Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,060 --> 00:00:07,810
In the previous lecture we learned that tour is on an amazing network that we can use in order to protect
2
00:00:07,900 --> 00:00:10,300
our anonymity and privacy.
3
00:00:10,300 --> 00:00:17,170
We learned that it works because it has a number of computers or nodes connected to the network.
4
00:00:17,260 --> 00:00:25,090
And then when we send data through the network it will bounce over a minimum of three nodes before it
5
00:00:25,090 --> 00:00:28,710
goes to the destination.
6
00:00:28,740 --> 00:00:37,500
Now I also mentioned in the previous lecture that Tor allows connected devices to host or to offer services.
7
00:00:37,500 --> 00:00:45,510
Now these services can be a simple Web site and because these Web sites are connected to tour they will
8
00:00:45,510 --> 00:00:54,000
benefit from the anonymity that Tor offers and therefore they're usually referred to as Tawhid in services
9
00:00:54,330 --> 00:00:57,320
or online services.
10
00:00:57,430 --> 00:01:03,580
So this diagram right here would usually look more like this in real life.
11
00:01:03,750 --> 00:01:09,720
So you'd have some nodes or relays which you can use in order to go to a certain destination on the
12
00:01:09,720 --> 00:01:10,450
Internet.
13
00:01:10,770 --> 00:01:17,160
But at the same time some of the connected nodes or some of the connected devices are actually acting
14
00:01:17,460 --> 00:01:18,990
as online services.
15
00:01:18,990 --> 00:01:26,370
So these are similar to normal Web sites that you see on the Internet but they exist within the Tor
16
00:01:26,370 --> 00:01:27,870
network.
17
00:01:27,990 --> 00:01:36,740
They also use a really smart Protocol developed by Tor which is designed to hide the identity of this
18
00:01:36,740 --> 00:01:43,200
server offering the service and the client trying to access the service.
19
00:01:43,290 --> 00:01:52,410
So whenever you try to access a tor service at any point of time both the client and the server offering
20
00:01:52,440 --> 00:01:59,130
the service do not know where or who the other party is.
21
00:01:59,350 --> 00:02:06,970
So let's say instead of trying to go to Google dot com you try to go to this online service right here.
22
00:02:06,970 --> 00:02:11,530
What's going to happen is you're going to connect to the TOR network again connection right here is
23
00:02:11,530 --> 00:02:19,720
not encrypted by tor but the ISP like I said the Internet service provider or any other entity trying
24
00:02:19,720 --> 00:02:21,430
to censor your connection.
25
00:02:21,430 --> 00:02:25,770
They want to be able to see that you're trying to access an online service.
26
00:02:25,870 --> 00:02:30,620
They'll only be able to see that you're connecting to the terror network.
27
00:02:30,610 --> 00:02:35,990
Then once you're in the network you're going to bounce your request over a random node you're going
28
00:02:35,990 --> 00:02:38,100
to go to a second random node.
29
00:02:38,230 --> 00:02:45,870
And finally instead of go into a third node then out to the Internet to another Web site on the Internet.
30
00:02:45,880 --> 00:02:51,910
On the surface web you're going to stay within the Tor network and you're literally just going to go
31
00:02:51,910 --> 00:02:54,280
to your online service.
32
00:02:54,520 --> 00:03:01,210
Now whenever you try to communicate or connect to an online service the process is actually much more
33
00:03:01,210 --> 00:03:04,660
complex than what's shown in this diagram.
34
00:03:04,750 --> 00:03:13,420
It is done over a really smart protocol that is developed by tor so that when you connect to an online
35
00:03:13,420 --> 00:03:21,550
service you want to be able to see or get information about the server offering this service at the
36
00:03:21,550 --> 00:03:29,050
same time the server offering the online service or the hidden service will not be able to get information
37
00:03:29,080 --> 00:03:35,270
about you regarding your location or anything that can identify you.
38
00:03:35,590 --> 00:03:42,940
Again all of this done in order to protect the privacy and anonymity of both the server offering the
39
00:03:42,940 --> 00:03:45,920
service and the user.
40
00:03:46,030 --> 00:03:52,150
Now in the next lecture I'm going to show you how to connect to Tor how to access a hidden service and
41
00:03:52,150 --> 00:03:54,460
you'll be able to understand this better.
4634
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.