1 00:00:00,780 --> 00:00:05,950 We've seen so far how great Cube's is at improving our security. 2 00:00:06,120 --> 00:00:13,080 It improves our security through the different security domains by isolating them inside individual 3 00:00:13,080 --> 00:00:16,350 virtual machines that use their own resources. 4 00:00:16,350 --> 00:00:21,600 We saw how cool the disposable and the vote virtual machines are and more. 5 00:00:21,600 --> 00:00:28,410 All of these features make a really secure operating system and they also improve our user experience 6 00:00:28,440 --> 00:00:34,000 and force the users to use their operating system in a more secure manner. 7 00:00:34,170 --> 00:00:36,360 So that's the security part covered. 8 00:00:36,480 --> 00:00:42,780 But we still haven't covered how to become anonymous and how to improve our privacy while surfing the 9 00:00:42,780 --> 00:00:44,540 Internet using cubes. 10 00:00:44,550 --> 00:00:50,580 Because all of the virtual machines that we've seen so far access the Internet directly and therefore 11 00:00:50,610 --> 00:00:53,960 are vulnerable to trackers and so on. 12 00:00:54,120 --> 00:01:01,470 Now all of these operating systems use the same networking virtual machine which is the safest net right 13 00:01:01,470 --> 00:01:02,220 here. 14 00:01:02,220 --> 00:01:08,550 Like I said this rules the traffic directly to the internet and therefore they're not anonymous or private. 15 00:01:09,720 --> 00:01:15,520 However cubes also offer another networking service which is the source Unix. 16 00:01:15,630 --> 00:01:22,640 This is a networking service that forces the traffic to go through the Tor network. 17 00:01:22,650 --> 00:01:27,810 Therefore when a machine is configured to use the CIS Unix as the gateway. 18 00:01:27,810 --> 00:01:34,380 This machine's traffic will be forced to go through the Tor network therefore improving our privacy 19 00:01:34,380 --> 00:01:36,270 and anonymity. 20 00:01:36,270 --> 00:01:40,330 Now by default we have a domain called anon 1x. 21 00:01:40,350 --> 00:01:42,910 This is something that I haven't covered so far. 22 00:01:43,050 --> 00:01:45,600 And as usual because this is a domain. 23 00:01:45,690 --> 00:01:51,420 This means that this is a virtual machine designed for us to use to carry out day to day tasks to carry 24 00:01:51,420 --> 00:01:52,970 out normal tasks. 25 00:01:53,020 --> 00:02:01,410 And this virtual machine is a template of the Unix workstation right here and is configured to use the 26 00:02:01,460 --> 00:02:04,110 CIS who next as its gateway. 27 00:02:04,110 --> 00:02:11,370 Therefore all of the traffic going out of the non who next virtual machine will be forced to go through 28 00:02:11,370 --> 00:02:13,130 the Tor network. 29 00:02:13,200 --> 00:02:15,720 Let me show you real quick before we run this machine. 30 00:02:15,720 --> 00:02:23,720 So I'm gonna go to my Q's manager and in here you'll notice that we have the EIN on who next right here. 31 00:02:23,730 --> 00:02:29,320 This is the virtual machine that we can use for our day to day use because it is a domain. 32 00:02:29,490 --> 00:02:36,510 And if you look under the net VM right here you'll see that it is configured to use the system who next 33 00:02:36,720 --> 00:02:37,860 as its network. 34 00:02:37,860 --> 00:02:39,180 Virtual Machine. 35 00:02:39,180 --> 00:02:45,000 Which means that all of the traffic in this virtual machine will be forced to go to the source who next. 36 00:02:45,090 --> 00:02:49,040 Which will force that traffic to go through the Tor network. 37 00:02:49,050 --> 00:02:54,120 Now if you look at all of the other virtual machines you'll see that they're configured to use this 38 00:02:54,160 --> 00:02:55,010 firewall. 39 00:02:55,080 --> 00:03:02,670 For example the work right here you'll see that it is configured to use the CIS firewall as its networking 40 00:03:02,670 --> 00:03:04,020 virtual machine. 41 00:03:04,080 --> 00:03:07,290 And if we follow this we have this firewall right here. 42 00:03:07,350 --> 00:03:13,800 You'll see this will redirect the traffic to the Internet so any traffic in my work domain and all of 43 00:03:13,800 --> 00:03:19,980 the other virtual machines will go to the CIS firewall and then to the CIS net and to the Internet. 44 00:03:19,980 --> 00:03:23,850 Therefore it is not anonymous and it's not private. 45 00:03:25,010 --> 00:03:27,980 So let's go ahead and use this virtual machine. 46 00:03:27,980 --> 00:03:34,190 So we're just gonna go again as usual to the virtual machine we want to start which is a non who next. 47 00:03:34,280 --> 00:03:39,990 And you can see a list of all of the programs that you can run inside this virtual machine. 48 00:03:40,010 --> 00:03:46,450 First one is an RC charged client that you can use to communicate over I.R.S. if you want. 49 00:03:46,460 --> 00:03:51,980 You've got your settings you get your file manager you have the Tor browser which we've been using inside 50 00:03:51,980 --> 00:03:56,450 different operating systems so using it in here is identical. 51 00:03:56,450 --> 00:04:02,620 You have wizard that'll allow you to download an update tor using this is very simple. 52 00:04:02,630 --> 00:04:07,730 You can just click it to run it it'll check what's the latest version and if there is a new version 53 00:04:07,730 --> 00:04:09,980 you can install it from here. 54 00:04:09,980 --> 00:04:15,860 You can rendezvous next check right here to check the whole who next operating system the whole who 55 00:04:15,860 --> 00:04:17,190 an expert called Machine. 56 00:04:17,240 --> 00:04:22,100 Make sure that it's up to date make sure that it is configured then it's running as expected. 57 00:04:22,100 --> 00:04:27,310 This actually runs the first time you're on tables if you remember when we got the who next wizard then 58 00:04:27,320 --> 00:04:30,660 we went through it in the first basics lecture of the section. 59 00:04:30,800 --> 00:04:32,760 So there's no need to run this again. 60 00:04:32,960 --> 00:04:38,200 And you also have your terminal where you can execute commands inside this virtual machine. 61 00:04:39,200 --> 00:04:41,030 So right now let's just go ahead and run. 62 00:04:41,030 --> 00:04:47,840 Detour browser obviously as usual this will start the next virtual machine first and then as soon as 63 00:04:47,840 --> 00:04:56,280 it starts at a launch an instance of the Tor Browser and perfect as you can see we have the Utah browser 64 00:04:56,310 --> 00:04:58,910 running inside the end on who next domain. 65 00:04:58,920 --> 00:05:01,730 Notice the color it's different than all of the other domains. 66 00:05:01,740 --> 00:05:07,020 Again this will help you to easily know which domain you're working in or which virtual machine. 67 00:05:07,260 --> 00:05:14,490 And you can navigate to check the Tor dot com or just click on the IP check in here and you'll see that 68 00:05:14,640 --> 00:05:18,740 this machine is configured to use the third browser properly. 69 00:05:18,780 --> 00:05:22,000 So we are accessing the Internet through Tor. 70 00:05:22,020 --> 00:05:27,110 So right now you can go ahead and access Tor hidden services from this browser. 71 00:05:27,120 --> 00:05:31,320 You can also change its settings in here from the same places that you're used to. 72 00:05:31,320 --> 00:05:34,470 So this is the exact same browser that we're using. 73 00:05:34,470 --> 00:05:40,470 The only difference is right now it's running through it's own isolated virtual machine. 74 00:05:40,470 --> 00:05:46,920 And as usual if this virtual machine gets compromised or hacked in any way it is completely isolated. 75 00:05:46,950 --> 00:05:53,670 So it is very difficult and highly unlikely that the hacker will be able to exit this and compromise 76 00:05:53,730 --> 00:05:56,010 other virtual machines. 77 00:05:56,010 --> 00:06:01,360 Now just to confirm I already have a web browser here running in my work domain. 78 00:06:01,360 --> 00:06:09,960 And let's just go to Google and check what's my I.P. you'll see that my IP my actual real IP in here 79 00:06:10,380 --> 00:06:16,680 is completely different than the IP that we see in here inside the tower browser because inside the 80 00:06:16,860 --> 00:06:22,290 next virtual machine like I said everything's being forced to go through the Tor network whereas my 81 00:06:22,290 --> 00:06:29,430 work virtual machine if we look at the cubes VM in here the work virtual machine is used in this firewall 82 00:06:29,490 --> 00:06:35,640 as its virtual machine which for roads that are directly to this is net and therefore goes directly 83 00:06:35,640 --> 00:06:38,310 to the Internet. 84 00:06:38,370 --> 00:06:44,910 Now another really cool virtual machine that we have in here is the disposable who next workstation. 85 00:06:44,910 --> 00:06:50,550 So we already covered the normal disposable virtual machine and we saw how this can be very useful to 86 00:06:50,550 --> 00:06:57,210 run untrusted applications untrusted files or open untrusted websites because like we said every time 87 00:06:57,210 --> 00:07:02,940 you started this possible virtual machine cubes create a completely new virtual machine. 88 00:07:03,000 --> 00:07:07,610 And then when you stop it this virtual machine is completely destroyed. 89 00:07:07,620 --> 00:07:13,320 Therefore even if it contains any malware this malware will be destroyed along with the actual virtual 90 00:07:13,320 --> 00:07:13,970 machine. 91 00:07:14,010 --> 00:07:19,530 And because this is a completely isolated virtual machine it is very difficult to compromise. 92 00:07:19,590 --> 00:07:20,640 The other machines. 93 00:07:21,570 --> 00:07:25,210 So right here we have another disposable virtual machine. 94 00:07:25,230 --> 00:07:31,470 The only difference between the WHO next and the fedora one the next one as the name suggests will force 95 00:07:31,560 --> 00:07:36,750 all of the traffic to go through the next Gateway which forces all the traffic to go through the Tor 96 00:07:36,750 --> 00:07:37,590 network. 97 00:07:37,590 --> 00:07:44,010 So you can think of this like a disposable virtual machine that will force all the traffic through the 98 00:07:44,010 --> 00:07:44,730 Tor network. 99 00:07:45,060 --> 00:07:49,770 So you can use this virtual machine to run any untrusted darknet links. 100 00:07:49,890 --> 00:07:52,470 And there are a lot of untrusted darknet links. 101 00:07:52,470 --> 00:07:59,610 So this is very very useful and you can also use it to run any untrusted files that you get through 102 00:07:59,610 --> 00:08:00,500 the darknet. 103 00:08:00,510 --> 00:08:05,700 Now usually you should entrust any files you get even on the clear net but if you're receiving files 104 00:08:05,700 --> 00:08:10,530 or if you want to open files that you download from the darknet then you should definitely write it 105 00:08:10,590 --> 00:08:13,810 inside a disposable virtual machine. 106 00:08:13,890 --> 00:08:18,390 Now using this is similar to any other virtual machine you can run the applications that you want from 107 00:08:18,390 --> 00:08:18,880 here. 108 00:08:18,960 --> 00:08:24,420 And because it is disposable like I said when you click on an application a virtual machine will be 109 00:08:24,420 --> 00:08:27,940 created specifically to run this application only. 110 00:08:27,990 --> 00:08:34,900 And when you close the application the whole virtual machine will be destroyed now with these two virtual 111 00:08:34,900 --> 00:08:39,590 machines and with the weight cubes a structured you can do so much more. 112 00:08:39,640 --> 00:08:46,980 You can actually create a different virtual machine for every identity that you want to use on the darknet. 113 00:08:46,990 --> 00:08:52,180 So for example you can have a number of domains similar to the way we have work and personal and untrusted 114 00:08:52,180 --> 00:08:54,630 here that all go through the clear net. 115 00:08:54,640 --> 00:08:59,500 You can have a number of virtual machines that forced their traffic through the next gateway through 116 00:08:59,500 --> 00:09:06,790 Tor and use each one of them for every identity you use on the darknet or for example use one of them 117 00:09:06,790 --> 00:09:07,510 for chat. 118 00:09:07,540 --> 00:09:13,270 Use one of them to only include your crypto wallet and use the other for surfing the Internet or for 119 00:09:13,270 --> 00:09:20,860 surfing the darknet so you can really structure this any way you want and doing that is very very simple. 120 00:09:20,860 --> 00:09:21,670 Let me show you. 121 00:09:21,760 --> 00:09:27,670 So again you need to go back to your cubes manager and all you have to do is right click the machine 122 00:09:27,730 --> 00:09:31,030 that you want to clone or create a copy of. 123 00:09:31,050 --> 00:09:37,000 And in this case let's say you want to make a copy of our unknown who next because this is the virtual 124 00:09:37,000 --> 00:09:43,990 machine that forces traffic through the Tor network and all you have to do is right click it and click 125 00:09:44,020 --> 00:09:45,760 on Clone Q. 126 00:09:45,790 --> 00:09:50,900 This will create a new virtual machine that is identical to an on who next. 127 00:09:50,950 --> 00:09:54,760 And then you can use this for any other reason you want. 128 00:09:54,760 --> 00:10:00,500 So this is really really cool and can be tailored to fit so many scenarios and so many uses.