1 00:00:00,680 --> 00:00:01,140 OK. 2 00:00:01,160 --> 00:00:08,030 So now that we understand that Toure is basically a network of devices connected to each other that 3 00:00:08,030 --> 00:00:12,830 we can use to improve our privacy and anonymity. 4 00:00:12,830 --> 00:00:16,760 The question is how can we connect to this network and use it. 5 00:00:17,810 --> 00:00:20,230 Well the answer is actually very simple. 6 00:00:20,230 --> 00:00:27,410 You can configure your computer regardless of what operating system it uses to rout all traffic through 7 00:00:27,410 --> 00:00:28,630 the Tor network. 8 00:00:28,730 --> 00:00:36,560 And that way hopefully everything will flow through the network protecting your privacy and anonymity. 9 00:00:36,560 --> 00:00:43,430 Sadly though this is not always the case as you probably have a lot of programs that I don't even know 10 00:00:43,430 --> 00:00:53,330 of that could leak information about you potentially revealing your location your IP and more information. 11 00:00:53,330 --> 00:01:00,320 Not only that but you could be running an unpublished version of Windows or Linux or even OSX. 12 00:01:00,440 --> 00:01:06,380 Also your browser could leak information about you even if you think you properly configured it to use 13 00:01:06,380 --> 00:01:07,620 Tor. 14 00:01:07,640 --> 00:01:15,200 Also a lot of us use browser plugins and browser extensions which also could potentially leak information. 15 00:01:15,230 --> 00:01:22,880 And finally we have the exit node problem and the previous lecture I already mentioned that when you 16 00:01:22,880 --> 00:01:31,040 connect to Tor all the data and green in here is sent encrypted and at any time none of the nodes know 17 00:01:31,130 --> 00:01:33,460 what web you want to go to. 18 00:01:33,470 --> 00:01:39,920 They only know the address of the next node so they can forward the data to the next node. 19 00:01:40,010 --> 00:01:48,020 But as I mentioned the Red Arrow in here means the data leaving in here will leave unencrypted unless 20 00:01:48,020 --> 00:01:49,890 he's TTP as is used. 21 00:01:49,910 --> 00:01:57,530 So you'll have to go and manually install TTP as everywhere to force data to be sent over hash TTP as 22 00:01:58,400 --> 00:02:01,130 also we have this node right here. 23 00:02:01,130 --> 00:02:03,640 This is known as the exit node. 24 00:02:03,830 --> 00:02:12,500 And the problem here is anybody can actually configure a computer to work as a node in the Tor network. 25 00:02:12,620 --> 00:02:20,780 And if your computer is an exit node you will be able to see this data leave an unencrypted. 26 00:02:20,900 --> 00:02:23,320 So you have to trust this person. 27 00:02:23,330 --> 00:02:30,550 If you're really using the detour network as they can potentially see everything you do now. 28 00:02:30,560 --> 00:02:37,340 Like I said in the previous lecture if the target's Web site uses hash TTP s or if you're using a plugin 29 00:02:37,520 --> 00:02:45,280 that will force hash TTP connections then this will be okay because the data will be encrypted by SSL 30 00:02:45,280 --> 00:02:48,940 cause he's TTP as encrypts the hash TTP data. 31 00:02:48,970 --> 00:02:50,180 So you'll be fine. 32 00:02:50,330 --> 00:02:55,100 But this is again another step that you have to take and another plug in that you have to install on 33 00:02:55,100 --> 00:03:00,800 your browser in order to make sure that your data is fully encrypted along the way. 34 00:03:00,860 --> 00:03:07,670 And even if someone is able to see this data such as the person running the exit node here or if there 35 00:03:07,670 --> 00:03:13,760 is someone in here intercepting the connection even if they capture the data they will not be able to 36 00:03:13,760 --> 00:03:17,400 read it because it will be encrypted. 37 00:03:17,510 --> 00:03:24,940 So like I said there is a lot of steps to do if you want to configure your computer to use data or network. 38 00:03:25,070 --> 00:03:31,730 And even if you do all of that you could miss a tiny or a small detail that could potentially leak information 39 00:03:31,940 --> 00:03:40,920 and reveal your identity therefore a better solution is to either use the Tor Browser and we'll talk 40 00:03:40,920 --> 00:03:42,780 about that in the next section. 41 00:03:42,780 --> 00:03:50,970 This is a web browser designed by the same people that run the Tor network throughout all the data through 42 00:03:50,970 --> 00:03:52,820 the terror network by default. 43 00:03:52,890 --> 00:04:00,030 It also has a lot of other features to prevent leaking your information and ensuring the data that you 44 00:04:00,030 --> 00:04:03,460 send is always encrypted. 45 00:04:03,480 --> 00:04:10,290 This is the simplest and a good solution a better solution would be to use tells which is a Linux distro 46 00:04:10,590 --> 00:04:14,000 designed for anonymity and privacy. 47 00:04:14,000 --> 00:04:23,190 And the best solution would be use in Cuba so as with Unix Gateway which is an amazing operating system 48 00:04:23,340 --> 00:04:32,670 that is very very secure and also can be configured to use Tor by default improving your security and 49 00:04:32,760 --> 00:04:35,660 anonymity and privacy. 50 00:04:35,710 --> 00:04:41,770 Now we will go over all of this in the next lectures starting with the simplest and easiest and will 51 00:04:41,800 --> 00:04:45,400 and with the more complex but the best approach.