All language subtitles for 038 What should Tor be used for-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,020 --> 00:00:10,530 What does and does not do and what is designed for and what it will and will not protect you from without 2 00:00:10,570 --> 00:00:15,240 a special configuration tool is designed to do the following. 3 00:00:15,240 --> 00:00:23,490 So it anonymize is the browser's connection to Web sites and that's the browser only you have to specially 4 00:00:23,490 --> 00:00:29,820 configure other applications to use the TOR proxy if you want them to use Tor. 5 00:00:29,880 --> 00:00:37,020 So after installing only the all browser uses Tor don't make the mistake of thinking all the applications 6 00:00:37,020 --> 00:00:40,650 now go through toll just because you've installed the Tor browser. 7 00:00:40,650 --> 00:00:42,090 That's not the case. 8 00:00:42,090 --> 00:00:48,510 It's only the top browser that goes through Tor unless you make special configuration. 9 00:00:48,510 --> 00:00:54,450 It focuses on protecting the transportation of data only. 10 00:00:54,810 --> 00:01:02,310 It prevents your Internet service provider or local network for knowing what sites you are visiting 11 00:01:02,310 --> 00:01:02,960 . 12 00:01:02,970 --> 00:01:09,780 It prevents a site you are visiting from knowing who you are unless you tell them in some way like by 13 00:01:10,080 --> 00:01:15,630 logging in very simple if you go to Facebook via a tour log in yourself. 14 00:01:15,660 --> 00:01:18,030 That's pretty pointless. 15 00:01:18,030 --> 00:01:26,010 It prevents tracking because sites have no idea if you visited the site before you are coming from different 16 00:01:26,070 --> 00:01:31,730 IP addresses and you are not maintaining tracking information within the browser. 17 00:01:32,250 --> 00:01:40,560 It can help you evade censorship and it allows you to access the tall dark net or hidden services via 18 00:01:40,560 --> 00:01:44,160 the dot on your own addresses. 19 00:01:44,150 --> 00:01:52,470 Some other things now that Tor does not protect you from Tor doesn't prevent your ISP or local network 20 00:01:52,500 --> 00:01:58,320 or country or whoever is watching from knowing that you use toll. 21 00:01:58,330 --> 00:02:01,540 Unless special configuration is made. 22 00:02:01,590 --> 00:02:11,640 This is because tool is a distinctive SSL T.L. connection with deep inspection Tor traffic can be identified 23 00:02:11,640 --> 00:02:11,760 . 24 00:02:11,790 --> 00:02:18,720 You can use bridges change VPN pluggable transport and all the work arounds to avoid this detection 25 00:02:19,200 --> 00:02:21,600 which we will cover shortly. 26 00:02:21,750 --> 00:02:29,670 Toile does not prevent a site you are visiting from knowing you are using tor the Tor exit relays on 27 00:02:29,670 --> 00:02:35,430 known and the Tor browser has a unique fingerprint. 28 00:02:35,460 --> 00:02:40,620 Tor does not make applications other than the Tor browser use Tor. 29 00:02:40,770 --> 00:02:48,760 As I've already mentioned including anything you download like for example a PDA for executable wants 30 00:02:48,810 --> 00:02:51,500 downloaded and accessed. 31 00:02:51,630 --> 00:02:58,890 Run it could reach out and diea anonymize you it won't go through the toll network. 32 00:02:58,890 --> 00:03:05,160 It can just reach out connect to a server of some sort or then that Civ is going to know your real IP 33 00:03:05,160 --> 00:03:13,740 address and where you're coming from Tor cannot remove all browser vulnerabilities Soval Brown's vulnerabilities 34 00:03:14,100 --> 00:03:16,610 and stop all browser exploits. 35 00:03:16,710 --> 00:03:24,450 It just attempts to mitigate them is not going to protect you against any active content. 36 00:03:24,450 --> 00:03:34,610 If you are allowing it to run Java JavaScript Adobe Flash Adobe shockwave quick time reload Active-X 37 00:03:34,620 --> 00:03:44,460 controls and VB scripts and binary applications setting the security and privacy setting on high will 38 00:03:44,520 --> 00:03:53,420 mitigate javascript only javascript is installed and enabled by default all the rest of the others that 39 00:03:53,420 --> 00:03:57,700 I've gone through are not present unless you install them. 40 00:03:57,780 --> 00:04:00,400 If you install them you are at risk. 41 00:04:00,420 --> 00:04:07,110 Toll the toll browser does not protect you against vulnerabilities and attacks related to that active 42 00:04:07,110 --> 00:04:08,150 content. 43 00:04:08,190 --> 00:04:16,560 Therefore it is not going to protect you from issues related to add ons and extensions that you install 44 00:04:16,560 --> 00:04:23,970 is not recommended you install any other extensions or add ons there's no protection from malware that 45 00:04:23,970 --> 00:04:28,410 is on a Web site or especially on your laptop. 46 00:04:28,420 --> 00:04:32,290 No protection from your operating system being compromised. 47 00:04:32,370 --> 00:04:38,550 No protection from hardware compromises is not going to prevent someone watching over your shoulder 48 00:04:38,630 --> 00:04:39,080 . 49 00:04:39,190 --> 00:04:44,060 No protection from man in the middle or man on the side attacks. 50 00:04:44,190 --> 00:04:46,770 There's no protection from attachments. 51 00:04:46,860 --> 00:04:52,080 It doesn't remove personal information from documents if you're going to send them. 52 00:04:52,230 --> 00:04:59,700 And there's no protection from doing something stupid like logging into a web site and thinking your 53 00:04:59,770 --> 00:05:01,610 circ is still anonymous. 54 00:05:01,650 --> 00:05:11,090 When you've logged in as your real identity this is check dot whole project all talk check will let 55 00:05:11,090 --> 00:05:19,220 you know if you're connected to the network and if it's with the top browser you will also be able to 56 00:05:19,220 --> 00:05:23,780 see if Javascript is enabled or disabled. 57 00:05:23,780 --> 00:05:33,020 If we scroll down here we can see javascript is disabled and we can also see the IP address and make 58 00:05:33,020 --> 00:05:38,680 sure that that is not our actual ISP assigned IP address. 59 00:05:38,780 --> 00:05:45,350 It's always good when you use Tor the very first thing that you do is to check that Tor is functioning 60 00:05:45,350 --> 00:05:53,490 correctly and that you have your security settings set the way that you want them. 61 00:05:54,560 --> 00:06:01,550 Make this your routine always check this page and that your IP address has changed javascript. 62 00:06:01,550 --> 00:06:06,720 Make sure that that is disabled and your security settings are high. 63 00:06:06,750 --> 00:06:11,730 The browser enables javascript and other controls by default. 64 00:06:11,900 --> 00:06:20,360 So if security privacy and anonymity is imperative to you then you have to change the setting too high 65 00:06:20,370 --> 00:06:22,580 security as you see here. 66 00:06:22,580 --> 00:06:28,460 This will obviously restrict the functionality of some sites as we've discussed in some length as you 67 00:06:28,460 --> 00:06:36,170 know that javascript is required and some of these other features on some sites that unfortunately is 68 00:06:36,170 --> 00:06:44,120 the sacrifice that you have to make the Tor Project provide some solid advice on using Tor which is 69 00:06:44,120 --> 00:06:46,140 worth going through now. 70 00:06:46,220 --> 00:06:49,120 First one is used the Tor browser. 71 00:06:49,280 --> 00:06:55,040 If you have gone through the tracking and browsing section on the coals you will know the many ways 72 00:06:55,040 --> 00:07:00,130 that the browser can be manipulated to give up your privacy and anonymity. 73 00:07:00,260 --> 00:07:01,830 So you have two choices. 74 00:07:01,970 --> 00:07:08,630 Either use it or browser or harden a browser yourself as detailed in the browser section. 75 00:07:08,780 --> 00:07:16,340 Or you could find another alternative hard and browser for the tool browser is the easiest option and 76 00:07:16,700 --> 00:07:21,710 better option for Tor security privacy and anonymity. 77 00:07:21,870 --> 00:07:27,720 But our product is also saying here that if you try to use another application like for example your 78 00:07:27,770 --> 00:07:36,560 email client with Tor it is risky because it might leak information like DNS and we will talk more about 79 00:07:36,560 --> 00:07:37,570 that shortly. 80 00:07:37,580 --> 00:07:40,320 And mitigations to prevent that. 81 00:07:40,790 --> 00:07:46,940 I'm sure a lot of people consider Tor for targeting unfortunately turns are leaky. 82 00:07:47,090 --> 00:07:53,570 And if we look here there's a good post on it and the research paper if you want to understand more 83 00:07:53,580 --> 00:07:53,630 . 84 00:07:53,660 --> 00:08:00,410 But what they say is the torrent file sharing applications have been observed to ignore proxy settings 85 00:08:00,750 --> 00:08:07,430 and make direct connections even when they are told not to mean by direct connections is connections 86 00:08:07,520 --> 00:08:13,260 not going over Tor even if your target application connects only through Tor. 87 00:08:13,310 --> 00:08:23,150 You will often send out your real IP address in the tracker get request because that's how turn's work 88 00:08:23,150 --> 00:08:23,420 . 89 00:08:23,430 --> 00:08:30,320 Plus you slow down the Tor network which they don't really appreciate. 90 00:08:30,320 --> 00:08:37,270 The next one is don't enable or install browser plug ins and that will apply to extensions as well. 91 00:08:37,350 --> 00:08:45,110 Yes there is still any add ons or extensions to that or browser as this will alter your browser fingerprint 92 00:08:45,140 --> 00:08:51,540 and uniquely identify you and those extensions or add ons could make you more vulnerable. 93 00:08:51,560 --> 00:08:54,010 They could be a platform for attack. 94 00:08:54,140 --> 00:08:57,560 So don't do it unless you really know what you're doing. 95 00:08:57,710 --> 00:09:05,600 And the next one use hated U.P.S. versions of Web sites as it says here total encrypt your traffic to 96 00:09:05,900 --> 00:09:11,900 and within the Tor network the encryption of the traffic to the final destination Web site depends upon 97 00:09:11,900 --> 00:09:16,160 that Web site i.e. you have to be connecting to an HDD Web site. 98 00:09:16,250 --> 00:09:23,960 You have to use hated CPS or end to end encryption to stop the exit node seeing all your traffic which 99 00:09:23,960 --> 00:09:25,370 is pretty obvious. 100 00:09:25,550 --> 00:09:31,860 And in fact anyone who is observing the exit no traffic can also read the traffic if it's on encrypted 101 00:09:32,150 --> 00:09:34,250 and inject into your traffic. 102 00:09:34,250 --> 00:09:38,940 Remember it's not just that they can read your traffic if it's on encrypted they can inject malicious 103 00:09:38,930 --> 00:09:41,080 code into the traffic as well. 104 00:09:41,120 --> 00:09:48,560 If they are a man in the middle once it has left the exit node don't open documents downloaded through 105 00:09:48,570 --> 00:09:48,980 Tor. 106 00:09:49,010 --> 00:09:55,400 While online there's no protection from attachments using Tor which we've already mentioned the usual 107 00:09:55,400 --> 00:10:02,960 precautions for any downloaded file should obviously be taken if you just open a file you can just connect 108 00:10:02,960 --> 00:10:05,570 out and not and not go via Tor. 109 00:10:05,580 --> 00:10:07,010 So don't do it. 110 00:10:07,010 --> 00:10:09,680 We'll discuss mitigations later to that. 111 00:10:09,920 --> 00:10:14,120 And the last one used bridge and or fine company. 112 00:10:14,120 --> 00:10:20,430 So we're going to talk about what bridges are and how to use them shortly in another video. 113 00:10:20,770 --> 00:10:25,460 So that's a video on what Tor does and does not do what it is designed for what it will protect you 114 00:10:25,460 --> 00:10:27,980 from and what it won't protect you from. 115 00:10:27,980 --> 00:10:35,780 So I hope that has helped to give you an idea an overview of why or if you should be using Tor 13100

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.