All language subtitles for 4. Introduction to Hidden Services Onion Services

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,060 --> 00:00:07,810 In the previous lecture we learned that tour is on an amazing network that we can use in order to protect 2 00:00:07,900 --> 00:00:10,300 our anonymity and privacy. 3 00:00:10,300 --> 00:00:17,170 We learned that it works because it has a number of computers or nodes connected to the network. 4 00:00:17,260 --> 00:00:25,090 And then when we send data through the network it will bounce over a minimum of three nodes before it 5 00:00:25,090 --> 00:00:28,710 goes to the destination. 6 00:00:28,740 --> 00:00:37,500 Now I also mentioned in the previous lecture that Tor allows connected devices to host or to offer services. 7 00:00:37,500 --> 00:00:45,510 Now these services can be a simple Web site and because these Web sites are connected to tour they will 8 00:00:45,510 --> 00:00:54,000 benefit from the anonymity that Tor offers and therefore they're usually referred to as Tawhid in services 9 00:00:54,330 --> 00:00:57,320 or online services. 10 00:00:57,430 --> 00:01:03,580 So this diagram right here would usually look more like this in real life. 11 00:01:03,750 --> 00:01:09,720 So you'd have some nodes or relays which you can use in order to go to a certain destination on the 12 00:01:09,720 --> 00:01:10,450 Internet. 13 00:01:10,770 --> 00:01:17,160 But at the same time some of the connected nodes or some of the connected devices are actually acting 14 00:01:17,460 --> 00:01:18,990 as online services. 15 00:01:18,990 --> 00:01:26,370 So these are similar to normal Web sites that you see on the Internet but they exist within the Tor 16 00:01:26,370 --> 00:01:27,870 network. 17 00:01:27,990 --> 00:01:36,740 They also use a really smart Protocol developed by Tor which is designed to hide the identity of this 18 00:01:36,740 --> 00:01:43,200 server offering the service and the client trying to access the service. 19 00:01:43,290 --> 00:01:52,410 So whenever you try to access a tor service at any point of time both the client and the server offering 20 00:01:52,440 --> 00:01:59,130 the service do not know where or who the other party is. 21 00:01:59,350 --> 00:02:06,970 So let's say instead of trying to go to Google dot com you try to go to this online service right here. 22 00:02:06,970 --> 00:02:11,530 What's going to happen is you're going to connect to the TOR network again connection right here is 23 00:02:11,530 --> 00:02:19,720 not encrypted by tor but the ISP like I said the Internet service provider or any other entity trying 24 00:02:19,720 --> 00:02:21,430 to censor your connection. 25 00:02:21,430 --> 00:02:25,770 They want to be able to see that you're trying to access an online service. 26 00:02:25,870 --> 00:02:30,620 They'll only be able to see that you're connecting to the terror network. 27 00:02:30,610 --> 00:02:35,990 Then once you're in the network you're going to bounce your request over a random node you're going 28 00:02:35,990 --> 00:02:38,100 to go to a second random node. 29 00:02:38,230 --> 00:02:45,870 And finally instead of go into a third node then out to the Internet to another Web site on the Internet. 30 00:02:45,880 --> 00:02:51,910 On the surface web you're going to stay within the Tor network and you're literally just going to go 31 00:02:51,910 --> 00:02:54,280 to your online service. 32 00:02:54,520 --> 00:03:01,210 Now whenever you try to communicate or connect to an online service the process is actually much more 33 00:03:01,210 --> 00:03:04,660 complex than what's shown in this diagram. 34 00:03:04,750 --> 00:03:13,420 It is done over a really smart protocol that is developed by tor so that when you connect to an online 35 00:03:13,420 --> 00:03:21,550 service you want to be able to see or get information about the server offering this service at the 36 00:03:21,550 --> 00:03:29,050 same time the server offering the online service or the hidden service will not be able to get information 37 00:03:29,080 --> 00:03:35,270 about you regarding your location or anything that can identify you. 38 00:03:35,590 --> 00:03:42,940 Again all of this done in order to protect the privacy and anonymity of both the server offering the 39 00:03:42,940 --> 00:03:45,920 service and the user. 40 00:03:46,030 --> 00:03:52,150 Now in the next lecture I'm going to show you how to connect to Tor how to access a hidden service and 41 00:03:52,150 --> 00:03:54,460 you'll be able to understand this better. 4634

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.