16
00:01:32,700 --> 00:01:39,650
that'll teach you how to anonymously and privately use both the clear net and the darknet.
17
00:01:39,690 --> 00:01:46,140
You'll also learn how to carry out your normal online tasks in a more private and more anonymous manner
18
00:01:46,470 --> 00:01:52,290
so you'll learn how to search for content on both on the clear net and on the darknet how to communicate
19
00:01:52,290 --> 00:01:59,190
using emails using instant messages share files and handle files and how to use your whole file system
20
00:01:59,250 --> 00:02:05,080
and hold computer in a more private more secure and more anonymous manner.
21
00:02:05,070 --> 00:02:11,550
Then we're going to have a full section on encryption where you'll learn what we mean by asymmetric
22
00:02:11,550 --> 00:02:19,050
symmetric an end to end encryption how to properly and manually encrypt data whether it's simple text
23
00:02:19,290 --> 00:02:25,680
or files so that they are useless to anybody that intercepts this data.
24
00:02:25,680 --> 00:02:31,890
You'll also learn how to sign data so the receiver can verify that it was actually sent from you and
25
00:02:31,890 --> 00:02:36,370
how to verify the integrity of data that you receive.
26
00:02:36,390 --> 00:02:38,160
This is very very important.
27
00:02:38,190 --> 00:02:45,060
If you're serious about protecting your privacy and if you want to communicate with people on the darknet
28
00:02:45,390 --> 00:02:51,390
because some people will simply refuse to communicate with you unless you use encryption the way that
29
00:02:51,390 --> 00:02:58,650
I'm going to show you in the section there is also a full section on cryptocurrency because as we know
30
00:02:58,710 --> 00:03:04,590
the traditional payment methods that we know use in PayPal or using credit cards or other clear net
31
00:03:04,590 --> 00:03:08,490
payment methods are simply not private and not anonymous.
32
00:03:08,490 --> 00:03:14,130
So in the section you'll first learn how crypto currencies work and how to obtain crypto and handle
33
00:03:14,130 --> 00:03:21,030
it privately and anonymously throughout all of these sections we're going to use fully priced systems
34
00:03:21,360 --> 00:03:27,750
but in the last section of the course I'm going to teach you how to take your security to the next level
35
00:03:27,990 --> 00:03:33,880
by dividing your computer into a number of isolated security domains.
36
00:03:33,900 --> 00:03:40,350
So even if you get hacked or if you open malware it would be very difficult for the hacker or for the
37
00:03:40,350 --> 00:03:44,940
malware to compromise your default system and the anonymize you.
4617
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.