All language subtitles for 4. Introduction to Hidden Services Onion Services

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,060 --> 00:00:07,810 In the previous lecture we learned that tour is on an amazing network that we can use in order to protect 2 00:00:07,900 --> 00:00:10,300 our anonymity and privacy. 3 00:00:10,300 --> 00:00:17,170 We learned that it works because it has a number of computers or nodes connected to the network. 4 00:00:17,260 --> 00:00:25,090 And then when we send data through the network it will bounce over a minimum of three nodes before it 5 00:00:25,090 --> 00:00:28,710 goes to the destination. 6 00:00:28,740 --> 00:00:37,500 Now I also mentioned in the previous lecture that Tor allows connected devices to host or to offer services. 7 00:00:37,500 --> 00:00:45,510 Now these services can be a simple Web site and because these Web sites are connected to tour they will 8 00:00:45,510 --> 00:00:54,000 benefit from the anonymity that Tor offers and therefore they're usually referred to as Tawhid in services 9 00:00:54,330 --> 00:00:57,320 or online services. 10 00:00:57,430 --> 00:01:03,580 So this diagram right here would usually look more like this in real life. 11 00:01:03,750 --> 00:01:09,720 So you'd have some nodes or relays which you can use in order to go to a certain destination on the 12 00:01:09,720 --> 00:01:10,450 Internet. 13 00:01:10,770 --> 00:01:17,160 But at the same time some of the connected nodes or some of the connected devices are actually acting 14 00:01:17,460 --> 00:01:18,990 as online services. 15 00:01:18,990 --> 00:01:26,370 So these are similar to normal Web sites that you see on the Internet but they exist within the Tor 16 00:01:26,370 --> 00:01:27,870 network. 17 00:01:27,990 --> 00:01:36,740 They also use a really smart Protocol developed by Tor which is designed to hide the identity of this 18 00:01:36,740 --> 00:01:43,200 server offering the service and the client trying to access the service. 19 00:01:43,290 --> 00:01:52,410 So whenever you try to access a tor service at any point of time both the client and the server offering 20 00:01:52,440 --> 00:01:59,130 the service do not know where or who the other party is. 21 00:01:59,350 --> 00:02:06,970 So let's say instead of trying to go to Google dot com you try to go to this online service right here. 22 00:02:06,970 --> 00:02:11,530 What's going to happen is you're going to connect to the TOR network again connection right here is 23 00:02:11,530 --> 00:02:19,720 not encrypted by tor but the ISP like I said the Internet service provider or any other entity trying 24 00:02:19,720 --> 00:02:21,430 to censor your connection. 25 00:02:21,430 --> 00:02:25,770 They want to be able to see that you're trying to access an online service. 26 00:02:25,870 --> 00:02:30,620 They'll only be able to see that you're connecting to the terror network. 27 00:02:30,610 --> 00:02:35,990 Then once you're in the network you're going to bounce your request over a random node you're going 28 00:02:35,990 --> 00:02:38,100 to go to a second random node. 29 00:02:38,230 --> 00:02:45,870 And finally instead of go into a third node then out to the Internet to another Web site on the Internet. 30 00:02:45,880 --> 00:02:51,910 On the surface web you're going to stay within the Tor network and you're literally just going to go 31 00:02:51,910 --> 00:02:54,280 to your online service. 32 00:02:54,520 --> 00:03:01,210 Now whenever you try to communicate or connect to an online service the process is actually much more 33 00:03:01,210 --> 00:03:04,660 complex than what's shown in this diagram. 34 00:03:04,750 --> 00:03:13,420 It is done over a really smart protocol that is developed by tor so that when you connect to an online 35 00:03:13,420 --> 00:03:21,550 service you want to be able to see or get information about the server offering this service at the 36 00:03:21,550 --> 00:03:29,050 same time the server offering the online service or the hidden service will not be able to get information 37 00:03:29,080 --> 00:03:35,270 about you regarding your location or anything that can identify you. 38 00:03:35,590 --> 00:03:42,940 Again all of this done in order to protect the privacy and anonymity of both the server offering the 39 00:03:42,940 --> 00:03:45,920 service and the user. 40 00:03:46,030 --> 00:03:52,150 Now in the next lecture I'm going to show you how to connect to Tor how to access a hidden service and 41 00:03:52,150 --> 00:03:54,460 you'll be able to understand this better. 4634

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.