Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,020 --> 00:00:10,530
What does and does not do and what is designed for and what it will and will not protect you from without
2
00:00:10,570 --> 00:00:15,240
a special configuration tool is designed to do the following.
3
00:00:15,240 --> 00:00:23,490
So it anonymize is the browser's connection to Web sites and that's the browser only you have to specially
4
00:00:23,490 --> 00:00:29,820
configure other applications to use the TOR proxy if you want them to use Tor.
5
00:00:29,880 --> 00:00:37,020
So after installing only the all browser uses Tor don't make the mistake of thinking all the applications
6
00:00:37,020 --> 00:00:40,650
now go through toll just because you've installed the Tor browser.
7
00:00:40,650 --> 00:00:42,090
That's not the case.
8
00:00:42,090 --> 00:00:48,510
It's only the top browser that goes through Tor unless you make special configuration.
9
00:00:48,510 --> 00:00:54,450
It focuses on protecting the transportation of data only.
10
00:00:54,810 --> 00:01:02,310
It prevents your Internet service provider or local network for knowing what sites you are visiting
11
00:01:02,310 --> 00:01:02,960
.
12
00:01:02,970 --> 00:01:09,780
It prevents a site you are visiting from knowing who you are unless you tell them in some way like by
13
00:01:10,080 --> 00:01:15,630
logging in very simple if you go to Facebook via a tour log in yourself.
14
00:01:15,660 --> 00:01:18,030
That's pretty pointless.
15
00:01:18,030 --> 00:01:26,010
It prevents tracking because sites have no idea if you visited the site before you are coming from different
16
00:01:26,070 --> 00:01:31,730
IP addresses and you are not maintaining tracking information within the browser.
17
00:01:32,250 --> 00:01:40,560
It can help you evade censorship and it allows you to access the tall dark net or hidden services via
18
00:01:40,560 --> 00:01:44,160
the dot on your own addresses.
19
00:01:44,150 --> 00:01:52,470
Some other things now that Tor does not protect you from Tor doesn't prevent your ISP or local network
20
00:01:52,500 --> 00:01:58,320
or country or whoever is watching from knowing that you use toll.
21
00:01:58,330 --> 00:02:01,540
Unless special configuration is made.
22
00:02:01,590 --> 00:02:11,640
This is because tool is a distinctive SSL T.L. connection with deep inspection Tor traffic can be identified
23
00:02:11,640 --> 00:02:11,760
.
24
00:02:11,790 --> 00:02:18,720
You can use bridges change VPN pluggable transport and all the work arounds to avoid this detection
25
00:02:19,200 --> 00:02:21,600
which we will cover shortly.
26
00:02:21,750 --> 00:02:29,670
Toile does not prevent a site you are visiting from knowing you are using tor the Tor exit relays on
27
00:02:29,670 --> 00:02:35,430
known and the Tor browser has a unique fingerprint.
28
00:02:35,460 --> 00:02:40,620
Tor does not make applications other than the Tor browser use Tor.
29
00:02:40,770 --> 00:02:48,760
As I've already mentioned including anything you download like for example a PDA for executable wants
30
00:02:48,810 --> 00:02:51,500
downloaded and accessed.
31
00:02:51,630 --> 00:02:58,890
Run it could reach out and diea anonymize you it won't go through the toll network.
32
00:02:58,890 --> 00:03:05,160
It can just reach out connect to a server of some sort or then that Civ is going to know your real IP
33
00:03:05,160 --> 00:03:13,740
address and where you're coming from Tor cannot remove all browser vulnerabilities Soval Brown's vulnerabilities
34
00:03:14,100 --> 00:03:16,610
and stop all browser exploits.
35
00:03:16,710 --> 00:03:24,450
It just attempts to mitigate them is not going to protect you against any active content.
36
00:03:24,450 --> 00:03:34,610
If you are allowing it to run Java JavaScript Adobe Flash Adobe shockwave quick time reload Active-X
37
00:03:34,620 --> 00:03:44,460
controls and VB scripts and binary applications setting the security and privacy setting on high will
38
00:03:44,520 --> 00:03:53,420
mitigate javascript only javascript is installed and enabled by default all the rest of the others that
39
00:03:53,420 --> 00:03:57,700
I've gone through are not present unless you install them.
40
00:03:57,780 --> 00:04:00,400
If you install them you are at risk.
41
00:04:00,420 --> 00:04:07,110
Toll the toll browser does not protect you against vulnerabilities and attacks related to that active
42
00:04:07,110 --> 00:04:08,150
content.
43
00:04:08,190 --> 00:04:16,560
Therefore it is not going to protect you from issues related to add ons and extensions that you install
44
00:04:16,560 --> 00:04:23,970
is not recommended you install any other extensions or add ons there's no protection from malware that
45
00:04:23,970 --> 00:04:28,410
is on a Web site or especially on your laptop.
46
00:04:28,420 --> 00:04:32,290
No protection from your operating system being compromised.
47
00:04:32,370 --> 00:04:38,550
No protection from hardware compromises is not going to prevent someone watching over your shoulder
48
00:04:38,630 --> 00:04:39,080
.
49
00:04:39,190 --> 00:04:44,060
No protection from man in the middle or man on the side attacks.
50
00:04:44,190 --> 00:04:46,770
There's no protection from attachments.
51
00:04:46,860 --> 00:04:52,080
It doesn't remove personal information from documents if you're going to send them.
52
00:04:52,230 --> 00:04:59,700
And there's no protection from doing something stupid like logging into a web site and thinking your
53
00:04:59,770 --> 00:05:01,610
circ is still anonymous.
54
00:05:01,650 --> 00:05:11,090
When you've logged in as your real identity this is check dot whole project all talk check will let
55
00:05:11,090 --> 00:05:19,220
you know if you're connected to the network and if it's with the top browser you will also be able to
56
00:05:19,220 --> 00:05:23,780
see if Javascript is enabled or disabled.
57
00:05:23,780 --> 00:05:33,020
If we scroll down here we can see javascript is disabled and we can also see the IP address and make
58
00:05:33,020 --> 00:05:38,680
sure that that is not our actual ISP assigned IP address.
59
00:05:38,780 --> 00:05:45,350
It's always good when you use Tor the very first thing that you do is to check that Tor is functioning
60
00:05:45,350 --> 00:05:53,490
correctly and that you have your security settings set the way that you want them.
61
00:05:54,560 --> 00:06:01,550
Make this your routine always check this page and that your IP address has changed javascript.
62
00:06:01,550 --> 00:06:06,720
Make sure that that is disabled and your security settings are high.
63
00:06:06,750 --> 00:06:11,730
The browser enables javascript and other controls by default.
64
00:06:11,900 --> 00:06:20,360
So if security privacy and anonymity is imperative to you then you have to change the setting too high
65
00:06:20,370 --> 00:06:22,580
security as you see here.
66
00:06:22,580 --> 00:06:28,460
This will obviously restrict the functionality of some sites as we've discussed in some length as you
67
00:06:28,460 --> 00:06:36,170
know that javascript is required and some of these other features on some sites that unfortunately is
68
00:06:36,170 --> 00:06:44,120
the sacrifice that you have to make the Tor Project provide some solid advice on using Tor which is
69
00:06:44,120 --> 00:06:46,140
worth going through now.
70
00:06:46,220 --> 00:06:49,120
First one is used the Tor browser.
71
00:06:49,280 --> 00:06:55,040
If you have gone through the tracking and browsing section on the coals you will know the many ways
72
00:06:55,040 --> 00:07:00,130
that the browser can be manipulated to give up your privacy and anonymity.
73
00:07:00,260 --> 00:07:01,830
So you have two choices.
74
00:07:01,970 --> 00:07:08,630
Either use it or browser or harden a browser yourself as detailed in the browser section.
75
00:07:08,780 --> 00:07:16,340
Or you could find another alternative hard and browser for the tool browser is the easiest option and
76
00:07:16,700 --> 00:07:21,710
better option for Tor security privacy and anonymity.
77
00:07:21,870 --> 00:07:27,720
But our product is also saying here that if you try to use another application like for example your
78
00:07:27,770 --> 00:07:36,560
email client with Tor it is risky because it might leak information like DNS and we will talk more about
79
00:07:36,560 --> 00:07:37,570
that shortly.
80
00:07:37,580 --> 00:07:40,320
And mitigations to prevent that.
81
00:07:40,790 --> 00:07:46,940
I'm sure a lot of people consider Tor for targeting unfortunately turns are leaky.
82
00:07:47,090 --> 00:07:53,570
And if we look here there's a good post on it and the research paper if you want to understand more
83
00:07:53,580 --> 00:07:53,630
.
84
00:07:53,660 --> 00:08:00,410
But what they say is the torrent file sharing applications have been observed to ignore proxy settings
85
00:08:00,750 --> 00:08:07,430
and make direct connections even when they are told not to mean by direct connections is connections
86
00:08:07,520 --> 00:08:13,260
not going over Tor even if your target application connects only through Tor.
87
00:08:13,310 --> 00:08:23,150
You will often send out your real IP address in the tracker get request because that's how turn's work
88
00:08:23,150 --> 00:08:23,420
.
89
00:08:23,430 --> 00:08:30,320
Plus you slow down the Tor network which they don't really appreciate.
90
00:08:30,320 --> 00:08:37,270
The next one is don't enable or install browser plug ins and that will apply to extensions as well.
91
00:08:37,350 --> 00:08:45,110
Yes there is still any add ons or extensions to that or browser as this will alter your browser fingerprint
92
00:08:45,140 --> 00:08:51,540
and uniquely identify you and those extensions or add ons could make you more vulnerable.
93
00:08:51,560 --> 00:08:54,010
They could be a platform for attack.
94
00:08:54,140 --> 00:08:57,560
So don't do it unless you really know what you're doing.
95
00:08:57,710 --> 00:09:05,600
And the next one use hated U.P.S. versions of Web sites as it says here total encrypt your traffic to
96
00:09:05,900 --> 00:09:11,900
and within the Tor network the encryption of the traffic to the final destination Web site depends upon
97
00:09:11,900 --> 00:09:16,160
that Web site i.e. you have to be connecting to an HDD Web site.
98
00:09:16,250 --> 00:09:23,960
You have to use hated CPS or end to end encryption to stop the exit node seeing all your traffic which
99
00:09:23,960 --> 00:09:25,370
is pretty obvious.
100
00:09:25,550 --> 00:09:31,860
And in fact anyone who is observing the exit no traffic can also read the traffic if it's on encrypted
101
00:09:32,150 --> 00:09:34,250
and inject into your traffic.
102
00:09:34,250 --> 00:09:38,940
Remember it's not just that they can read your traffic if it's on encrypted they can inject malicious
103
00:09:38,930 --> 00:09:41,080
code into the traffic as well.
104
00:09:41,120 --> 00:09:48,560
If they are a man in the middle once it has left the exit node don't open documents downloaded through
105
00:09:48,570 --> 00:09:48,980
Tor.
106
00:09:49,010 --> 00:09:55,400
While online there's no protection from attachments using Tor which we've already mentioned the usual
107
00:09:55,400 --> 00:10:02,960
precautions for any downloaded file should obviously be taken if you just open a file you can just connect
108
00:10:02,960 --> 00:10:05,570
out and not and not go via Tor.
109
00:10:05,580 --> 00:10:07,010
So don't do it.
110
00:10:07,010 --> 00:10:09,680
We'll discuss mitigations later to that.
111
00:10:09,920 --> 00:10:14,120
And the last one used bridge and or fine company.
112
00:10:14,120 --> 00:10:20,430
So we're going to talk about what bridges are and how to use them shortly in another video.
113
00:10:20,770 --> 00:10:25,460
So that's a video on what Tor does and does not do what it is designed for what it will protect you
114
00:10:25,460 --> 00:10:27,980
from and what it won't protect you from.
115
00:10:27,980 --> 00:10:35,780
So I hope that has helped to give you an idea an overview of why or if you should be using Tor
13100
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.