1 00:00:01,230 --> 00:00:01,550 All right. 2 00:00:01,680 --> 00:00:02,220 Hello guys. 3 00:00:02,250 --> 00:00:08,540 Welcome back to another of our course about the complete introduction to the deep web. 4 00:00:08,570 --> 00:00:14,000 Since these class we are going to talk about toy security and how to use Tor safely. 5 00:00:15,120 --> 00:00:26,420 So let's start So what is thought tor stands for The Onion Router. 6 00:00:26,790 --> 00:00:30,310 It comes well this is a web browser as we use as we talked about it. 7 00:00:30,310 --> 00:00:31,820 Now last test. 8 00:00:32,410 --> 00:00:38,430 And gives the bot the possibility to people who use it to stay anonymous online and to get access to 9 00:00:38,430 --> 00:00:39,030 the Deep Web. 10 00:00:39,360 --> 00:00:41,460 But is it safe to use. 11 00:00:41,460 --> 00:00:46,830 Well yes not normally it's safe to use. 12 00:00:48,090 --> 00:00:50,790 But you have to take some safety measures. 13 00:00:50,850 --> 00:00:58,050 Once again um Tor is not something that prevents you from getting viruses or mail malware or whatever 14 00:00:58,470 --> 00:01:00,500 to wear what I'm talking about safe. 15 00:01:00,510 --> 00:01:04,610 I'm talking from a anonymous from anonymity point of view. 16 00:01:04,680 --> 00:01:09,870 So if you want to be anonymous or if you want to be let's say under a little when you are going on the 17 00:01:09,870 --> 00:01:16,000 Internet yes it does a pretty much good job it's not a 100 percent because no web browser can guarantee 18 00:01:16,000 --> 00:01:17,880 you 100 percent anonymity. 19 00:01:17,880 --> 00:01:19,840 But once again it does a pretty good job. 20 00:01:20,220 --> 00:01:22,930 So for dying so for that encryption. 21 00:01:23,280 --> 00:01:26,220 So how to protect your anonymity. 22 00:01:26,220 --> 00:01:27,330 As we mentioned last class. 23 00:01:27,330 --> 00:01:30,470 Well it uses an onion the way it works. 24 00:01:30,480 --> 00:01:31,440 It works like an onion. 25 00:01:32,430 --> 00:01:38,700 So it will start at your starting point and then let's say for example you want to go to Google. 26 00:01:39,000 --> 00:01:42,300 Well it's going to pass to the different let's say computers. 27 00:01:42,300 --> 00:01:49,050 It's like an onion when you take off layers from onion when there is a lot of layers. 28 00:01:49,090 --> 00:01:50,340 It's really hard to get. 29 00:01:50,370 --> 00:01:59,280 First the let's say layer or first user who for example wanted to get access to Google which in this 30 00:01:59,280 --> 00:02:03,450 case is you because you are connected to Tor and you want to access to a certain Web site. 31 00:02:04,020 --> 00:02:04,810 So let's see this. 32 00:02:05,070 --> 00:02:10,870 So for the data encryption part Well it's very very very it's it's very it's very but it's pretty much 33 00:02:10,870 --> 00:02:11,550 good. 34 00:02:11,620 --> 00:02:13,150 And yes. 35 00:02:13,220 --> 00:02:14,870 So it works pretty well. 36 00:02:14,920 --> 00:02:18,930 Once again Tor doesn't prevent everything from end to end. 37 00:02:19,090 --> 00:02:20,120 So. 38 00:02:20,680 --> 00:02:27,040 Well from one bird to the other let's say from you your site to the Web site you want to connect to 39 00:02:27,580 --> 00:02:33,550 and you will have to be careful because once again there are people who are able to track you if you 40 00:02:33,550 --> 00:02:37,050 do some bad things on the Deep Web. 41 00:02:38,300 --> 00:02:40,400 Um so how does they say first thing. 42 00:02:40,450 --> 00:02:41,800 Well same thing. 43 00:02:41,800 --> 00:02:47,920 I mean you have to be careful with some plugins so when you're connected to the tower browser you don't 44 00:02:47,920 --> 00:02:53,320 want to download a lot of plugins that you can find on Internet or on YouTube videos. 45 00:02:53,320 --> 00:02:53,590 Why. 46 00:02:53,590 --> 00:02:55,810 Because Tor is already completed. 47 00:02:56,530 --> 00:02:58,940 So when you download the program it's already completed. 48 00:02:59,290 --> 00:03:06,250 And if you download plugins well it can interfere with the job that is already done by the browser browser 49 00:03:06,250 --> 00:03:07,930 it yourself works pretty well. 50 00:03:08,260 --> 00:03:12,470 So you don't have to add a lot of plugins to it make it work better. 51 00:03:12,580 --> 00:03:13,340 It can. 52 00:03:13,420 --> 00:03:19,890 It has more chances too well to put you at risk than to help you with anything. 53 00:03:21,060 --> 00:03:25,280 Because none of those are plugins is guaranteed to be secure. 54 00:03:26,070 --> 00:03:30,720 That's the thing with all the plugins that you download to do it. 55 00:03:32,490 --> 00:03:38,940 Next thing is when you're navigating on the deep web and you want to be 100 percent sure sure that you're 56 00:03:39,000 --> 00:03:40,630 anonymous. 57 00:03:40,830 --> 00:03:47,700 I personally suggest you to close all the apps that are connected to Internet on your computer. 58 00:03:47,730 --> 00:03:49,200 So that's my suggestion. 59 00:03:49,200 --> 00:03:50,080 I personally do it. 60 00:03:50,590 --> 00:03:53,260 Um why. 61 00:03:53,290 --> 00:03:57,720 It's because well people say that they're what people say. 62 00:03:57,720 --> 00:04:03,520 There are ways that people can track you if you leave those apps open so it's just a tip that I personally 63 00:04:03,520 --> 00:04:03,870 use. 64 00:04:03,910 --> 00:04:10,240 I don't leave the apps open on my computer when I'm navigating on let's say the deep web or when I'm 65 00:04:10,240 --> 00:04:16,020 connecting to the TOR browser so that I'm not a safety tip that I can give you. 66 00:04:16,060 --> 00:04:18,490 If you ever navigate on that web browser. 67 00:04:19,130 --> 00:04:19,880 Um. 68 00:04:20,110 --> 00:04:25,770 Next thing when you will be connected to a browser the Tor window will. 69 00:04:26,730 --> 00:04:27,130 It's gonna. 70 00:04:27,190 --> 00:04:32,470 Well it's gonna be a certain size so don't maximize the the size of this window. 71 00:04:32,470 --> 00:04:32,890 Why. 72 00:04:32,900 --> 00:04:40,720 Because by maximizing the size of your window you putting yourself at risk that you can get tracked 73 00:04:41,320 --> 00:04:45,640 or your anonymous city will decrease is when you will. 74 00:04:45,700 --> 00:04:51,580 Well where we will be at the point where we've got a download Tor you will see this morning when toward 75 00:04:51,580 --> 00:04:53,760 that web browser will be downloaded. 76 00:04:53,920 --> 00:05:01,210 You will see the warning that you are not secure when your window is maximized or Max um and so this 77 00:05:01,210 --> 00:05:01,660 is why. 78 00:05:01,690 --> 00:05:03,850 That's another safety tip that I can give you. 79 00:05:04,290 --> 00:05:08,080 Um don't maximize your tour browser window leave it as it is. 80 00:05:08,080 --> 00:05:15,520 You will see the size of it is not that uh small so you'll be able to navigate comfortably comfortably 81 00:05:16,120 --> 00:05:21,100 from your computer on your browser without having to maximize it. 82 00:05:21,770 --> 00:05:27,510 Um next thing Never ever ever download documents on the deep web or slash. 83 00:05:27,580 --> 00:05:30,740 I mean dark web Why. 84 00:05:30,910 --> 00:05:36,780 You know what's in the documents you don't know how much viruses you can download especially for example 85 00:05:36,790 --> 00:05:41,580 you go on a streaming website and you want to download movies on the dark web. 86 00:05:41,910 --> 00:05:47,820 Well it's a very bad idea to download movies there because there is more chances that you download some 87 00:05:47,940 --> 00:05:53,500 virus or some malware that will connect to your computer and steal all your data that you download only 88 00:05:54,450 --> 00:06:00,240 because all you all those Web sites in the surface web are filled with ads and with viruses. 89 00:06:00,270 --> 00:06:02,980 So in the deep web it's in it's even worse. 90 00:06:03,000 --> 00:06:09,830 You have even more chances to get a virus through your computer so never download no data. 91 00:06:09,960 --> 00:06:11,400 Never. 92 00:06:12,570 --> 00:06:20,800 If you receive an email on your well on your tour under a door on your Deep Web message service do not. 93 00:06:21,000 --> 00:06:26,150 Well you can open it but if you receive for example attachments to ask you to download something. 94 00:06:26,280 --> 00:06:29,300 Well don't download it on the surface web. 95 00:06:29,310 --> 00:06:33,410 When you receive an email of something as someone who you don't know asking you to download something. 96 00:06:33,410 --> 00:06:36,990 Well the best thing to do is not think it. 97 00:06:37,290 --> 00:06:39,160 Well it's the same thing on the Deep Web. 98 00:06:39,170 --> 00:06:44,700 Well don't do it because you'll see you're gonna get yourself in a lot of trouble especially if you 99 00:06:44,700 --> 00:06:46,520 don't have the intent of it. 100 00:06:46,690 --> 00:06:50,640 And antivirus or if you're not using a virtual machine. 101 00:06:50,650 --> 00:06:56,610 And in this course we are not talking about connecting your well finger toward our virtual machine but 102 00:06:56,640 --> 00:06:58,340 I talk about tables but it's a bit different. 103 00:06:59,760 --> 00:07:01,110 But yeah I. 104 00:07:01,650 --> 00:07:03,220 Let me just give you a quick. 105 00:07:03,510 --> 00:07:04,680 Well virtual machine. 106 00:07:04,800 --> 00:07:09,180 If you connect through toward the virtual machine it's a bit different because you will be able to. 107 00:07:09,180 --> 00:07:13,260 Well if you catch that you says the viruses will only affect the virtual machine and will not affect 108 00:07:13,260 --> 00:07:14,190 your computer. 109 00:07:14,190 --> 00:07:21,030 Once again in this course we are only talking about getting connected to the deep web not using a lot 110 00:07:21,030 --> 00:07:25,150 of stuff to be like 100 percent anonymous. 111 00:07:25,290 --> 00:07:25,530 Yeah. 112 00:07:25,590 --> 00:07:26,630 You said that. 113 00:07:26,910 --> 00:07:30,300 Don't play around with the darknet when you are on the darknet. 114 00:07:30,300 --> 00:07:31,040 You need. 115 00:07:31,250 --> 00:07:34,610 Well what I suggest to you personally is you will have to. 116 00:07:34,650 --> 00:07:37,340 You will need to have a list of Web sites you want to visit. 117 00:07:37,350 --> 00:07:40,920 Let's say for example you want to visit this Web site or this Web site. 118 00:07:42,360 --> 00:07:46,040 Well you know where you're going you know exactly where you. 119 00:07:46,200 --> 00:07:47,730 What exactly you want to visit. 120 00:07:47,940 --> 00:07:49,850 And if you need to make some research as well. 121 00:07:49,860 --> 00:07:53,300 Make them on the clear net or the surface web or. 122 00:07:53,640 --> 00:07:57,230 Well you can go on certain forums that can help you with this. 123 00:07:57,660 --> 00:08:02,490 But don't start looking around and clicking on all links that you can find on the deep web because there 124 00:08:02,490 --> 00:08:08,730 is more chances that go on an unwanted Web site that than anything else. 125 00:08:08,730 --> 00:08:12,880 So once again be very very safe on this path. 126 00:08:12,900 --> 00:08:19,800 So you will need to have a clear Web site where you want to go if not what Matrix research on the surface 127 00:08:19,800 --> 00:08:27,530 web for the links and then only after that can you trade those links on the deep web. 128 00:08:27,560 --> 00:08:33,270 So let me summarize so once again that our encryption for the well for the safety it's pretty much good. 129 00:08:33,680 --> 00:08:36,040 So it works very well the right way. 130 00:08:36,350 --> 00:08:43,760 So be very careful with the plugins that you can download for the web browser doubled nothing from the 131 00:08:43,910 --> 00:08:52,630 from when you visited the deep web nothing nothing never close our apps when you were using Tor so don't 132 00:08:52,700 --> 00:08:55,150 forget about this all up close. 133 00:08:55,160 --> 00:08:58,880 Only the two hour window open to maximize your door window. 134 00:08:58,920 --> 00:09:06,890 You're too wet to window because it can be tracked if it's maximized don't open and downloaded documents 135 00:09:07,270 --> 00:09:09,080 or don't download no document. 136 00:09:09,140 --> 00:09:16,100 No start downloading stuff because it can be viruses malware is there or any kind of stuff you're not 137 00:09:16,100 --> 00:09:20,840 on the surface whether you're on the Dark Web so you have to be very careful it don't start to play 138 00:09:20,840 --> 00:09:26,210 around once again because you can get on Web sites that you don't want to get into. 139 00:09:27,560 --> 00:09:29,140 So that's where this course goes. 140 00:09:29,180 --> 00:09:35,930 And then I see you all in our next class where we are gonna talk about the concept of anonymous.