1 00:00:00,120 --> 00:00:01,010 Welcome back, everyone. 2 00:00:01,410 --> 00:00:06,690 This as the day goes on dark web anonymity and cyber security. 3 00:00:07,260 --> 00:00:15,860 I welcome back to one more lovely, beautiful and extremely useful content. 4 00:00:16,410 --> 00:00:23,910 The cause is all about making use of dark web and being anonymous at the same time. 5 00:00:24,510 --> 00:00:31,920 And at the end, we'll learn what other different steps are of making use of cyber security the best 6 00:00:31,920 --> 00:00:38,790 practices to be in a private mode while accessing the public content. 7 00:00:38,910 --> 00:00:39,360 All right. 8 00:00:39,360 --> 00:00:45,090 So we'll first start with the what are the risks involved when you are accessing? 9 00:00:45,090 --> 00:00:51,180 Because, I mean, sorry, not really the course that we are doing at this moment, but accessing some 10 00:00:51,180 --> 00:01:00,770 of the content that you feel very private or maybe you are in in a business where free speech is is 11 00:01:00,780 --> 00:01:06,090 really, really important, where your activity belongs to press. 12 00:01:06,480 --> 00:01:06,870 All right. 13 00:01:07,140 --> 00:01:13,310 So this is where having your having the power of being anonymous is very, very important. 14 00:01:13,470 --> 00:01:22,380 And that's where we learn more about making use of dark web to access some of to not really to access, 15 00:01:22,710 --> 00:01:26,970 but to see what are the different content available. 16 00:01:27,150 --> 00:01:27,960 Is it good? 17 00:01:27,960 --> 00:01:28,830 Is it bad? 18 00:01:29,130 --> 00:01:33,630 And for sure, it's going to be bad for 90 percent or 95 percent of the time. 19 00:01:33,660 --> 00:01:37,710 But it is important to look at it what all it is at the same time. 20 00:01:38,310 --> 00:01:44,420 But also see if you are even using making use of your public web, the freely available web. 21 00:01:44,610 --> 00:01:51,370 What are the different steps of being being into private mode or anonymous so that whatever activity 22 00:01:51,370 --> 00:01:52,860 you doing, you'll still be safe? 23 00:01:53,040 --> 00:01:53,450 All right. 24 00:01:53,850 --> 00:01:54,850 So let's get started. 25 00:01:55,230 --> 00:02:00,960 The first thing that we learn as the introduction of the scores and over here we learn about different 26 00:02:00,960 --> 00:02:02,130 risk involved with it. 27 00:02:02,520 --> 00:02:12,150 So if if you are an end user, as I told you in the business of, you know, free speech or press related 28 00:02:12,150 --> 00:02:20,930 stuff, or maybe you have some content which can send which can be very sensitive to somebody out there. 29 00:02:21,030 --> 00:02:21,350 Right. 30 00:02:21,570 --> 00:02:23,850 So in that case, it is very important for you. 31 00:02:24,030 --> 00:02:28,350 But before we do that, we need to understand where the risk really recites. 32 00:02:28,360 --> 00:02:28,690 All right. 33 00:02:29,040 --> 00:02:35,920 The first thing is your hardware itself, your your system, your laptop, your mobile phone, anything. 34 00:02:35,940 --> 00:02:36,280 All right. 35 00:02:36,540 --> 00:02:42,030 So anything related to your hardware system from which you're accessing to the rest of the world, that's 36 00:02:42,030 --> 00:02:47,250 where the risk resides with you might be having your data, but that doesn't get erased, wiped out 37 00:02:47,460 --> 00:02:50,120 whenever you you know, you make use of it. 38 00:02:50,370 --> 00:02:55,410 That becomes a risk for you because that's where the persistence or the part of data really resides. 39 00:02:55,710 --> 00:03:01,830 Even if you're making use of encryption technology that are software that are agencies out there who 40 00:03:01,830 --> 00:03:05,830 can grab those information if they if they want it. 41 00:03:06,150 --> 00:03:06,520 All right. 42 00:03:06,900 --> 00:03:14,160 Next is the operating system, and I understand this operating system, how to use help use to make 43 00:03:14,160 --> 00:03:16,350 or make use of all your application. 44 00:03:16,710 --> 00:03:19,050 And that runs on your hardware. 45 00:03:19,050 --> 00:03:19,390 Right. 46 00:03:19,410 --> 00:03:27,960 Maybe you talk about Windows, maybe you talk about your Mac OS, you have a window or a Kleenex, anything 47 00:03:28,200 --> 00:03:29,290 you can call as well. 48 00:03:29,730 --> 00:03:32,570 This all our operating system. 49 00:03:32,580 --> 00:03:39,390 And now if these these can store the information because we never know. 50 00:03:39,390 --> 00:03:42,290 There's the the open source information, that's good enough. 51 00:03:42,300 --> 00:03:48,810 But at the same time, Windows or Mac with the third body, I mean, this are the private organization 52 00:03:49,080 --> 00:03:51,090 and we don't have any control about it. 53 00:03:51,120 --> 00:03:51,410 Right. 54 00:03:51,870 --> 00:03:58,080 So the next thing as the browsers so understand this, what you do in the public network, you can either 55 00:03:58,080 --> 00:04:05,610 do it, maybe email one musician or maybe on the browser and browser is something which made all the 56 00:04:05,610 --> 00:04:09,250 activity available without installing in Egypt. 57 00:04:09,270 --> 00:04:09,590 Right. 58 00:04:09,750 --> 00:04:16,260 So we are in a situation we are in the period in era where everything has gone into the application, 59 00:04:16,320 --> 00:04:23,070 starting from your email conversation to chat to even to your Internet banking information or maybe 60 00:04:23,070 --> 00:04:29,820 your browsing to any of everything can be tracked if everything goes to the other party, goes to the 61 00:04:29,820 --> 00:04:36,720 any other corner of the world through the gateway and this gateway process or a centimeter of the traffic 62 00:04:37,050 --> 00:04:44,910 to the national agencies to have a proper surveillance to all their citizens for any purpose to to influence 63 00:04:44,910 --> 00:04:49,320 or to have a proper monitoring to their activity, all the stuff. 64 00:04:49,320 --> 00:04:49,550 Right. 65 00:04:50,190 --> 00:04:52,860 And that's where the risk for later sites. 66 00:04:52,860 --> 00:04:53,150 Right. 67 00:04:53,580 --> 00:04:55,650 And then it comes to the e-mail. 68 00:04:55,770 --> 00:04:58,190 E-mail that you make use of maybe Gmail. 69 00:04:58,190 --> 00:04:59,570 I think Yahoo! 70 00:04:59,950 --> 00:05:06,760 All these are made for the purpose of productivity, for giving you a useful platform to send an e-mail, 71 00:05:06,760 --> 00:05:13,540 but doesn't provide any sort of private or anonymity, because this is where if you send an email, 72 00:05:13,540 --> 00:05:19,450 it goes to their server and from there it can be traced to multiple other client or maybe can be sent 73 00:05:19,450 --> 00:05:21,220 to the receiver as well. 74 00:05:22,030 --> 00:05:29,120 So there's no sort of anonymity, no sort of sort of private or making it anonymous as well. 75 00:05:29,530 --> 00:05:32,560 And the next thing is you're verifying the source. 76 00:05:32,860 --> 00:05:39,970 Of course, it sounds really crazy, but yes, it is, because if you have, I'm not sure if you have 77 00:05:40,180 --> 00:05:47,830 looked at my all your other ethical hacking content courses you will find if somebody get the access 78 00:05:47,830 --> 00:05:55,960 to your wireless network, it can see it can actually get to see what all you do right for the health 79 00:05:55,960 --> 00:06:02,740 of man in the middle that they can get to see what all you're doing in your in your browser or from 80 00:06:02,740 --> 00:06:09,460 your what all communication going out of your laptop or from your network can be seen or can be you 81 00:06:09,460 --> 00:06:11,080 know, can be is web. 82 00:06:11,080 --> 00:06:12,650 Somebody can see that person. 83 00:06:12,810 --> 00:06:13,200 All right. 84 00:06:13,600 --> 00:06:19,960 Now at the end, I know it some, some, some, some, some very, very different stuff. 85 00:06:19,960 --> 00:06:22,290 But yes, of course it got information. 86 00:06:22,300 --> 00:06:23,230 How exactly. 87 00:06:23,470 --> 00:06:25,780 That's a great question to answer this. 88 00:06:26,140 --> 00:06:32,410 When somebody share that information as about upgrade guard or maybe they need other information like 89 00:06:32,420 --> 00:06:37,060 Susan Assassin or any other information, anybody can locate them. 90 00:06:37,060 --> 00:06:37,350 Right. 91 00:06:37,840 --> 00:06:45,100 Because if even if you're buying something and you're sharing information like a credit card, people 92 00:06:45,100 --> 00:06:49,150 can track, OK, who who was the one who bought this information? 93 00:06:49,150 --> 00:06:53,770 Because that's where your name and address and all this information has to be filled up and it can be 94 00:06:53,770 --> 00:06:54,570 tracked this way. 95 00:06:55,720 --> 00:07:02,500 Now, it is important to understand how these all risk can be covered and then. 96 00:07:02,500 --> 00:07:02,920 Right. 97 00:07:03,040 --> 00:07:10,600 And that's that's what we we are talking about while being anonymous, being into achieving the privacy 98 00:07:10,600 --> 00:07:11,010 Israel. 99 00:07:11,740 --> 00:07:13,110 So this is all about it. 100 00:07:13,420 --> 00:07:19,720 Now, let's talk about how to secure how to reduce the risk on every layer. 101 00:07:19,730 --> 00:07:24,610 So we talk about risk at the hardware operating system, browser email. 102 00:07:24,700 --> 00:07:25,030 All right. 103 00:07:25,030 --> 00:07:27,640 So we'll talk about each one of them one by one. 104 00:07:27,730 --> 00:07:30,850 So let's first talk about the operating system. 105 00:07:30,850 --> 00:07:37,750 And this is where you can make use of tell us what's so special about it, unlike any operating system 106 00:07:37,750 --> 00:07:40,480 which has to be binded with your hardware. 107 00:07:40,840 --> 00:07:47,170 You know, I mean, of course, the MacBook, your your Mac OS can only run on the Apple, of course. 108 00:07:47,170 --> 00:07:53,410 But for the rest of the hardware like HP, Dell, Windows can be installed or any other operating system 109 00:07:53,410 --> 00:07:54,190 can be strong. 110 00:07:54,200 --> 00:07:59,230 But remember this, the data still the Citadel sites for that. 111 00:07:59,680 --> 00:08:05,380 Once you install any operating system, the data recites with it and your operating system can binder's 112 00:08:05,380 --> 00:08:11,800 information, can can store windows information and then you make use of televis. 113 00:08:11,800 --> 00:08:17,620 It is built to make it non persistance so you can make use of a USB drive. 114 00:08:17,980 --> 00:08:24,670 I'll show you in the later courses, but you can have a bootable then driver Delois and this data, 115 00:08:24,670 --> 00:08:29,070 which you can once you install and so on any of the laptop, it just good to go. 116 00:08:29,080 --> 00:08:36,040 You can do your work and once you remove it, it wipe out or wipe out all all the information, all 117 00:08:36,040 --> 00:08:38,020 your activity that you have done on this. 118 00:08:38,290 --> 00:08:39,360 So that's useful. 119 00:08:39,490 --> 00:08:39,840 All right. 120 00:08:40,180 --> 00:08:42,810 Next, it's our browser. 121 00:08:42,820 --> 00:08:45,970 We have talked about the risk related to your browsing activity. 122 00:08:46,390 --> 00:08:54,220 Broad browser is something we'll be making use of it when we when we try to access or try to see what 123 00:08:54,220 --> 00:08:56,580 all stuff are there on the top. 124 00:08:56,580 --> 00:08:57,070 It right. 125 00:08:57,430 --> 00:09:06,010 And this is we are going to learn and see for the educational purpose why I say that, because this 126 00:09:06,010 --> 00:09:08,260 is something which is very, very important. 127 00:09:08,260 --> 00:09:14,810 Dark Web is something which is mostly used for the band activity and for the educational purposes. 128 00:09:14,810 --> 00:09:23,140 If you wanted to see what all are there in the dark web so that we can educate others how to make yourself 129 00:09:23,140 --> 00:09:31,270 secure and not to go on any daft Web site, not to Darknet, just for the sake of exploring it and how 130 00:09:31,270 --> 00:09:35,440 to be safe enough before you do any activity over there. 131 00:09:35,600 --> 00:09:35,980 All right. 132 00:09:36,400 --> 00:09:40,990 So now, next hotspot wi fi, make use of your hotspot, wi fi. 133 00:09:40,990 --> 00:09:44,890 Whenever you go, wherever you travel, don't make use of any public Wi-Fi activity. 134 00:09:44,890 --> 00:09:52,120 And of course, I'm talking about some best practices and the same stuff except, of course, Open Pintupi. 135 00:09:52,120 --> 00:09:54,070 And this is something which is very important. 136 00:09:54,070 --> 00:09:55,900 This is a very old technology. 137 00:09:55,900 --> 00:09:59,190 But this still works because this is where don't. 138 00:09:59,700 --> 00:10:07,950 No provider really comes in, you send an email, you get crap, you you encrypt those e-mails, contain 139 00:10:08,280 --> 00:10:14,130 other party if he has the key and then only he can decrypted and can see what is there inside. 140 00:10:14,190 --> 00:10:14,540 All right. 141 00:10:15,030 --> 00:10:19,950 Now, this is all about making your e-mail secure enough or I mean safe enough. 142 00:10:20,190 --> 00:10:22,340 Private enough bitcoin. 143 00:10:22,860 --> 00:10:26,490 I know I don't all of you know Bitcoin. 144 00:10:26,910 --> 00:10:27,300 Right. 145 00:10:27,300 --> 00:10:34,920 But we are talking about it for not for making money out of it, not to have a privacy issue nor valuation 146 00:10:34,920 --> 00:10:35,510 on the stuff. 147 00:10:35,940 --> 00:10:42,180 But what I'm talking about is if you really want to make yourself anonymous on the on anywhere in the 148 00:10:42,180 --> 00:10:47,790 world, in spite of using your credit card information, make use of Bitcoin, because that's where 149 00:10:47,790 --> 00:10:49,920 your personal information never gets shared. 150 00:10:50,100 --> 00:10:50,430 All right. 151 00:10:50,880 --> 00:10:53,130 Now about our personal laptop. 152 00:10:53,130 --> 00:10:58,020 If you remember, I talked about the risk related to your hardware, and this is where you can avoid 153 00:10:58,020 --> 00:11:00,800 that by making use of any of the nonperson. 154 00:11:00,820 --> 00:11:01,770 Robertino, a laptop. 155 00:11:01,890 --> 00:11:02,250 All right. 156 00:11:02,820 --> 00:11:08,040 Never, never, ever, never, ever share your personal information with anybody. 157 00:11:08,040 --> 00:11:08,330 Right. 158 00:11:08,730 --> 00:11:15,060 Because this is where even if you tried everything, you tried to reduce the risk on everywhere. 159 00:11:15,060 --> 00:11:22,540 If you share your personal information, there's no way to go right, because you never know where it's 160 00:11:22,570 --> 00:11:23,850 exactly going around. 161 00:11:23,850 --> 00:11:24,040 Right. 162 00:11:24,060 --> 00:11:25,440 And how it can be used. 163 00:11:26,200 --> 00:11:33,510 Now, what I'm really talking about at the end is what whatever we are going to learn, this is all 164 00:11:33,510 --> 00:11:36,600 on the personal for the educational purpose. 165 00:11:36,840 --> 00:11:42,840 So make sure make sure you never do any illegal activity on the Web. 166 00:11:42,870 --> 00:11:52,260 This is my highly, highly, highly, highly personal advice, because this is something where if you 167 00:11:52,260 --> 00:11:56,820 do that and if you get engaged with it, you get beat, you can get practice. 168 00:11:57,060 --> 00:11:59,980 So this is where you have to avoid doing that as well. 169 00:12:00,510 --> 00:12:12,060 And this is all covers the introduction to the Web courses, this Web anonymously and cybersecurity 170 00:12:12,060 --> 00:12:12,440 course. 171 00:12:12,780 --> 00:12:19,710 Now we have learned about what other risk available and how to mitigate those risk will learn each of 172 00:12:19,710 --> 00:12:27,540 these points in detail to discuss and some of the more advanced topics as well to disclose to. 173 00:12:27,910 --> 00:12:28,310 All right. 174 00:12:28,380 --> 00:12:31,290 So till then, I hope you'll like this lecture. 175 00:12:31,590 --> 00:12:32,820 We'll catch you in the next one. 176 00:12:33,000 --> 00:12:33,540 Thank you.