All language subtitles for 6. TOR Bridges _ Pluggable Transports

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (SoranĂ®)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,170 --> 00:00:01,620 OK. 2 00:00:01,650 --> 00:00:08,440 So now that we have Tor Browser installed let us go ahead and make sure that it's working as expected 3 00:00:08,680 --> 00:00:13,630 and is routing all of the traffic through the Tor network. 4 00:00:13,690 --> 00:00:20,650 Now I'm going to be using detailed browser on Windows but as seen before the interface is identical 5 00:00:20,650 --> 00:00:24,630 on Windows Linux and OS X the installation is different. 6 00:00:24,640 --> 00:00:28,650 And I showed you how to install it on all of these operating systems. 7 00:00:28,690 --> 00:00:34,480 So once it's installed using the browser is exactly the same. 8 00:00:34,480 --> 00:00:37,090 So I'm going to double click the launcher 9 00:00:40,160 --> 00:00:46,370 and as you can see you get a normal browser window and don't maximize this window ever. 10 00:00:46,400 --> 00:00:52,490 And I'll talk about that later but for now just to check to make sure that Tor is working. 11 00:00:52,490 --> 00:00:56,800 I'm gonna go to check that Tor Project dot org 12 00:00:59,590 --> 00:01:02,160 and as you can see it's saying congratulations. 13 00:01:02,170 --> 00:01:10,840 This browser is configured to use tour and it's given us the IP that our browser appears to be coming 14 00:01:10,840 --> 00:01:11,230 from. 15 00:01:11,230 --> 00:01:13,300 So this is not my real IP. 16 00:01:13,300 --> 00:01:17,560 This is the IP that I will appear that I'm coming from. 17 00:01:18,340 --> 00:01:24,540 So this is all perfect and I'll talk about more tor settings in a future lecture. 18 00:01:25,120 --> 00:01:29,770 But right now I want to show you how to bypass tor being blocked. 19 00:01:30,010 --> 00:01:37,480 So in case you came to this Web site and it didn't load or if you so a warning here say in tour is not 20 00:01:37,480 --> 00:01:45,370 working then this could be because your network administrator or your Internet service provider is blocking 21 00:01:45,370 --> 00:01:47,930 you from using Tor. 22 00:01:48,250 --> 00:01:55,460 See when you tried to access tor as I mentioned before the first thing you'll have to do is connect 23 00:01:55,490 --> 00:02:02,030 to the TOR network and send your traffic to a random TOR node so you're going to pick one of these nodes 24 00:02:02,390 --> 00:02:07,370 and you're going to send your traffic through it as the first node. 25 00:02:07,400 --> 00:02:15,410 The problem is before you can actually connect and send data to this node your data can easily be intercepted 26 00:02:15,650 --> 00:02:24,820 by your network administrator or your Internet service provider before it even reaches the first node. 27 00:02:24,890 --> 00:02:29,520 And before it's even able to connect to the TOR network. 28 00:02:29,600 --> 00:02:38,300 So what your Internet service provider or ISP can do is they could identify all the available tor nodes 29 00:02:38,300 --> 00:02:43,080 right here the white circles because they are publicly available. 30 00:02:43,220 --> 00:02:49,040 And then just block them all prevents you from connecting to any of these wide circles. 31 00:02:49,490 --> 00:02:55,070 So therefore whenever you try to connect to Tor your person by Internet service provider which is running 32 00:02:55,070 --> 00:03:02,210 a firewall checking if you're trying to connect to any of these nodes and if you are to block your connection 33 00:03:03,110 --> 00:03:09,560 the result of this is when you come in to load this page it will either not load or it's going to tell 34 00:03:09,560 --> 00:03:17,400 you that you're not using the Tor network a simple solution to this is to use at Tower Bridge as the 35 00:03:17,400 --> 00:03:21,340 first node what we mean by Todd Bridges. 36 00:03:21,340 --> 00:03:26,100 They are normal nodes similar to all the white circles that we can see in here. 37 00:03:26,320 --> 00:03:29,790 But they are not publicly available. 38 00:03:29,860 --> 00:03:37,000 So the only way that the Internet service provider was able to block us is because they know all the 39 00:03:37,000 --> 00:03:43,480 white circles they know all the public nodes and they have a rule in their firewall to prevent any user 40 00:03:43,540 --> 00:03:47,170 from connecting to any of these white circles. 41 00:03:47,170 --> 00:03:53,200 So to bypass this we can't just use a node that is not publicly available. 42 00:03:53,200 --> 00:04:00,520 It's not being advertised that way when we try to connect to it the Internet service provider will not 43 00:04:00,520 --> 00:04:07,150 have this node in its list and therefore we can connect to it and then continue using Tor going out 44 00:04:07,180 --> 00:04:12,810 to another Web site or even going in and accessing an online service. 45 00:04:12,830 --> 00:04:20,780 So this is pretty good it's a pretty good solution until firewalls and service providers became smarter 46 00:04:20,810 --> 00:04:28,190 and implemented more advanced methods what they started doing is they started using deep packet filtering 47 00:04:28,340 --> 00:04:37,640 or what's known as the API to identify towards traffic and block it so they don't even care about which 48 00:04:37,640 --> 00:04:39,490 node you're trying to connect to. 49 00:04:39,500 --> 00:04:46,970 They started analyzing all traffic that you sent out of your computer and they managed to identify what 50 00:04:46,970 --> 00:04:49,400 Tor traffic looks like. 51 00:04:49,400 --> 00:04:56,690 So like I said before when you use Tor they can't really see which websites you're trying to go to but 52 00:04:56,930 --> 00:05:03,800 they'll be able to see that you're trying to use the Tor network either by identifying the note that 53 00:05:03,800 --> 00:05:10,250 you're trying to connect to or by using deep packet filtering which will tell them that the traffic 54 00:05:10,250 --> 00:05:14,060 of this user match is a signature of Tor traffic. 55 00:05:14,060 --> 00:05:16,330 Therefore this user is using tour. 56 00:05:16,370 --> 00:05:25,440 Therefore we will block this traffic so the solution to this is to use applicable transport plug all 57 00:05:25,460 --> 00:05:31,780 transport will try to make your traffic look similar to any other normal traffic. 58 00:05:32,410 --> 00:05:39,040 So when you're trying to connect to a bridge we're going to use a bridge that can use applicable transport 59 00:05:39,460 --> 00:05:45,160 and this way all the traffic that we're going to send will not look like Tor traffic. 60 00:05:45,200 --> 00:05:51,070 It will look similar to traffic that's generated when you're trying to access Google or Facebook or 61 00:05:51,070 --> 00:05:56,290 any other Web site similar to any normal web traffic. 62 00:05:56,370 --> 00:05:58,280 Now this is a pretty good solution. 63 00:05:58,290 --> 00:06:03,870 It will work in many cases but it can still fail in some instances. 64 00:06:04,140 --> 00:06:10,290 But the worst case scenario even if it fails the Internet service provider will be able to know that 65 00:06:10,290 --> 00:06:16,690 you're using tour but again they won't really know which websites you're trying to access unless they're 66 00:06:16,690 --> 00:06:20,670 on a more sophisticated attack. 67 00:06:20,750 --> 00:06:24,470 Now keep in mind this will slow down your connection. 68 00:06:24,590 --> 00:06:31,790 So if you were able to browse this page and still knew that everything is working then maybe you don't. 69 00:06:31,790 --> 00:06:33,500 You shouldn't really use them. 70 00:06:33,500 --> 00:06:40,910 It really depends on your case and in the next lecture I'm going to show you how to configure Tor to 71 00:06:40,910 --> 00:06:47,690 use a bridge with a local transport to access the Tor network even if it's being blocked. 8123

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.