1 00:00:00,180 --> 00:00:02,700 Welcome to Part Eight of this module. 2 00:00:02,700 --> 00:00:06,870 In the last video we looked at how to verify the authenticity of our downloads. 3 00:00:06,870 --> 00:00:11,280 Specifically we verified that the Tor installer is the real deal. 4 00:00:11,280 --> 00:00:14,980 Now it's time to talk about installing Tor and getting started with it. 5 00:00:15,000 --> 00:00:22,980 But first what exactly is Tor and why is it important Tor is free and open source software for enabling 6 00:00:23,010 --> 00:00:24,690 anonymous communication. 7 00:00:24,720 --> 00:00:31,050 The name Tor is actually an acronym for what the original software used to be called which was The Onion 8 00:00:31,050 --> 00:00:38,040 Router Tor Browser directs your internet traffic through a free worldwide volunteer overlay network 9 00:00:38,070 --> 00:00:44,640 consisting of thousands of relays all for the purpose of concealing a user's location and usage from 10 00:00:44,670 --> 00:00:51,270 anyone conducting network surveillance or traffic analysis using Tor makes it more difficult to trace 11 00:00:51,360 --> 00:00:59,370 Internet activity to the user such as Web sites that you visit online posts et tours intended use is 12 00:00:59,370 --> 00:01:06,630 to protect the personal privacy of its users as well as their freedom and ability to conduct confidential 13 00:01:06,630 --> 00:01:12,870 communication by keeping their Internet activities from being monitored toward is not prevent an online 14 00:01:12,870 --> 00:01:17,970 service from determining when it is being accessed through Tor. 15 00:01:17,970 --> 00:01:24,510 The idea is to protect the user's privacy but not hide the fact that someone is actually using Tor. 16 00:01:24,510 --> 00:01:31,920 This means that certain services can actively restrict or even block Tor users or in other ways curtail 17 00:01:31,920 --> 00:01:34,590 their access to certain sites. 18 00:01:34,620 --> 00:01:40,200 On the other hand it is through the use of Tor that we are able to reach locations on the internet not 19 00:01:40,200 --> 00:01:47,790 normally accessible by ordinary browsers collectively and variously referred to as the deep web dark 20 00:01:47,850 --> 00:01:49,950 net or onion land. 21 00:01:49,950 --> 00:01:58,920 Before we go deeper into what Tor is it is first necessary to save what Tor is not Tor is not a virtual 22 00:01:58,920 --> 00:02:01,870 private network or VPN for short. 23 00:02:01,890 --> 00:02:07,830 If you're browsing the internet with the Tor browser web sites that you visit will see an IP address 24 00:02:07,890 --> 00:02:11,820 associated with the TOR exit node not your own. 25 00:02:11,820 --> 00:02:19,740 However if you load up another application outside of Tor such as perhaps a messaging program the program's 26 00:02:19,860 --> 00:02:23,560 Internet traffic won't be automatically routed through Tor. 27 00:02:23,580 --> 00:02:30,160 By comparison a VPN or a virtual private network routes all traffic through it. 28 00:02:30,180 --> 00:02:38,460 There are pros and cons to both Tor and VPN and this will be explained in greater detail as we go along. 29 00:02:38,490 --> 00:02:45,570 Onion Routing using Tor is implemented by encryption in the application layer of a communication protocol 30 00:02:45,570 --> 00:02:52,730 stack nested like the layers of an onion Tor encrypts the data including the next node. 31 00:02:52,740 --> 00:02:58,920 Destination IP address in the relay multiple times and sends it through a virtual circuit comprising 32 00:02:58,920 --> 00:03:07,290 successive randomly selected tor relays each relay decrypt a layer of the encryption and sends the original 33 00:03:07,290 --> 00:03:14,220 data to its destination without revealing or even knowing the source IP address because the routing 34 00:03:14,220 --> 00:03:18,810 of communication was partly concealed at every hop in the Tor circuit. 35 00:03:18,810 --> 00:03:24,810 This method eliminates any single point at which the communicating peers can be determined through network 36 00:03:24,810 --> 00:03:31,620 surveillance that relies upon knowing its source destination an adversary may try to DNS minimize the 37 00:03:31,620 --> 00:03:33,410 user by some means. 38 00:03:33,410 --> 00:03:40,830 However one way this may be accomplished is by exploiting vulnerable software on the user's computer. 39 00:03:40,830 --> 00:03:47,070 The National Security Agency of the United States actually has a technique that triggers a vulnerability 40 00:03:47,370 --> 00:03:53,880 which they code named egotistical giraffe in an outdated Firefox browser version. 41 00:03:53,880 --> 00:04:01,200 That was at one time bundled with the Tor package and in general targets Tor users for close monitoring 42 00:04:01,230 --> 00:04:08,400 under its x Key Score program attacks against tor are an active area for academic research as well which 43 00:04:08,400 --> 00:04:13,720 is in fact welcomed by the Tor project itself as it continually seeks to improve. 44 00:04:13,740 --> 00:04:21,090 For these reasons it is absolutely imperative to make sure the Tor version that you are using is kept 45 00:04:21,180 --> 00:04:27,810 up to date correctly configured and that you are using an authentic non tampered with copy. 46 00:04:27,810 --> 00:04:30,260 There is one other thing to be aware of. 47 00:04:30,480 --> 00:04:37,020 The bulk of the funding for tour's development has come from the federal government of the United States 48 00:04:37,470 --> 00:04:41,400 initially through the Office of Naval Research and DARPA. 49 00:04:41,400 --> 00:04:49,830 So chew on that as you consider whether or not to put full and absolute trust in it when you use tour 50 00:04:49,830 --> 00:04:56,130 to browse the internet your Internet service provider cannot see or log the specific data being sent 51 00:04:56,160 --> 00:04:57,770 to and from your computer. 52 00:04:57,780 --> 00:05:03,410 In other words your ISP knows that you are using Tor because they can see that you are connected to 53 00:05:03,410 --> 00:05:10,130 a tor entry node but they only see encrypted data going to and from the node they cannot track what 54 00:05:10,130 --> 00:05:12,710 you do through traffic analysis. 55 00:05:12,710 --> 00:05:19,370 Again this applies only to the Tor Browser and programs that are specifically configured to make use 56 00:05:19,370 --> 00:05:20,510 of the Tor network. 57 00:05:20,510 --> 00:05:26,450 Again Tor is not a VPN and will not protect every application that connects through the Internet on 58 00:05:26,450 --> 00:05:28,450 your machine by default. 59 00:05:28,460 --> 00:05:31,490 Tales may be an exception but we'll speak about that later. 60 00:05:31,540 --> 00:05:32,080 All right. 61 00:05:32,090 --> 00:05:36,090 That was a lot to take in so why don't we just install the darn thing. 62 00:05:36,170 --> 00:05:36,720 OK. 63 00:05:36,920 --> 00:05:41,260 But the last thing I'm going to talk about is why we want to bother with this at all. 64 00:05:41,270 --> 00:05:47,270 Tor allows access to hidden web sites that normal Internet browsers cannot reach. 65 00:05:47,270 --> 00:05:56,930 As I said these are known collectively as the deep web or dark net or onion land dark net is sometimes 66 00:05:56,930 --> 00:06:02,870 a fitting term but I wish to avoid being overly dramatic an onion land sounds a bit silly. 67 00:06:02,870 --> 00:06:08,360 So from this point onward I'm going to try to stick to the name deep web the deep web contains Web sites 68 00:06:08,360 --> 00:06:11,330 that are not indexed by search engines. 69 00:06:11,330 --> 00:06:19,550 It is to put it bluntly massive when you perform a Google search which I hope is rarely you are accessing 70 00:06:19,550 --> 00:06:21,700 about 5 percent of the Internet. 71 00:06:21,770 --> 00:06:32,540 The tip of the iceberg as it were everything beneath the waterline is the deep web non indexed sites 72 00:06:32,750 --> 00:06:41,270 services and things that your average web search engines such as Google just can't or won't pick up. 73 00:06:41,270 --> 00:06:45,050 And yes hidden sites and services as well. 74 00:06:45,050 --> 00:06:52,880 An onion site uses a special type of you are old address and can be reached only by using Tor. 75 00:06:52,880 --> 00:06:59,880 These include many valid and legal places as well as many illegal or unethical places. 76 00:06:59,900 --> 00:07:06,590 More on this later this overview was long and wordy and I apologize for starting out this way but it 77 00:07:06,590 --> 00:07:10,370 was necessary for you to have some idea what this is. 78 00:07:10,370 --> 00:07:16,460 With that out of the way let's go ahead and install it to start off with. 79 00:07:16,460 --> 00:07:26,240 We're going to select our language and our default directory and click install tours ask asking to run 80 00:07:26,240 --> 00:07:27,660 for the first time. 81 00:07:27,710 --> 00:07:29,310 Let's go ahead and do that. 82 00:07:29,560 --> 00:07:34,940 The tour is now loaded for the first time and when we load tour we get the screen asking us if we want 83 00:07:34,940 --> 00:07:39,770 to click connect or if we want to configure what's click configure. 84 00:07:39,770 --> 00:07:44,790 And here we can specify that we want to use a proxy to connect to the Internet if applicable. 85 00:07:44,810 --> 00:07:52,460 We can also click the Tor is censored in my country button and this may help with connecting to the 86 00:07:52,460 --> 00:07:56,810 network in certain parts of the world. 87 00:07:56,810 --> 00:08:00,290 So with that out of the way let's go ahead and click connect. 88 00:08:00,740 --> 00:08:04,790 Connection to Tor may take a minute or two. 89 00:08:04,790 --> 00:08:11,060 Also keep in mind that if you have any strict firewall settings you may need to whitelist the Tor browser 90 00:08:11,180 --> 00:08:12,830 so that it can connect to the Internet. 91 00:08:12,950 --> 00:08:13,170 OK. 92 00:08:13,190 --> 00:08:20,760 So right away the first thing you might be tempted to do is to maximize the browser screen but as soon 93 00:08:20,760 --> 00:08:22,050 as we do this. 94 00:08:22,260 --> 00:08:29,700 Notice that we get this message up here in rather tiny text warning us that maximizing tor browser can 95 00:08:29,700 --> 00:08:35,190 allow Web sites to determine your monitor size which can be used to track you. 96 00:08:35,190 --> 00:08:40,590 We recommend that you leave tor browser window in its original default size. 97 00:08:40,710 --> 00:08:42,050 So it is your option. 98 00:08:42,150 --> 00:08:43,710 But that is something to remember. 99 00:08:43,740 --> 00:08:53,440 You can however extend the window by a little bit as long as you don't maximize it. 100 00:08:53,610 --> 00:08:53,990 All right. 101 00:08:54,000 --> 00:09:00,840 So earlier I mentioned that the IP address that your destination sees will be that of the TOR exit node 102 00:09:00,990 --> 00:09:02,790 rather than your own IP. 103 00:09:02,790 --> 00:09:04,320 So let's see this demonstrated. 104 00:09:04,320 --> 00:09:10,930 Let's go ahead and search for what is my IP. 105 00:09:11,100 --> 00:09:13,910 We'll go ahead and just click on one of these links at random. 106 00:09:13,950 --> 00:09:25,730 And here we see that this IP address which is located in Corona whoa I probably mispronounced that Poland 107 00:09:26,470 --> 00:09:28,820 hobbyist Asli I am not in Poland. 108 00:09:28,940 --> 00:09:36,980 However this is what any Web site will see when we're using Tor your exit node will be determined at 109 00:09:36,980 --> 00:09:37,720 random. 110 00:09:37,730 --> 00:09:43,580 You may also receive a warning and this site doesn't do it but sooner or later you'll see it warning 111 00:09:43,580 --> 00:09:50,000 you that a particular Web site is trying to gain H HTML5 canvassing imaging data. 112 00:09:50,000 --> 00:09:55,700 In other words it's trying to take your fingerprint and you really don't want to allow this. 113 00:09:55,700 --> 00:10:00,470 So if it comes up click block and this would be a good example of Tor protecting us. 114 00:10:00,500 --> 00:10:06,470 Now the IP address and location shown here again obviously not my real IP on location. 115 00:10:06,500 --> 00:10:13,070 The exit node as I said is determined at random and it is the last hop in a very long network of Tor 116 00:10:13,070 --> 00:10:19,970 relays that your connection is essentially bouncing back and forth between all of which are built when 117 00:10:19,970 --> 00:10:23,650 you connect to Tor and chosen at random. 118 00:10:23,660 --> 00:10:27,970 Now there is something very important that you need to keep in mind here. 119 00:10:27,980 --> 00:10:32,690 Anyone can run a Tor relay and be an exit node. 120 00:10:32,690 --> 00:10:34,010 You can run one. 121 00:10:34,130 --> 00:10:35,500 I can run one. 122 00:10:35,510 --> 00:10:40,310 Your friendly neighborhood CIA agent can run one anybody. 123 00:10:40,370 --> 00:10:47,390 It isn't possible for the person or people running the node to see where the connection is originating 124 00:10:47,390 --> 00:10:48,530 from. 125 00:10:48,530 --> 00:10:57,640 But they can see any clear text data that goes out from an unencrypted exit onto the Internet. 126 00:10:57,740 --> 00:11:04,640 In other words if you fill out any web forms and clear text using tor the exit node can potentially 127 00:11:04,640 --> 00:11:07,580 see any data that you enter. 128 00:11:07,580 --> 00:11:14,810 So you might not want to apply for a credit card or use Tor to access your personal e-mail. 129 00:11:14,810 --> 00:11:20,150 I'm not saying that every exit node is untrustworthy but some absolutely are. 130 00:11:20,150 --> 00:11:26,150 For all I know this one that we're looking at right now is run by hackers or federal agents looking 131 00:11:26,150 --> 00:11:29,030 to sniff up any identifying information. 132 00:11:29,030 --> 00:11:35,100 So in the event that we have some reason to distrust our exit node what can we do about this. 133 00:11:35,120 --> 00:11:44,290 If we go to this little icon up here and click the new identity button tor will click yes and tour is 134 00:11:44,290 --> 00:11:46,000 going to restart itself. 135 00:11:48,220 --> 00:11:57,700 And this time we go to what is my IP notice that we now appear to be in Quebec Canada with an entirely 136 00:11:57,700 --> 00:11:58,930 new IP address. 137 00:11:58,990 --> 00:12:07,840 So it's very easy to rebuild the network with a single mouse click and it will be more apparent which 138 00:12:07,840 --> 00:12:09,460 nodes are in your network. 139 00:12:09,460 --> 00:12:10,950 When we get details. 140 00:12:10,990 --> 00:12:16,310 Another thing to point out is that Tor can be very slow to load Web sites. 141 00:12:16,330 --> 00:12:22,270 We haven't really seen an example of that yet but we will and that leg is a natural consequence of bouncing 142 00:12:22,270 --> 00:12:25,780 your connection through a ton of encrypted relays. 143 00:12:25,780 --> 00:12:30,730 It is normal and it is the price you pay for the security that Tor offers. 144 00:12:30,730 --> 00:12:36,700 Speaking of security let's take a quick look at the security settings because this little map should 145 00:12:36,700 --> 00:12:37,990 not be loading at all. 146 00:12:39,200 --> 00:12:44,660 So we're gonna go up to here to the little onion icon and click security settings. 147 00:12:44,690 --> 00:12:48,750 Notice that we are on standard by default. 148 00:12:48,830 --> 00:12:57,050 I strongly recommend that you drag this up to the safest setting only lower this bar if you absolutely 149 00:12:57,050 --> 00:13:03,890 have to access a Web site via tor that won't come up any other way but really you should never ever 150 00:13:04,130 --> 00:13:11,030 drop this bar with our settings now on safest will click OK and let's go ahead and we're gonna jump 151 00:13:11,030 --> 00:13:15,230 over towards a Web site called panic to click. 152 00:13:15,230 --> 00:13:20,800 This is a handy Web site that test your browser to see how well it keeps you secure. 153 00:13:20,810 --> 00:13:26,600 Try it with your ordinary day to day clear net browser some time and you might be alarmed at just how 154 00:13:26,600 --> 00:13:29,990 much identifying data it actually leaks. 155 00:13:29,990 --> 00:13:32,170 We're gonna go ahead and we're going to click test me. 156 00:13:32,180 --> 00:13:39,260 This is going to take a few minutes particularly if the Tor relay connections are slow in a moment we'll 157 00:13:39,260 --> 00:13:44,210 see the results from a battery of tests it runs against us. 158 00:13:44,450 --> 00:13:46,760 Or more specifically the Tor Browser. 159 00:13:46,760 --> 00:13:52,070 All right and if we scroll down here we can see that yes we have very strong protection against Web 160 00:13:52,070 --> 00:13:59,400 tracking Tor does not check for Do Not Track policies by default. 161 00:13:59,400 --> 00:14:01,750 That is something you can change in the settings. 162 00:14:01,830 --> 00:14:08,070 And again I do recommend that you run this test against your own non tor browser and see how well you 163 00:14:08,070 --> 00:14:08,910 do. 164 00:14:08,910 --> 00:14:10,670 It might surprise you. 165 00:14:10,680 --> 00:14:17,370 Now one thing to keep in mind is that with the security set on full your browsing experience is really 166 00:14:17,370 --> 00:14:19,050 going to be badly diminished. 167 00:14:19,050 --> 00:14:26,280 Javascript won't work properly or even at all and you weren't going to be streaming videos and things 168 00:14:26,280 --> 00:14:27,280 like that. 169 00:14:27,390 --> 00:14:34,500 That really isn't what tourists for a lot of fun tools that enhance our browser experience that we just 170 00:14:34,500 --> 00:14:40,640 sort of take for granted like flash player for instance just don't work with Tor because they compromised 171 00:14:40,640 --> 00:14:47,700 security coupled with the lag of loading pages due to the network relays and you might start to ask 172 00:14:47,700 --> 00:14:50,370 yourself why you're bothering to use Tor at all. 173 00:14:50,370 --> 00:14:57,630 Another thing that I recommend you do is to go to this little letter s up here in the upper right corner. 174 00:14:57,630 --> 00:14:59,730 It's called no script. 175 00:14:59,730 --> 00:15:06,060 Make sure that it has a little red line through it and that global scripts are disabled. 176 00:15:06,090 --> 00:15:11,310 It won't have the little red line on the tour start page when you when you first load the browser because 177 00:15:11,310 --> 00:15:16,380 tor considers that to be privileged for some reason but anywhere else you go. 178 00:15:16,410 --> 00:15:20,460 Scripts should be blocked at all times. 179 00:15:20,460 --> 00:15:26,660 Newer versions of Tor block these by default so you need to specifically disable it. 180 00:15:26,820 --> 00:15:33,480 If you wanted to allow scripts which is never really recommended older versions which you shouldn't 181 00:15:33,480 --> 00:15:39,730 be using anyway allowed scripts by default and many users were compromised by this. 182 00:15:39,750 --> 00:15:43,320 Always check to make sure this is working correctly. 183 00:15:43,350 --> 00:15:48,540 Don't just assume that it's configured in the way that you'd expect from a security project because 184 00:15:48,540 --> 00:15:54,390 it isn't always another thing to be aware of is that the default search engine with Tor is duck duck 185 00:15:54,390 --> 00:16:01,320 go which is a great search engine that does not track you but may be a tad slower than what you're used 186 00:16:01,320 --> 00:16:02,430 to. 187 00:16:02,430 --> 00:16:09,510 And while I hate to admit it and would never encourage anyone to use google it is a fact that sadly 188 00:16:09,990 --> 00:16:15,960 there are times that you just won't get the same quality of results with duck duck go as you would with 189 00:16:15,960 --> 00:16:16,840 Google. 190 00:16:16,920 --> 00:16:20,380 So that is something to keep in mind. 191 00:16:20,460 --> 00:16:22,740 I would not recommend using Google with Tor. 192 00:16:22,740 --> 00:16:26,820 Don't get me wrong but it is something that you can do if you want to. 193 00:16:26,820 --> 00:16:34,200 You can change the default browser by going into the browser settings when you use Tor to browse the 194 00:16:34,200 --> 00:16:35,050 internet. 195 00:16:35,130 --> 00:16:40,650 Your Internet service provider as well as anyone else who is capable of seeing your connection will 196 00:16:40,650 --> 00:16:42,960 know that you are using Tor. 197 00:16:42,960 --> 00:16:49,710 This may cause certain groups like hackers or government agencies to focus attention on you and try 198 00:16:49,710 --> 00:16:52,820 to determine what it is that you're doing. 199 00:16:52,830 --> 00:16:59,160 I will be covering virtual private networks in the video right after the next one which will be on tails 200 00:16:59,280 --> 00:17:06,630 and I'll be covering how to use a VPN in conjunction with Tor to hide this information as an extra layer 201 00:17:06,630 --> 00:17:08,320 of security. 202 00:17:08,400 --> 00:17:15,780 Now there are pros and cons to doing that and they are very complicated to go over so I will be covering 203 00:17:15,780 --> 00:17:21,030 that subject later but I just wanted you to know that it will be coming up if you are wondering we will 204 00:17:21,030 --> 00:17:22,540 be discussing it now. 205 00:17:22,680 --> 00:17:31,080 As was said tor can be used for regular anonymous browsing but it can also be used to access hidden 206 00:17:31,080 --> 00:17:35,310 sites on the Internet or the deep web as it were. 207 00:17:35,340 --> 00:17:41,220 This will be shown in more detail in the next video covering the tales operating system and that is 208 00:17:41,220 --> 00:17:47,600 because it isn't especially why is to access the deep web from a Windows computer. 209 00:17:47,610 --> 00:17:53,670 There are many little subtle ways that Windows can either betray you or retain evidence of what you're 210 00:17:53,790 --> 00:17:55,180 what you've been doing. 211 00:17:55,410 --> 00:18:02,250 When you're using it this is particularly true of Windows 10 visiting an onion link isn't in and of 212 00:18:02,250 --> 00:18:05,010 itself an illegal or unethical thing to do. 213 00:18:05,010 --> 00:18:10,860 There are many valid hidden sites and services out there and people like journalists often make use 214 00:18:10,860 --> 00:18:16,020 of them when traveling to parts of the world where their lives may be in danger. 215 00:18:16,030 --> 00:18:23,340 That being said there are many sites and hidden services that are of an illegal or unethical nature 216 00:18:23,460 --> 00:18:27,170 because of the rules of the platform that this class is being presented on. 217 00:18:27,360 --> 00:18:29,600 I cannot show these. 218 00:18:29,670 --> 00:18:37,140 These would include unsavory places like online marketplaces that sell substances or services that are 219 00:18:37,140 --> 00:18:39,570 considered to be contraband in nature. 220 00:18:39,570 --> 00:18:43,900 There are also sites that contain leaked secret information. 221 00:18:44,070 --> 00:18:48,870 The character of which may be against the terms and conditions of the platform that you're currently 222 00:18:48,870 --> 00:18:50,920 watching this video on. 223 00:18:50,970 --> 00:18:54,860 All I can say about these aspects of the deep web are use them. 224 00:18:54,930 --> 00:19:00,780 At your own risk simply visiting such a Web site may or may not be illegal. 225 00:19:00,780 --> 00:19:06,150 Depending on where in the world you live and the nature of the site itself it's not against the law 226 00:19:06,240 --> 00:19:08,900 simply because it's an onion link. 227 00:19:08,970 --> 00:19:15,540 But if it contains illegal content you could end up in hot water legally speaking. 228 00:19:15,540 --> 00:19:22,090 If this is a subject of interest to you you only need to conduct a search preferably using Tor inductor. 229 00:19:22,170 --> 00:19:25,860 Go for directories containing deep web links. 230 00:19:25,860 --> 00:19:29,580 But again you must take into account the laws of the country where you live. 231 00:19:29,580 --> 00:19:33,890 Concerning these things and remain lawful at all times. 232 00:19:34,140 --> 00:19:41,010 Things like online drug markets do exist and they operate outside of the law often using cryptocurrency 233 00:19:41,040 --> 00:19:44,040 to facilitate anonymous transaction. 234 00:19:44,040 --> 00:19:49,860 The subject of crypto currencies will be covered as well in later in this module. 235 00:19:49,860 --> 00:19:53,160 Just be careful when visiting onion links. 236 00:19:53,280 --> 00:19:59,460 Any such link that you click on is done at your own risk and you should never click on such a link unless 237 00:19:59,460 --> 00:20:01,820 you are sure of what it is. 238 00:20:01,830 --> 00:20:06,150 So with that out of the way what is an onion link. 239 00:20:06,150 --> 00:20:12,570 Well here are a few examples so I'm going to just grab these two that I have set up copy and paste them 240 00:20:13,380 --> 00:20:14,790 into new tabs. 241 00:20:14,820 --> 00:20:17,700 Okay so notice how weird these addresses are. 242 00:20:17,700 --> 00:20:23,790 They are strings of letters and numbers ending in a dot onion proton mail. 243 00:20:23,790 --> 00:20:32,190 Here is a free email service that claims to be secure and not evil is a search engine that seeks to 244 00:20:32,280 --> 00:20:37,360 index Deep Web sites that normal search engines do not. 245 00:20:37,380 --> 00:20:43,500 Not Evil is one method to search for hidden sites and services. 246 00:20:43,650 --> 00:20:46,900 But again I warn you to be very careful. 247 00:20:47,000 --> 00:20:49,830 You're responsible for anything you click on. 248 00:20:49,830 --> 00:20:57,360 As a final closing point tor can be used in windows but the reason I say it is better to use tables 249 00:20:57,390 --> 00:21:04,740 is because the tables operating system has many built in security features that Windows simply lacks. 250 00:21:04,950 --> 00:21:12,660 Tails is a system that you live boot and it changes all of your computer's unique identifiers so that 251 00:21:12,720 --> 00:21:17,940 even if information about you were to leak there's a good chance it won't be information that connects 252 00:21:17,940 --> 00:21:19,410 back to you. 253 00:21:19,410 --> 00:21:25,200 Everything you do using tables gets wiped out of existence when you shut it off at least in terms of 254 00:21:25,200 --> 00:21:27,250 anything being stored on your computer. 255 00:21:27,360 --> 00:21:29,910 That could be used to reconstruct your activities. 256 00:21:29,910 --> 00:21:36,760 It is possible to use Tor in Cali Linux but this is strongly discouraged. 257 00:21:37,050 --> 00:21:43,620 Cowley runs you in route and it is simply not intended to be an anonymous operating system. 258 00:21:43,620 --> 00:21:45,870 It's just not what Carly's for. 259 00:21:45,930 --> 00:21:54,000 There's no good reason to use taurine Cowley when you can just load up tales or even use it in Windows. 260 00:21:54,000 --> 00:21:58,360 However if you really must do so you can. 261 00:21:58,460 --> 00:21:58,860 All right. 262 00:21:58,870 --> 00:22:02,530 So this covers the basic introduction to the Tor Browser. 263 00:22:02,530 --> 00:22:08,020 As I said the next video we'll be covering tails and going into greater detail with more examples of 264 00:22:08,020 --> 00:22:08,680 these things. 265 00:22:08,680 --> 00:22:10,000 Thank you for your attention.