Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,660 --> 00:00:02,790
Get to walk you through some of the main features of tails.
2
00:00:02,800 --> 00:00:06,380
Now here's where you're going to download it from.
3
00:00:06,390 --> 00:00:11,270
You can either get it straight from here or you can do the torrent.
4
00:00:11,280 --> 00:00:17,720
You do want to download the signature and you want to verify it as well tells you how to do the verification
5
00:00:17,730 --> 00:00:19,080
here in a separate section.
6
00:00:19,080 --> 00:00:24,070
We talk about verifying files and verifying signatures in a more general sense.
7
00:00:24,150 --> 00:00:26,900
So look at that section for verification.
8
00:00:27,300 --> 00:00:33,840
And what are you seeing here now is of course the tails desktop you have here the power bottom which
9
00:00:33,840 --> 00:00:41,970
will immediately switch you off and then secure arrays the RAM removing any evidence of activity in
10
00:00:42,410 --> 00:00:48,390
your network settings here you can get your standard changes to your network but you are restricted
11
00:00:48,390 --> 00:00:50,050
as to some of the things you can do.
12
00:00:50,130 --> 00:00:55,300
So this operating system only forces your traffic down the Tor network.
13
00:00:55,850 --> 00:01:03,890
Here's the open BGP clipboard which is a nice little tool fibrin text editor here.
14
00:01:04,770 --> 00:01:08,640
I put in some text.
15
00:01:08,640 --> 00:01:16,270
I can then use open AGP to encrypt that text if I select this here right here.
16
00:01:16,500 --> 00:01:21,550
King crypt with a passphrase If I select that and put a passphrase in
17
00:01:27,630 --> 00:01:30,290
and then you can see that this is changed.
18
00:01:30,330 --> 00:01:33,450
It's got a little lock icon on it.
19
00:01:33,750 --> 00:01:37,920
So decrypt varify clipboard.
20
00:01:38,780 --> 00:01:40,540
Right click paste.
21
00:01:40,560 --> 00:01:42,610
That's my encrypted secret message.
22
00:01:42,690 --> 00:01:44,730
And then I can paste that into an e-mail.
23
00:01:44,760 --> 00:01:50,600
The benefit of this is that you do an entirely separately from any sort of application.
24
00:01:50,610 --> 00:01:55,380
Apart from obviously this application and this clipboard which means anyone notabilities it might be
25
00:01:55,380 --> 00:02:00,330
an application say you do it in an e-mail client and there's some sort of unknowability an e-mail client
26
00:02:00,330 --> 00:02:00,420
.
27
00:02:00,420 --> 00:02:02,680
This will overcome that.
28
00:02:03,270 --> 00:02:11,160
Now probably more common way of using this or at least a better way if you shared your public key would
29
00:02:11,160 --> 00:02:16,760
be to encrypt and sign using public private keys.
30
00:02:16,860 --> 00:02:21,450
And here you would obviously select the key or the recipient.
31
00:02:23,340 --> 00:02:28,590
And you would need your own private key for it to be signed and the recipient must have a corresponding
32
00:02:28,590 --> 00:02:29,490
public key.
33
00:02:29,520 --> 00:02:31,980
And we've already gone through on the section on cryptography
34
00:02:35,170 --> 00:02:43,470
and there you go and you can click on here and manage your keys and we will talk about PDP and GBG in
35
00:02:43,470 --> 00:02:46,550
their own section.
36
00:02:46,620 --> 00:02:48,330
This is the virtual keyboard.
37
00:02:48,810 --> 00:02:54,120
I believe this is to help prevent key logging and other such things.
38
00:02:54,120 --> 00:03:00,570
Here is a tor I think home to let us know that Tor has connected this operating system or only connect
39
00:03:00,690 --> 00:03:02,670
to the Internet via Tor.
40
00:03:02,880 --> 00:03:08,880
So until Tor's made his connection you won't be able to use the Internet when it's green.
41
00:03:08,880 --> 00:03:09,930
It means it's working.
42
00:03:09,940 --> 00:03:16,520
You can right click on this and look at the usual things that you can see in the Tor browser bundle
43
00:03:16,530 --> 00:03:18,810
Bondel standard terminal here
44
00:03:22,120 --> 00:03:29,310
danios me to look at what active network sessions are running so we can just see here there's a local
45
00:03:29,310 --> 00:03:33,240
connection to 6 1 3 6.
46
00:03:33,960 --> 00:03:41,760
His key pass x which is a password manager you can start a new database put in the master password and
47
00:03:41,760 --> 00:03:45,220
that encrypts all of your passwords onto that master password.
48
00:03:45,230 --> 00:03:50,300
It is a password manager that Id recommended in the area on passwords we cover password managers and
49
00:03:50,340 --> 00:03:59,520
this encrypts with a 2 5 6 Pidgen here which is a chat client.
50
00:03:59,520 --> 00:04:04,760
It will come up with a random name which you have to then enable.
51
00:04:04,920 --> 00:04:12,750
Once you've enabled that close that it connects you you can see are available here and it's connected
52
00:04:12,750 --> 00:04:16,860
to the default channel hash tag tails
53
00:04:21,240 --> 00:04:24,280
you want to start a private conversation.
54
00:04:24,320 --> 00:04:31,260
DoubleClick is not private start private conversation and then you're going to get prompted for various
55
00:04:31,260 --> 00:04:36,080
ways in order to share public and private keys or passwords etc..
56
00:04:36,150 --> 00:04:39,150
And we'll cover more on this on the sectional messengers.
57
00:04:39,420 --> 00:04:48,180
It's closer and you can see that a connection that was made next is clause which is an e-mail client
58
00:04:48,180 --> 00:04:48,590
.
59
00:04:48,780 --> 00:04:53,700
You may not be familiar with using an e-mail client you may just access your e-mail via the web.
60
00:04:53,790 --> 00:05:01,260
You can actually access it using e-mail clients which sits on your client which is actually a more secure
61
00:05:01,260 --> 00:05:03,720
way of accessing your e-mail.
62
00:05:04,020 --> 00:05:09,750
As you mentioned before there is a flaw with claws so it's actually getting superseded by something
63
00:05:09,750 --> 00:05:16,080
called Ice doth which is a rebranded version of something called Thunderbird which is an e-mail client
64
00:05:17,550 --> 00:05:20,640
POJO message here options.
65
00:05:20,880 --> 00:05:22,850
Choose your privacy mode.
66
00:05:22,990 --> 00:05:24,860
And here is how you can encrypt your e-mail.
67
00:05:24,870 --> 00:05:29,100
You can use BGP mime PGE pay DGP in line
68
00:05:32,220 --> 00:05:33,720
and then you choose to encrypt it.
69
00:05:33,720 --> 00:05:37,630
That would be encrypted for a particular recipient.
70
00:05:37,730 --> 00:05:39,540
You would need to know their public key.
71
00:05:39,540 --> 00:05:44,720
And then again if you're going to sign it and be signed with your own private key.
72
00:05:45,030 --> 00:05:50,030
We'll talk more on that and it's section close that you know to use e-mail.
73
00:05:50,130 --> 00:05:55,190
You probably do need persistence because you need to have people's keys and your key.
74
00:05:55,290 --> 00:05:57,950
So you need some way of storing those.
75
00:05:58,010 --> 00:06:00,880
And we cover e-mail security in its own section.
76
00:06:00,900 --> 00:06:08,190
Then you got the Tor browser itself which click on there which will open up this as you're aware javascript
77
00:06:08,280 --> 00:06:15,590
is an exploitation method which must be disabled if you care about your anonymity uses the tool here
78
00:06:15,590 --> 00:06:15,780
.
79
00:06:15,810 --> 00:06:24,750
No script to disable Javascript so you'd have to click on forbid script globally and that's extremely
80
00:06:24,750 --> 00:06:30,570
extremely important to make sure you do that to disable javascript if you care about your anonymity
81
00:06:30,590 --> 00:06:30,790
.
82
00:06:30,990 --> 00:06:37,050
But of course it does stop many sites from working and we have a quick look through here and the applications
83
00:06:37,290 --> 00:06:43,450
they can see Key Pass graphics applications go Bitcoin wallet.
84
00:06:43,460 --> 00:06:47,930
There's I still of pigeon an unsafe browser.
85
00:06:48,500 --> 00:06:49,890
Are your office tools
86
00:06:52,520 --> 00:06:55,040
listening to music and recording sound.
87
00:06:55,680 --> 00:07:03,150
And there's the meta data or anonymization tool kit fidelity metor data and EXIF data in files.
88
00:07:03,900 --> 00:07:10,770
And there's the there it is there's a text installer which means you can store clone or grade tails
89
00:07:12,840 --> 00:07:22,530
gives you the options here to access ITP press tap when it boots up and you need to put to pay here
90
00:07:23,010 --> 00:07:30,160
written and this will start with a connection to ITP.
91
00:07:30,240 --> 00:07:32,650
This is the welcome screen.
92
00:07:32,850 --> 00:07:36,120
You can change your various settings
93
00:07:39,390 --> 00:07:44,790
and you have more options if you click on yes for more options and forward get the option of entering
94
00:07:44,790 --> 00:07:46,480
an administrator password.
95
00:07:46,740 --> 00:07:49,200
You can camouflage as Windows.
96
00:07:49,230 --> 00:07:54,590
If you click that it will look a little bit like Windows 8 instead of tool.
97
00:07:54,960 --> 00:08:01,170
You can remove Mac spoofing you may want to do that if you have a specific Mac address that is enabled
98
00:08:01,170 --> 00:08:08,650
on a y fine network or something like that if you wish to obfuscate your connection in some way.
99
00:08:08,790 --> 00:08:14,520
So look maybe like you're not going through Tor you want to evade censorship and go through firewalls
100
00:08:14,980 --> 00:08:16,110
then you would select this.
101
00:08:16,110 --> 00:08:19,160
This is functionality of Tor.
102
00:08:19,410 --> 00:08:24,990
And then you'll be able to further enable that and perhaps select a bridge M-Fer the settings and you
103
00:08:24,990 --> 00:08:30,810
should like this if you wish to have no internet connection at all and you want to disable all internet
104
00:08:30,810 --> 00:08:36,840
activity and work off line.
105
00:08:38,070 --> 00:08:49,050
It is booting up now now you'll get some messages or Popple and you have to wait for your green onion
106
00:08:49,170 --> 00:08:54,950
indicating that you've successfully connected to the network or to pay
107
00:08:58,620 --> 00:09:05,580
and you can see here the ITP router is ready because I tabbed on loggin and put in to pay
108
00:09:08,890 --> 00:09:11,130
his the ITP browser
109
00:09:15,410 --> 00:09:18,030
and that will give me access to honor to pay.
110
00:09:18,090 --> 00:09:18,970
That's what it is.
111
00:09:18,970 --> 00:09:20,180
Well it looks like.
112
00:09:20,420 --> 00:09:25,650
And these are the various services and will cover that in own section.
113
00:09:26,460 --> 00:09:32,410
So that's a quick going over of tails best place for information.
114
00:09:32,430 --> 00:09:33,350
Is there site.
115
00:09:33,360 --> 00:09:40,800
Obviously this software is going to be updated all the time it is as they say a work in progress but
116
00:09:40,860 --> 00:09:42,510
it is quite well documented.
117
00:09:42,720 --> 00:09:48,030
If you go for the documentation you can find out a lot more about how it works.
12273
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.