1 00:00:00,600 --> 00:00:05,940 Now that we're are getting more comfortable with navigating the darknet we know how to access Web sites 2 00:00:05,940 --> 00:00:08,930 how to search for data and search for Web sites. 3 00:00:09,000 --> 00:00:15,150 The next thing that you might need is an email account now similar to search engines. 4 00:00:15,180 --> 00:00:21,180 You can actually use email accounts with clear net providers such as Google and Yahoo. 5 00:00:21,210 --> 00:00:26,950 Because as we know we can actually load these websites through the Tor browser. 6 00:00:27,000 --> 00:00:29,310 So let me show you a quick look right here. 7 00:00:29,310 --> 00:00:33,050 I have the sign up page for G.M. in my tor browser. 8 00:00:33,180 --> 00:00:38,640 And as you can see you're asked for a number of things such as your first name your last name the email 9 00:00:38,640 --> 00:00:40,740 that you want when you click on Next. 10 00:00:40,750 --> 00:00:46,260 It'll probably ask you for more personal information such as your phone number and your address and 11 00:00:46,260 --> 00:00:49,260 then it'll sign you up with an email. 12 00:00:49,580 --> 00:00:52,400 Same we have Yahoo here just as another example. 13 00:00:52,400 --> 00:00:56,680 Again as you can see it asks you for a number of personal information. 14 00:00:56,870 --> 00:01:02,970 And then when you fill this up you will get an email which you can use from Tor browser on DarkNet Web 15 00:01:02,970 --> 00:01:06,160 sites or in the darknet really in general. 16 00:01:06,170 --> 00:01:13,370 Now first of all we have a big problem where these mail providers are asking us for personal information 17 00:01:13,370 --> 00:01:18,780 for our name for our address for our phone number and so on date of birth. 18 00:01:18,800 --> 00:01:23,600 So these might be things that you don't really want to share with these mail providers. 19 00:01:23,600 --> 00:01:28,900 Now to get around this I want to show you a good Web site which you can use in many cases. 20 00:01:28,940 --> 00:01:35,030 I'm going to include its link in the resources of this lecture but as usual with with any other darknet 21 00:01:35,030 --> 00:01:38,020 Web site if the link I gave you doesn't work. 22 00:01:38,120 --> 00:01:42,060 Look for the Web site name because the links can change. 23 00:01:42,200 --> 00:01:47,300 Now basically what this Web site will do it will create a fake identity for you. 24 00:01:47,420 --> 00:01:55,730 So it'll give you a gender a name a second name age address phone number email you can change this with 25 00:01:55,730 --> 00:02:01,280 your e-mail once you actually change it and it will basically give you detailed information about a 26 00:02:01,280 --> 00:02:04,380 specific person and what you should do. 27 00:02:04,460 --> 00:02:11,260 You should always use this information whenever you signing for any service on the darknet. 28 00:02:11,270 --> 00:02:13,060 So this will be your identity. 29 00:02:13,100 --> 00:02:14,610 You forget about who you are. 30 00:02:14,630 --> 00:02:21,470 As soon as you start tales and from there on you'll become the person that you're getting from here. 31 00:02:21,470 --> 00:02:27,740 Now an even better solution to this is to take this information and even modify it yourself manually 32 00:02:27,950 --> 00:02:31,130 so that you don't forget the information in here. 33 00:02:31,160 --> 00:02:37,460 So maybe you can modify the first name the second name you can modify the e-mail but the main idea here 34 00:02:37,460 --> 00:02:44,690 is you want to create an identity that you will always use when you're on the darknet and you will never 35 00:02:44,690 --> 00:02:46,840 use when you're on the clear net. 36 00:02:46,910 --> 00:02:54,740 This way your fake identity can never be linked to your real identity this is also better than you using 37 00:02:54,750 --> 00:02:58,260 different identities every time you sign up to a different service. 38 00:02:58,260 --> 00:03:00,300 Because this way you'll be more consistent. 39 00:03:00,540 --> 00:03:05,640 And this way you'll always be filling the same data but this data will be fake. 40 00:03:05,730 --> 00:03:06,540 So it's fine. 41 00:03:06,540 --> 00:03:08,520 It's not going to link to you. 42 00:03:08,850 --> 00:03:14,670 Now you can use this information here like I said to sign up to one of these email services and then 43 00:03:14,670 --> 00:03:20,120 you can use this email for whatever reason you want when you're communicating with friends or if you're 44 00:03:20,130 --> 00:03:24,890 signing up for other darknet websites that require you to have an email address. 45 00:03:25,800 --> 00:03:31,690 So this could be an easy solution but there are still a number of drawbacks to it. 46 00:03:31,740 --> 00:03:36,810 First when you're access in the service you're exiting the Tor network because like we said when you 47 00:03:36,810 --> 00:03:41,700 want to go to a clear net Web site you're going to first go through the Tor network and then you're 48 00:03:41,700 --> 00:03:46,740 going to exit out of it to the service that you're trying to access. 49 00:03:46,740 --> 00:03:48,720 Now this exit will be unencrypted. 50 00:03:48,720 --> 00:03:49,310 Like I said. 51 00:03:49,320 --> 00:03:55,010 So anyone who intercepts this data might be able to read it and analyze it. 52 00:03:55,080 --> 00:04:02,010 Not only that but these e-mail providers are known for logging you and tracking everything you do on 53 00:04:02,010 --> 00:04:02,970 their servers. 54 00:04:02,970 --> 00:04:09,600 So whatever you type whatever you send whatever you receive G.M. probably gonna keep logs on every single 55 00:04:09,600 --> 00:04:10,590 thing you do. 56 00:04:10,590 --> 00:04:15,180 Now even though you're using fake information and even though I'm going to show you how to encrypt your 57 00:04:15,180 --> 00:04:20,340 messages in the future this could still be a risk because like I said they're going to be analyzing 58 00:04:20,370 --> 00:04:27,150 and tracking every single movement you do so you can do this like I said use it with a fake identity. 59 00:04:27,150 --> 00:04:31,510 Keep this fake identity completely separate from your real identity. 60 00:04:31,590 --> 00:04:35,880 So make sure you never use any of this information on a clear night website. 61 00:04:35,880 --> 00:04:42,330 Make sure you never use any account that's created within this fake identity to communicate with any 62 00:04:42,330 --> 00:04:45,990 of your real accounts or any of your real friends on the clear net. 63 00:04:46,550 --> 00:04:53,880 And this might be a good enough solution for you depending on your situation but in the next lectures 64 00:04:54,060 --> 00:04:55,810 I'm going to show you more options. 65 00:04:55,830 --> 00:05:01,770 If you want a more private and more anonymous solution see you when it comes to picking up an e-mail 66 00:05:01,770 --> 00:05:02,570 service. 67 00:05:02,580 --> 00:05:07,500 It really depends on why you want this email and what's your threat model. 68 00:05:08,400 --> 00:05:14,040 So the solution that I showed you here could be perfect for you but it might not be perfect for another 69 00:05:14,040 --> 00:05:20,370 person or it could be perfect for you in a certain situation but it won't be good for other scenarios 70 00:05:20,400 --> 00:05:22,120 or other situations. 71 00:05:22,170 --> 00:05:27,600 Therefore in the next lectures I'm going to show you a number of other solutions that you can use in 72 00:05:27,600 --> 00:05:34,890 order to set up an email and communicate with other emails and then you can compare them and pick the 73 00:05:34,890 --> 00:05:40,560 best one for you based on the reason why you need this email and based on your threat model.