All language subtitles for 8. Intro to Virtual Private Networks (VPN) _ How to Use it with TOR

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,850 --> 00:00:08,440 So far I mentioned the word VPN in a number of lectures but I never really explained what it is. 2 00:00:08,440 --> 00:00:16,330 So in this lecture I'm going to explain what a VPN is how it works and how we can use it to bypass censorship 3 00:00:16,630 --> 00:00:20,080 and protect our privacy anonymity and security. 4 00:00:21,390 --> 00:00:24,880 So VPN stands for virtual private network. 5 00:00:24,990 --> 00:00:31,530 And to understand how it works let's first have a look on a normal scenario where we have a user trying 6 00:00:31,530 --> 00:00:33,450 to access Google dot com. 7 00:00:33,630 --> 00:00:39,180 As we mentioned before usually this traffic is sent unencrypted unless Google or the website they're 8 00:00:39,180 --> 00:00:42,120 trying to access uses encryption. 9 00:00:42,120 --> 00:00:47,220 And like we said this traffic passes through a number of routers it passes through your Internet service 10 00:00:47,220 --> 00:00:48,810 provider and so on. 11 00:00:48,810 --> 00:00:54,900 And all of these stops can see the data that you're sending and manipulated profile you gather information 12 00:00:54,900 --> 00:00:57,090 about you and so on. 13 00:00:57,090 --> 00:01:05,370 Now if you use a VPN you will first connect to the VPN server which you can think of as a computer that 14 00:01:05,370 --> 00:01:09,230 exists on the Internet on the cloud with really good resources. 15 00:01:09,300 --> 00:01:16,380 And what happens is you create an encrypted tunnel an encrypted connection with this computer. 16 00:01:16,380 --> 00:01:23,030 So whenever you want to access anything on the internet you send that first to this computer. 17 00:01:23,190 --> 00:01:30,630 But the request is sent encrypted hence I used a green arrow in here to indicate that the data sent 18 00:01:30,900 --> 00:01:32,400 is encrypted. 19 00:01:32,400 --> 00:01:38,550 So whenever you want to access something both you and the VPN server will be able to read this data 20 00:01:38,580 --> 00:01:39,600 and understand it. 21 00:01:40,020 --> 00:01:46,110 But if anybody intercepts this data whether it's your internet service provider whether it's your network 22 00:01:46,170 --> 00:01:52,770 admin whether it's a hacker they will not be able to read this data or manipulated or profile you because 23 00:01:52,770 --> 00:01:54,420 this data will be encrypted. 24 00:01:54,450 --> 00:01:56,570 It will be gibberish. 25 00:01:56,570 --> 00:02:02,480 Then once the VPN receives the data once it sees for example you want to go to Google dot com. 26 00:02:02,570 --> 00:02:05,130 It will simply forward the request to Google. 27 00:02:05,130 --> 00:02:08,700 And then the response will follow a similar path. 28 00:02:08,700 --> 00:02:13,210 Again keep in mind traffic leaving the VPN will be unencrypted. 29 00:02:13,210 --> 00:02:18,050 It'll only be encrypted if the service that you connect in to uses encryption. 30 00:02:18,190 --> 00:02:21,660 Hence I used a red arrow in this case. 31 00:02:21,660 --> 00:02:26,230 Now you can also use a VPN and connect to the TOR network. 32 00:02:26,460 --> 00:02:32,730 So you'll first connect to your VPN again green arrow means your traffic is encrypted and then it leaves 33 00:02:32,730 --> 00:02:39,030 your VPN connected to the network and then you can either access an on your service or go to Google 34 00:02:39,060 --> 00:02:42,590 or any other Web site on the clear net. 35 00:02:42,600 --> 00:02:50,460 Now this architecture of first creating a secure tunnel and connecting to a server and then go to the 36 00:02:50,460 --> 00:02:55,850 Internet or to the tower network or to whatever service is really really useful. 37 00:02:55,980 --> 00:03:00,580 Because first of all it adds an extra layer of encryption. 38 00:03:00,600 --> 00:03:06,180 This means that it's going to improve our privacy and anonymity because it will prevent anybody that 39 00:03:06,240 --> 00:03:12,900 intercepts this connection that intercepts this flow of data in here from seeing what data you're sending 40 00:03:12,960 --> 00:03:13,780 or receiving. 41 00:03:13,860 --> 00:03:18,360 Again whether it's your network admin whether it's your internet provider whether it's a government 42 00:03:18,600 --> 00:03:19,890 it doesn't really matter. 43 00:03:19,890 --> 00:03:26,160 Your data in here is going to be encrypted therefore it'll be useless to any entity that intercepts 44 00:03:26,160 --> 00:03:27,040 it. 45 00:03:27,060 --> 00:03:29,430 It will also help us bypass censorship. 46 00:03:29,610 --> 00:03:35,550 So we've seen previously that we can use plug mobile transports and bridges in order to bypass censorship 47 00:03:35,640 --> 00:03:40,830 and connect to the TOR network even if it's being blocked by your network admin or by your internet 48 00:03:40,830 --> 00:03:41,990 provider. 49 00:03:42,270 --> 00:03:49,620 A better solution in my opinion is to simply use a VPN because let's assume we have an Internet service 50 00:03:49,620 --> 00:03:56,200 provider in here that doesn't allow the users to access tor when you use a VPN. 51 00:03:56,220 --> 00:04:02,270 Again you're creating a secure encrypted tunnel between you and the VPN provider. 52 00:04:02,340 --> 00:04:09,930 So the Internet service provider cannot see that you're trying to connect to Tor all it can see is encrypted 53 00:04:09,930 --> 00:04:13,360 data go into some server on the Internet. 54 00:04:13,650 --> 00:04:20,400 Therefore in the case of the plug all transports and bridges in worst case scenario the Internet service 55 00:04:20,400 --> 00:04:26,850 provider or the admin or the government will be able to see that you are trying to connect to tour which 56 00:04:26,850 --> 00:04:29,670 could cause problems in some countries. 57 00:04:29,670 --> 00:04:36,570 In the case of using a VPN the worst case scenario is your Internet service provider will be able to 58 00:04:36,570 --> 00:04:39,390 know that you're trying to connect to a VPN. 59 00:04:39,410 --> 00:04:44,760 That said they want to know that you're trying to use Tor and they want to be able to see any data you 60 00:04:44,760 --> 00:04:52,910 send because like I said the connection is encrypted and hence the use of the green arrows in here on 61 00:04:52,910 --> 00:05:00,140 top of all of these features using a VPN protect us from hackers because it is very easy for anyone 62 00:05:00,140 --> 00:05:06,920 connected to the same network as you to intercept your data to redirect the flow of data so that it 63 00:05:06,920 --> 00:05:08,870 flows through their computer. 64 00:05:08,900 --> 00:05:13,210 I actually cover this in my network hacking and in my ethical hacking courses. 65 00:05:13,970 --> 00:05:19,760 So whether you're connected to a public network such as an airport network or a hotel or a college network 66 00:05:20,060 --> 00:05:27,290 or even at your own home network anybody connected to that network can redirect the flow of data so 67 00:05:27,290 --> 00:05:29,510 that it flows through their computer. 68 00:05:29,510 --> 00:05:34,670 And once they do this they'll be able to see all the websites you visit all the usernames and passwords 69 00:05:34,670 --> 00:05:35,660 you send. 70 00:05:35,660 --> 00:05:41,380 They'll even be able to modify data on the fly and backdoor files you download. 71 00:05:41,390 --> 00:05:49,880 And in many cases even gain full control over your computer now if a VPN is used the hacker will still 72 00:05:49,880 --> 00:05:55,520 be able to redirect the flow of data and they will still be able to intercept your data. 73 00:05:55,520 --> 00:05:58,210 But this data again will be encrypted. 74 00:05:58,250 --> 00:06:04,180 Hence the use of the green arrows so they won't be able to see the usernames or the passwords or anything. 75 00:06:04,250 --> 00:06:10,580 And even if they try to modify this data they wouldn't be able to do it because it will be simply gibberish 76 00:06:10,790 --> 00:06:15,300 and they wouldn't be able to analyze it or do anything with it. 77 00:06:15,350 --> 00:06:23,240 That's why using a VPN is a really good solution to prevent man in the middle attacks with that being 78 00:06:23,240 --> 00:06:29,160 said there is a number of things that you need to keep in mind when using a VPN. 79 00:06:29,300 --> 00:06:33,860 First of all we are introducing a man in the middle and here. 80 00:06:33,860 --> 00:06:40,470 So if we go back to the previous diagram you can see that our connection was going directly to the Internet. 81 00:06:40,580 --> 00:06:46,570 But when we're using a VPN we're literally adding an extra node to our connection. 82 00:06:46,730 --> 00:06:53,690 So the data is encrypted between the user and the VPN provider with the VPN provider is able to see 83 00:06:53,690 --> 00:06:54,810 this data. 84 00:06:54,920 --> 00:07:01,700 Therefore you have to make sure that you pick a reputable VPN Provider and avoid free providers because 85 00:07:01,760 --> 00:07:05,090 a lot of them keep logs and analyze you. 86 00:07:05,090 --> 00:07:09,050 You also want to make sure that you use a provider that keeps no logs. 87 00:07:09,200 --> 00:07:14,930 And with keeping all of these things in mind with picking a reputable provider avoid free ones and make 88 00:07:14,930 --> 00:07:16,700 sure that they keep no logs. 89 00:07:16,700 --> 00:07:19,790 Also use hasty tepees everywhere. 90 00:07:19,790 --> 00:07:23,290 This really solves the problem of having a VPN here. 91 00:07:23,300 --> 00:07:28,850 Even if you trust them even if you think this company will never do anything bad will never keep logs 92 00:07:28,850 --> 00:07:33,040 and analyze your traffic when you use hasty tepees everywhere. 93 00:07:33,170 --> 00:07:40,130 You're adding another layer of encryption so your connection between you and the VPN provider will be 94 00:07:40,130 --> 00:07:42,470 secured by two layers of encryption. 95 00:07:42,470 --> 00:07:49,900 First the encryption used by the VPN and the encryption enforced by TTP as everywhere which is tier 96 00:07:49,900 --> 00:07:50,800 less. 97 00:07:51,260 --> 00:07:58,760 And then when traffic leaves the VPN provider you will have less encryption up to whatever destination 98 00:07:58,760 --> 00:08:00,020 you're going to. 99 00:08:00,020 --> 00:08:07,400 Therefore even the VPN provider in this case will not be able to see your data because it will be encrypted 100 00:08:07,430 --> 00:08:12,110 with Telus which is a very very secure encryption. 101 00:08:12,170 --> 00:08:18,320 Last but not least when signing up with a VPN you want to make sure you use a VPN that does not require 102 00:08:18,350 --> 00:08:19,430 a lot of information. 103 00:08:19,430 --> 00:08:24,140 Again at the end of the day we're trying to improve our privacy and it doesn't really make sense to 104 00:08:24,140 --> 00:08:27,530 give them my address and all this information. 105 00:08:27,560 --> 00:08:31,070 You can also take this one step further and pay with crypto. 106 00:08:31,220 --> 00:08:32,260 But this is optional. 107 00:08:32,270 --> 00:08:39,670 It really depends on you and your threat model now there are a lot of VPN providers out there. 108 00:08:39,700 --> 00:08:42,910 I highly recommend you go and do your own research. 109 00:08:42,910 --> 00:08:51,040 Me personally I use our own VPN that we provide adds security which you can get at Z as VPN dot com. 110 00:08:51,130 --> 00:08:55,160 So I have the website already here and I'm already at the download section. 111 00:08:55,360 --> 00:09:00,420 It supports all platforms so you can use it on Windows OS X Linux ISIS and Android. 112 00:09:00,430 --> 00:09:02,260 Doesn't really matter. 113 00:09:02,260 --> 00:09:06,220 And using these VPN providers is actually very very simple. 114 00:09:06,340 --> 00:09:11,620 All you'll have to do is first of all obviously sign up with the ones that you want download their client. 115 00:09:11,710 --> 00:09:17,350 And once you have the client downloaded you simply want to select a server and connect to it. 116 00:09:17,350 --> 00:09:22,780 So I already have the client downloaded and installed and I'm simply going to connect to the Australia 117 00:09:22,780 --> 00:09:28,260 server and right now as you can see my location change to Australia. 118 00:09:28,290 --> 00:09:34,290 So the websites that I visit will think that I am visiting them from Australia because going back to 119 00:09:34,290 --> 00:09:39,550 this diagram I connected to a VPN server that is in Australia. 120 00:09:39,810 --> 00:09:46,530 So anything I send will be leaving this server and therefore I'll appear like I'm coming from this country. 121 00:09:46,530 --> 00:09:49,800 So that's another benefit of using a VPN. 122 00:09:49,800 --> 00:09:56,130 You can change your location and access websites or content that is only available for a certain country 123 00:09:56,310 --> 00:10:00,630 by simply connecting to a VPN that is in that country. 124 00:10:00,630 --> 00:10:05,350 So now that I am connected we can see that as seen here Australia we can double check on the website 125 00:10:05,400 --> 00:10:11,970 itself or fire refresh it here you'll see this bar will tell me that I am protected by that as VPN my 126 00:10:11,970 --> 00:10:17,890 IP appears to be this one which is not my real IP and I seem like I'm coming from Australia. 127 00:10:17,910 --> 00:10:19,440 So that's perfect. 128 00:10:19,440 --> 00:10:26,190 And now that we are connected to the VPN we can go ahead and use the Internet normally and will appear 129 00:10:26,190 --> 00:10:32,630 like we're visiting these websites from Australia or you can use your tor browser. 130 00:10:32,850 --> 00:10:39,240 And this way will connect to the TOR network from the VPN server that is in Australia and then bounce 131 00:10:39,300 --> 00:10:46,110 through another three nodes and then access the Web site that we want or access Tor hidden services 132 00:10:46,620 --> 00:10:52,650 so we can just go to check the Tor Project dot org to confirm that we're connected to the terror network 133 00:10:52,650 --> 00:10:53,640 properly. 134 00:10:53,640 --> 00:10:56,610 And as you can see that's perfect we're connected to it. 135 00:10:56,700 --> 00:10:59,000 This is the IP this is the end IP. 136 00:10:59,000 --> 00:11:05,320 The IP of the exit node and we can even click on the eye here to see the nodes where bumps and through. 137 00:11:05,340 --> 00:11:12,120 So what's happening right now is we have an encrypted connection from my computer to a VPN server in 138 00:11:12,120 --> 00:11:19,980 Australia and then from there reconnect in to Netherlands to Germany to the United States and then we 139 00:11:19,980 --> 00:11:23,670 access the third project Web site or whatever Web site we want. 15530

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.