1 00:00:00,480 --> 00:00:03,190 Welcome to part nine of this module. 2 00:00:03,360 --> 00:00:06,110 We come at last to the tales operating system. 3 00:00:06,330 --> 00:00:10,080 I've mentioned it many times and now it's time that we take a look at it. 4 00:00:10,140 --> 00:00:17,820 Tails is alive operating system that you can start on almost any computer using a U.S. B stick or a 5 00:00:17,820 --> 00:00:20,910 tails image burned onto a DVD. 6 00:00:20,910 --> 00:00:25,740 It has one single purpose to preserve your privacy and anonymity. 7 00:00:25,770 --> 00:00:32,550 It helps you to use the Internet anonymously and to circumvent censorship tails automatically forces 8 00:00:32,640 --> 00:00:37,040 all connections to the Internet through the Tor network. 9 00:00:37,050 --> 00:00:44,190 I said in the last video that Tor is not a VPN but all of the applications that come bundled with tales 10 00:00:44,190 --> 00:00:47,070 connect through Tor by default. 11 00:00:47,070 --> 00:00:51,660 The best thing about Thales is that it leaves no trace on your computer. 12 00:00:51,780 --> 00:00:58,470 After you're done using it unless you explicitly set it up to do so it uses state of the art cryptographic 13 00:00:58,470 --> 00:01:05,700 tools to encrypt your files emails and instant messaging when you're done using tails and shut off your 14 00:01:05,700 --> 00:01:06,700 computer. 15 00:01:06,780 --> 00:01:09,330 Nothing whatsoever gets saved on it. 16 00:01:09,330 --> 00:01:13,770 No fingerprints no traces no log files. 17 00:01:14,100 --> 00:01:15,070 No nothing. 18 00:01:15,090 --> 00:01:17,800 No impossible to delete super cookies. 19 00:01:17,850 --> 00:01:21,420 No malware no nothing because Thales runs in RAM. 20 00:01:21,420 --> 00:01:26,940 Every session is like a freshly installed operating system. 21 00:01:26,940 --> 00:01:30,050 Thales also has built in security features. 22 00:01:30,120 --> 00:01:36,450 It aims to alter all of your computers identifying characteristics information which could leak in a 23 00:01:36,450 --> 00:01:39,170 variety of ways and it masks them. 24 00:01:39,180 --> 00:01:41,550 All of these with default values. 25 00:01:41,550 --> 00:01:48,120 This means that a website or service that manages to detect these values will see the same set of values 26 00:01:48,120 --> 00:01:51,210 for every user of the operating system. 27 00:01:51,210 --> 00:01:56,160 Nothing that uniquely identifies your personal computer should leak. 28 00:01:56,190 --> 00:02:00,230 The single exception may be HDMI L5 canvassing information. 29 00:02:00,270 --> 00:02:05,780 And for that reason you are encouraged not to maximize tor browser when you're using it. 30 00:02:05,790 --> 00:02:10,530 Tails will even change your mac address by default as soon as you connect to it. 31 00:02:10,530 --> 00:02:17,760 There are many ways you can use tails you converted onto a DVD or U.S. B stick and live boot your system 32 00:02:18,360 --> 00:02:25,190 or you can use a method described on the Thales website with two U.S. B sticks. 33 00:02:25,230 --> 00:02:31,470 The second method will allow you to have a level of secure persistence in that you can save files and 34 00:02:31,470 --> 00:02:36,050 applications between sessions on the second USP stick. 35 00:02:36,270 --> 00:02:44,010 If you don't care about persistence just go ahead and through the tails iso on a single USP with Rufus 36 00:02:44,010 --> 00:02:46,550 or burn it onto a DVD and have at it. 37 00:02:46,590 --> 00:02:48,760 This will be shown first. 38 00:02:48,780 --> 00:02:54,450 We'll be covering the two USP method however one thing I do want to say really quick before we start 39 00:02:54,690 --> 00:02:59,030 in this video you'll see me using tails inside virtual box. 40 00:02:59,040 --> 00:03:05,430 This is because given the nature of tails it is not possible to install any kind of recording software 41 00:03:05,430 --> 00:03:11,340 and obtain video footage during a live boot prior to setting up persistence. 42 00:03:11,400 --> 00:03:18,630 So in order to have anything visual to show you I need to be using tails in this way for the first step 43 00:03:18,990 --> 00:03:21,510 of the two USP setup method. 44 00:03:21,510 --> 00:03:28,230 However using tails and virtual box is not necessarily the best idea. 45 00:03:28,290 --> 00:03:30,550 It is something that you can do. 46 00:03:30,570 --> 00:03:35,610 However there are special security considerations and we'll talk about those towards the end of the 47 00:03:35,610 --> 00:03:36,210 video. 48 00:03:36,210 --> 00:03:43,050 Last but not least I apologize if the aspect ratio of the tails screen is not perfect but this was the 49 00:03:43,050 --> 00:03:45,580 best that could be done under the circumstances. 50 00:03:45,600 --> 00:03:48,610 So without further ado let's jump right in. 51 00:03:48,690 --> 00:03:52,620 The first thing that we need to do is download Tales From The Web site. 52 00:03:52,620 --> 00:03:56,940 Please note that there is no longer a 32 bit version being offered. 53 00:03:56,940 --> 00:04:04,080 You will need to download the tales iso image you will want to verify the authenticity of your download 54 00:04:04,530 --> 00:04:10,170 and since that was shown in the prior video I I'm not going to cover that again here to save time I've 55 00:04:10,170 --> 00:04:12,520 already gone ahead and downloaded the tales. 56 00:04:12,540 --> 00:04:19,980 Iso image and having already seen Rufus in prior videos I assume that it will need no further explanation. 57 00:04:19,980 --> 00:04:29,190 However if you need a refresher you can download Rufus from HP s Rufus start i.e. it's a very simple 58 00:04:29,190 --> 00:04:36,210 and small file once you double click it you'll be presented with this front end and I should add that 59 00:04:36,210 --> 00:04:41,210 burning tails iso image to a DVD disk is also permissible. 60 00:04:41,310 --> 00:04:46,920 And if you decide to go that route you don't need Rufus at all and just whatever DVD burning software 61 00:04:46,920 --> 00:04:50,470 you would typically use if you haven't already. 62 00:04:50,590 --> 00:04:56,260 Go ahead and plug in the USP device that you want to install tails on. 63 00:04:56,380 --> 00:05:01,960 Remember anything currently stored on this device will be deleted by this process. 64 00:05:01,960 --> 00:05:05,270 If your device does not immediately appear. 65 00:05:05,500 --> 00:05:08,230 Click on the device dragged down. 66 00:05:08,230 --> 00:05:12,100 There we go next under the boot selection menu. 67 00:05:12,280 --> 00:05:22,070 Make sure that disk or iso image is selected then press the select button and go ahead and select your 68 00:05:22,070 --> 00:05:24,980 tails iso image next. 69 00:05:25,160 --> 00:05:28,070 Make certain you choose the correct partition scheme. 70 00:05:28,070 --> 00:05:30,550 This is actually very important. 71 00:05:30,590 --> 00:05:38,440 It will probably show NBER by default with a target system of bias or you EFI. 72 00:05:38,510 --> 00:05:45,140 If your system is using GP t partitioning and you don't have any kind of legacy bootloader enabled a 73 00:05:45,150 --> 00:05:52,700 U.S. B stick formatted as NPR will not show up as a beautiful option when you try to live boot your 74 00:05:52,700 --> 00:06:03,020 computer by the same token if you select GP T and your system is using MPR the same problem will happen. 75 00:06:03,050 --> 00:06:10,040 Also remember that if your computer has one of those rare biopsies that has the Secure Boot feature 76 00:06:10,310 --> 00:06:15,950 it may be necessary to disable this feature in order to boot any non Windows Media. 77 00:06:15,950 --> 00:06:17,180 This is done at your own risk. 78 00:06:17,180 --> 00:06:21,770 However once you've made the correct selection and you need to be sure that the choice is right for 79 00:06:21,770 --> 00:06:25,790 your system all you need to do is click the Start button. 80 00:06:25,790 --> 00:06:30,470 Remember this will erase anything on the selected USP device. 81 00:06:30,620 --> 00:06:33,380 So be 100 percent sure before proceeding. 82 00:06:33,380 --> 00:06:39,080 Once you live but your system using tales you'll see a screen that looks like this. 83 00:06:39,780 --> 00:06:43,040 And once again I apologize for the aspect ratio. 84 00:06:43,140 --> 00:06:46,890 This should look better when we get to the live system for the moment. 85 00:06:46,920 --> 00:06:48,990 This is the greeter screen. 86 00:06:49,200 --> 00:06:51,960 Now we can just start tails. 87 00:06:52,050 --> 00:06:57,930 However we have the option to add additional settings if we click on the plus button. 88 00:06:59,290 --> 00:07:05,050 We can turn off MAC address spoofing if we wanted to adjust our network connection. 89 00:07:05,080 --> 00:07:08,850 But the one that we're interested in is the administrator password. 90 00:07:08,920 --> 00:07:13,510 If we double click on this we can set whatever password we like. 91 00:07:13,510 --> 00:07:17,740 Now it is your option if you wish to set an administrator password. 92 00:07:17,740 --> 00:07:25,630 However if you choose not to set one you will not be able to perform any action that would require super 93 00:07:25,630 --> 00:07:27,280 user privileges. 94 00:07:27,400 --> 00:07:32,980 Every time you reboot the tables operating system you will have to set a password. 95 00:07:32,980 --> 00:07:40,180 If you want one it will not persist between boots and this is true even when you're using a persistent 96 00:07:40,180 --> 00:07:42,400 system as will be shown. 97 00:07:42,400 --> 00:07:51,560 So for the moment I'm going to go ahead and just type in password and then we click add and now will 98 00:07:51,560 --> 00:07:58,760 click Start tails once tails is finally up and running we'll get this rather minimalistic looking screen 99 00:07:58,790 --> 00:08:02,570 that is kind of reminiscent of Windows XP. 100 00:08:02,630 --> 00:08:07,250 The system isn't really pretty to look at but it's not really intended to be. 101 00:08:07,280 --> 00:08:13,730 Once again you're seeing me use this in virtual box for this step with the tutorial because there's 102 00:08:13,730 --> 00:08:19,040 no other way to record this during a live boot prior to setting up persistence. 103 00:08:19,040 --> 00:08:25,910 Now you can use tales in virtual box if you prefer but this is strongly discouraged. 104 00:08:25,920 --> 00:08:33,650 Tails has many security features as has been mentioned such as changing key identifying characteristics 105 00:08:33,650 --> 00:08:36,730 about your computer such as your MAC address. 106 00:08:36,890 --> 00:08:44,510 These simply do not work in virtual box and the host operating system can see and potentially record 107 00:08:44,630 --> 00:08:48,600 everything you do while using a virtual tales. 108 00:08:48,860 --> 00:08:54,140 It ends up being about the equivalent level of security of just using Tor in windows. 109 00:08:54,140 --> 00:08:57,350 As was shown in the last video in any case. 110 00:08:57,350 --> 00:09:01,570 So you've booted into your system using a USP or DVD. 111 00:09:01,610 --> 00:09:06,920 You've been prompted to begin your MAC address and other key identifying markers have been changed or 112 00:09:06,920 --> 00:09:09,710 obscured and you're ready to roll. 113 00:09:10,010 --> 00:09:17,660 It is completely possible to use tails as it is right now without taking any further steps. 114 00:09:17,660 --> 00:09:23,000 You can connect to the Internet and then press the little onion icon up here which currently has an 115 00:09:23,060 --> 00:09:24,020 X through it. 116 00:09:24,760 --> 00:09:28,480 And when you do that you'll be ready to get started with Tor. 117 00:09:28,540 --> 00:09:33,250 You'll get a message telling you that the Tor circuits are ready and then you can just open up your 118 00:09:33,250 --> 00:09:35,290 Tor Browser and get going. 119 00:09:35,290 --> 00:09:40,030 Remember that you have no persistence if you choose this method. 120 00:09:40,030 --> 00:09:46,820 Anything you do using the operating system in this way gets you raced as soon as you shut it down. 121 00:09:46,870 --> 00:09:53,130 You can always plug in a second USP to store things in the normal way. 122 00:09:53,140 --> 00:10:01,090 All of this isn't particularly secure unless you encrypt it either way many people use tales like this. 123 00:10:01,210 --> 00:10:07,090 If you do just remember things like your electronic wallet in your key manager will be erased when you 124 00:10:07,090 --> 00:10:16,220 reboot if on the other hand you do want persistence it's time for the next step for this you will need 125 00:10:16,220 --> 00:10:27,110 a second USP device plugin that USP now and then open up the applications menu go down to tables and 126 00:10:27,110 --> 00:10:36,160 select the tables installer make absolutely certain that you've got the correct USP device selected 127 00:10:36,190 --> 00:10:39,940 under the target U.S. B stick dragged down menu. 128 00:10:39,940 --> 00:10:47,500 If you used a first USP stick to boot tails make sure you don't select the one the operating system 129 00:10:47,500 --> 00:10:49,310 is currently running on. 130 00:10:49,330 --> 00:10:53,590 In other words use a second USP stick for this. 131 00:10:53,590 --> 00:10:59,720 If you have a tails iso image that is stored on separate media you can select it. 132 00:10:59,800 --> 00:11:03,880 But the easiest thing to do is simply to select the clone. 133 00:11:03,880 --> 00:11:08,260 The current tails radial button which is selected by default. 134 00:11:08,260 --> 00:11:13,330 And when you're ready click the install button to get started. 135 00:11:13,330 --> 00:11:21,430 You will need to confirm an all data on the USP stick will be lost when you're ready click install and 136 00:11:21,430 --> 00:11:29,500 this will take some time usually about 5 to 10 minutes depending on your system and your USP read write 137 00:11:29,500 --> 00:11:30,280 speeds. 138 00:11:31,500 --> 00:11:41,020 Once this is done you can use the second USP stick to live boot and we'll pick up from there. 139 00:11:41,070 --> 00:11:42,690 And welcome back. 140 00:11:42,690 --> 00:11:45,780 You may have noticed that the screen resolution has changed. 141 00:11:45,930 --> 00:11:47,610 I do apologize again. 142 00:11:47,620 --> 00:11:53,070 Tails is not a very conducive environment for video recording and even playing with the settings and 143 00:11:53,070 --> 00:11:54,810 next render really didn't help. 144 00:11:54,810 --> 00:12:03,510 However what you're now seeing is an actual live boot of the operating system from USP persistence to 145 00:12:03,510 --> 00:12:05,520 configure persistence options. 146 00:12:05,520 --> 00:12:15,260 We just need to go up to applications system tools and select configure persistent volume these options 147 00:12:15,260 --> 00:12:16,850 can be toggled on and off. 148 00:12:16,850 --> 00:12:24,370 Be aware that if you turn one off and then reboot that information is going to be permanently lost. 149 00:12:24,380 --> 00:12:27,310 These options are fairly self-explanatory. 150 00:12:27,380 --> 00:12:35,600 The first personal data refers to a folder called persistence that you'll find in the file directory. 151 00:12:35,600 --> 00:12:39,850 Anything stored in this folder will not be deleted across sessions. 152 00:12:39,860 --> 00:12:46,370 If you store personal files in any other location such as the desktop for example these will be lost 153 00:12:46,400 --> 00:12:53,740 when you shut down so please keep that in mind browser bookmarks refers to both Tor and clear net browser. 154 00:12:53,750 --> 00:13:00,650 Keeping this on is handy to save all of those confusing deep web links that you may acquire network 155 00:13:00,650 --> 00:13:07,000 connection will save your router information so that you don't have to enter your password to log in 156 00:13:07,010 --> 00:13:08,150 every single time. 157 00:13:08,420 --> 00:13:14,810 Although again this is very personally identifying additional software is a blanket category that covers 158 00:13:14,870 --> 00:13:17,300 anything else that you might wish to install. 159 00:13:17,690 --> 00:13:24,770 However one thing that you may wish to keep in mind is that every time you boot tails that software 160 00:13:24,770 --> 00:13:27,980 will automatically install itself fresh. 161 00:13:28,220 --> 00:13:30,200 And this may take quite a while. 162 00:13:30,200 --> 00:13:36,530 Use this option with care printers safe printer information Thunderbird can be saved as well if you 163 00:13:36,530 --> 00:13:45,150 use it but Jean you P G and Bitcoin client are probably the two most important settings here. 164 00:13:45,170 --> 00:13:53,060 Without these toggled on all of your keys and all of your cryptocurrency will be lost once you shut 165 00:13:53,060 --> 00:13:54,160 down. 166 00:13:54,170 --> 00:14:02,320 I strongly recommend that you back up your wallet and keys by some other means even if you do use persistence. 167 00:14:02,330 --> 00:14:03,610 However that is up to you. 168 00:14:03,620 --> 00:14:11,720 Finally SS H keys and dot files can also be stored once your generally happy with the configuration 169 00:14:11,720 --> 00:14:13,050 click save. 170 00:14:13,190 --> 00:14:20,240 Remember if it is not in the persistence folder or one of the things being covered on this list it will 171 00:14:20,240 --> 00:14:22,520 not be saved between sessions. 172 00:14:22,520 --> 00:14:26,950 Another thing I need to mention is that if we go down to system tools. 173 00:14:27,170 --> 00:14:31,550 Notice that there are two terminals a regular and a route terminal. 174 00:14:31,550 --> 00:14:38,740 These are both your typical Linux terminals not that different from what you're used to by now in Cali. 175 00:14:38,750 --> 00:14:47,030 However if you neglect to set administrator password there is no way to utilize any command that requires 176 00:14:47,030 --> 00:14:49,120 super user privileges. 177 00:14:49,130 --> 00:14:51,150 This can be fixed by rebooting. 178 00:14:51,230 --> 00:14:56,510 Which brings up the greeter screen and then you just click the plus button and add the password as you 179 00:14:56,510 --> 00:15:02,480 saw and administrator password must be set each time you start a new session. 180 00:15:02,480 --> 00:15:03,700 If you want one. 181 00:15:03,740 --> 00:15:08,660 Notice that we also have the ability to unlocked very crypt volumes. 182 00:15:08,660 --> 00:15:16,160 This isn't actually very script one would just add the file container or specify the drive using the 183 00:15:16,160 --> 00:15:17,480 ad command. 184 00:15:17,480 --> 00:15:24,590 It is of course possible to install the Linux version of either very script or true crypt to allow for 185 00:15:24,590 --> 00:15:26,090 full functionality. 186 00:15:26,210 --> 00:15:33,440 Actually recommend this since it provides an extra layer of security within your persistent volume but 187 00:15:33,440 --> 00:15:40,700 it is of course your option like most Linux installations tales comes pre bundled with quite a lot of 188 00:15:40,700 --> 00:15:41,940 software. 189 00:15:41,960 --> 00:15:52,070 Most of these are just your basic expected tools tools for dealing with graphics or office tools such 190 00:15:52,070 --> 00:15:54,870 as Liberal office calculators and the like. 191 00:15:54,890 --> 00:16:00,620 The only programs that you really need to be aware of that are somewhat unique are the bitcoin wallet 192 00:16:00,800 --> 00:16:06,260 key manager and the unsafe browser which I'll talk about shortly. 193 00:16:06,260 --> 00:16:11,400 The rest of these programs are pretty much what you would expect if you're using persistence. 194 00:16:11,420 --> 00:16:18,680 You can add new programs to these lists if you want to but remember that anything you do add has the 195 00:16:18,680 --> 00:16:23,180 potential to compromise the security of your tables installation. 196 00:16:23,300 --> 00:16:29,810 So be very very careful about adding additional software if we travel up to the right hand corner we 197 00:16:29,810 --> 00:16:36,440 can notice that the down arrow allows us to select our router and change the brightness and volume the 198 00:16:36,440 --> 00:16:42,900 arrow next to the E N allows us to specify our language and keyboard layout. 199 00:16:42,920 --> 00:16:50,480 The default is English the onion icon allows us to open up our Tor relay circuits and if we press the 200 00:16:50,480 --> 00:16:58,760 Windows key we can gain access to the side menu containing the Tor browser as well as other applications. 201 00:16:58,760 --> 00:17:05,540 Finally if we click on the little clipboard icon in the upper right hand corner we can see that we have 202 00:17:05,540 --> 00:17:13,550 the option to encrypt the clipboard with a passphrase sign encrypt clipboard with public keys open a 203 00:17:13,550 --> 00:17:20,820 text editor which is self-explanatory or manage keys when we click on manage keys were brought into 204 00:17:20,830 --> 00:17:22,300 our key manager. 205 00:17:22,330 --> 00:17:28,540 This manager is just a slightly more sophisticated version of the GM new manager that we saw on the 206 00:17:28,540 --> 00:17:29,500 prior video. 207 00:17:29,620 --> 00:17:37,840 If we click on the GM UPC keys we can see that Thales comes pre bundled with all real keys relevant 208 00:17:37,840 --> 00:17:44,410 to it and this manager works exactly the same way as the Windows version. 209 00:17:44,410 --> 00:17:51,070 If we go to file we can import keys export them or even create new ones. 210 00:17:51,430 --> 00:17:54,130 As you can see it's really just this easy. 211 00:17:54,160 --> 00:18:02,160 We'll go ahead and name our key something and put in our other information or email address which doesn't 212 00:18:02,160 --> 00:18:05,200 have to be real and we have advanced options. 213 00:18:05,310 --> 00:18:07,770 We can leave a comment if we like. 214 00:18:07,770 --> 00:18:11,410 I'm not being very creative here but this is just a demonstration. 215 00:18:11,430 --> 00:18:18,030 Go ahead and click the button and enter our passphrase for administrator privileges. 216 00:18:18,030 --> 00:18:18,720 Give it a minute. 217 00:18:20,530 --> 00:18:21,890 And there we go. 218 00:18:21,910 --> 00:18:25,390 The key has been created and added to our manager. 219 00:18:25,390 --> 00:18:26,830 Just that easy. 220 00:18:27,760 --> 00:18:34,300 For more information on p. GP in general and key management please see the prior module that covered 221 00:18:34,300 --> 00:18:35,280 it. 222 00:18:35,380 --> 00:18:41,770 And finally the last thing to do of course is to go ahead and load up tor itself and the very first 223 00:18:41,770 --> 00:18:49,090 thing to do when launching Tor is to go up to the security settings and make sure they are correct. 224 00:18:49,090 --> 00:18:52,570 Because remember they aren't always correct by default. 225 00:18:52,600 --> 00:19:01,200 I strongly recommend toggling the setting up to safest even though this may break certain Web sites. 226 00:19:01,210 --> 00:19:08,870 We also want to come over and make sure that the no script is on by default. 227 00:19:08,940 --> 00:19:16,250 It should be but in older versions it wasn't always and this was bad beyond changing the MAC address. 228 00:19:16,260 --> 00:19:23,730 Tales obscures many facts about your system that might otherwise leak and be used to identify your computer 229 00:19:23,760 --> 00:19:26,130 rather like a unique fingerprint. 230 00:19:26,130 --> 00:19:32,150 It does this by changing these values to generic ones shared by old tails users. 231 00:19:32,160 --> 00:19:39,060 It is therefore somewhat easy to determine if a person is using tails but very difficult to determine 232 00:19:39,090 --> 00:19:46,940 anything specific about the computer that it is running on how you use tails is really up to you. 233 00:19:47,130 --> 00:19:54,300 If you do not require persistence then all you need to do is Bernard on burn the ISO to a DVD or use 234 00:19:54,300 --> 00:19:57,350 Rufus to install it to a USB stick. 235 00:19:57,510 --> 00:20:03,930 Browse with it then be secure knowing that every trace of your activity on the computer that you're 236 00:20:03,930 --> 00:20:07,130 using goes away when you shut it down. 237 00:20:07,170 --> 00:20:16,260 If you want to be able to store files keys wallets and bookmarks then use the two USP method shown here 238 00:20:16,260 --> 00:20:17,780 for persistence. 239 00:20:17,850 --> 00:20:24,950 Tails will not protect you if you do not observe good operating security in what you do online. 240 00:20:24,960 --> 00:20:32,240 There are many ways that you can unmask yourself and covering all of them would be impossible generally 241 00:20:32,240 --> 00:20:32,850 speaking. 242 00:20:32,870 --> 00:20:40,340 You should not use tales as a day to day operating system for doing mundane Internet activity that connects 243 00:20:40,610 --> 00:20:42,690 to your personal identity. 244 00:20:42,770 --> 00:20:47,030 You should really reserve it for times when you truly wish to remain anonymous. 245 00:20:47,090 --> 00:20:50,680 But again this is up to you in the next video. 246 00:20:50,780 --> 00:20:54,930 We are going to be covering virtual private networks or VPN ends. 247 00:20:55,070 --> 00:21:02,450 But I do need to make a quick statement about VPN as they relate to tales when you are using Tor your 248 00:21:02,450 --> 00:21:06,720 Internet service provider can see that you are connected to the TOR network. 249 00:21:06,920 --> 00:21:13,760 Your ISP can't see your specific Internet traffic but there will be a record that you are on Tor if 250 00:21:13,760 --> 00:21:19,440 you are on a shared network your network administrator will also be able to see this information. 251 00:21:19,610 --> 00:21:26,200 A VPN has the advantage of hiding the fact that you are using Tor from these watchful eyes. 252 00:21:26,210 --> 00:21:34,190 It is possible with a VPN router or other rather complicated steps to use a VPN with tales and there 253 00:21:34,190 --> 00:21:40,220 are pros and cons of doing this which will be covered in greater detail in the next video. 254 00:21:40,220 --> 00:21:43,730 After we cover in general what a VPN is. 255 00:21:43,730 --> 00:21:50,240 I hope you found this presentation helpful and that tales proves a useful tool for your tool box. 256 00:21:50,240 --> 00:21:51,080 Thank you.