1 00:00:00,760 --> 00:00:02,620 Welcome back, guys, in this lecture. 2 00:00:02,650 --> 00:00:07,120 We're going to learn about these deals as another way to protect your privacy. 3 00:00:07,660 --> 00:00:10,570 And it's my personal favorite and it's the best. 4 00:00:10,900 --> 00:00:18,930 So what is the full form of the is the amnesiac incognito lab system that uses an operating system built 5 00:00:18,940 --> 00:00:23,190 using Linux, and it mainly uses talk to send any kind of traffic. 6 00:00:23,770 --> 00:00:29,590 It has almost all rules of the dock where preinstalled and can be used on a USB drive already with delay 7 00:00:29,680 --> 00:00:30,570 on any computer. 8 00:00:31,690 --> 00:00:36,370 And when it is ejected, it deletes all the data stored or processed in the device. 9 00:00:36,370 --> 00:00:42,310 So it leaves no digital traces and it's not possible to prove that this was used on a particular device. 10 00:00:43,090 --> 00:00:46,080 Let's wrap it up again and this time in a very simple language. 11 00:00:46,210 --> 00:00:53,650 So basically, this is an operating system installed in a USB drive or DVD I looked at can be used on 12 00:00:53,650 --> 00:00:54,370 any device. 13 00:00:54,370 --> 00:00:58,750 You just need to plug in the USB or DVD and you get your own OS. 14 00:00:58,750 --> 00:01:03,890 Plus, please just delete does not right or stored any kind of files in the computer. 15 00:01:04,420 --> 00:01:09,670 Everything is processed in the processing unit of the computer, by which I mean if you download any 16 00:01:09,670 --> 00:01:16,750 type of cookies or any type of files from the doc that are everything that you have downloaded is stored 17 00:01:16,750 --> 00:01:21,010 in the processing unit of the computer, not in the hard drive of the computer literate. 18 00:01:21,490 --> 00:01:28,390 When the USB port will be is plugged out, all the data into the computer related to this is permanently 19 00:01:28,390 --> 00:01:28,900 deleted. 20 00:01:29,350 --> 00:01:35,920 Even all the files stored in the USB or DVD dates which contain these are deleted do it as compared 21 00:01:35,920 --> 00:01:37,800 to using stored on our next device. 22 00:01:37,810 --> 00:01:42,580 It is more safe to use tor using these and these are super safe. 23 00:01:42,580 --> 00:01:48,340 Like if you are using it on a device and you are attacked by a group of hackers, you just need to plug 24 00:01:48,340 --> 00:01:52,290 out the drive and your data as well as your device to see from any kind of threat. 25 00:01:52,810 --> 00:01:58,420 And as course as we are focusing more on the browser and on the Dark Web, of course. 26 00:01:59,780 --> 00:02:05,030 The further details lied about things like installing it, and it's important to say things are not 27 00:02:05,030 --> 00:02:12,450 discussed, but but if you want me to update the causality totals, you can always write mean that uniforms. 28 00:02:13,310 --> 00:02:17,570 One of those suggestions, of course, you also get guess so decisions will be taken seriously and we 29 00:02:17,570 --> 00:02:19,970 will try our best to satisfy over this course. 30 00:02:20,630 --> 00:02:21,080 Thank you. 31 00:02:21,230 --> 00:02:23,870 That's it for this lecture in the next lecture. 32 00:02:23,900 --> 00:02:29,300 We are leaving the theoretical stuff and moving forward with the practical super fun. 33 00:02:29,480 --> 00:02:30,390 And we'll see you there. 34 00:02:30,920 --> 00:02:31,730 Thank you very much.