1 00:00:00,000 --> 00:00:02,000 Hello and welcome. 2 00:00:02,000 --> 00:00:03,000 My name is Zaid. 3 00:00:03,000 --> 00:00:06,000 I'm an ethical hacker, a computer scientist. 4 00:00:06,000 --> 00:00:08,000 And I'll be your instructor in this course. 5 00:00:14,000 --> 00:00:17,000 Now before diving into the course content. 6 00:00:17,000 --> 00:00:21,000 Let's talk about the main topics that we're going to cover in this course. 7 00:00:21,000 --> 00:00:28,000 So we're going to talk about privacy, anonymity, the Darkweb and security. 8 00:00:28,000 --> 00:00:34,000 I chose to cover all of these topics in one course because I think they are very related. 9 00:00:34,000 --> 00:00:40,000 And sometimes on the Internet it's very difficult to achieve one of them without the others. 10 00:00:41,000 --> 00:00:46,000 So starting with the first one, privacy means that no one knows what you do. 11 00:00:46,000 --> 00:00:52,000 For example, when you go and enter your house, people can see that you entered your house, but they 12 00:00:52,000 --> 00:00:55,000 don't know what you do inside the house. 13 00:00:55,000 --> 00:01:03,000 Therefore, your private anonymity, on the other hand, means that people can see what you're doing, 14 00:01:03,000 --> 00:01:04,000 but they don't know who you are. 15 00:01:05,000 --> 00:01:10,000 For example, let's say while you're inside your house, you put a mask on and then you leave the house 16 00:01:10,000 --> 00:01:12,000 and start washing your car. 17 00:01:12,000 --> 00:01:17,000 Now people can see that there is somebody washing the car so they can see what you're doing. 18 00:01:17,000 --> 00:01:23,000 They can see the activity, but they don't know who is that person washing the car because you have 19 00:01:23,000 --> 00:01:26,000 a mask, therefore you're hiding your identity. 20 00:01:26,000 --> 00:01:32,000 So when your private people know who you are, but they don't see what you do when you're anonymous, 21 00:01:32,000 --> 00:01:38,000 people see what you do but don't know who is that person doing that activity so they don't know your 22 00:01:38,000 --> 00:01:39,000 identity. 23 00:01:40,000 --> 00:01:46,000 Now, on the Internet, usually we just want to be private, so we don't want other parties to be able 24 00:01:46,000 --> 00:01:50,000 to see the messages or the emails or whatever we do on the Internet. 25 00:01:51,000 --> 00:01:57,000 Unfortunately, though, it is very difficult to be private on the Internet because in order to use 26 00:01:57,000 --> 00:02:03,000 the Internet, you have to use resources that are not owned by you. 27 00:02:03,000 --> 00:02:06,000 So you have to use an Internet service provider. 28 00:02:06,000 --> 00:02:12,000 And when you're accessing websites or using services, you're using servers owned by the services or 29 00:02:12,000 --> 00:02:13,000 by third parties. 30 00:02:13,000 --> 00:02:18,000 Therefore, you can't really control how your data is being handled. 31 00:02:18,000 --> 00:02:22,000 For example, let's say you try to go to Google.com. 32 00:02:22,000 --> 00:02:26,000 This request will, first of all, pass through a number of stops or a number of routers. 33 00:02:26,000 --> 00:02:29,000 It will go to your Internet service provider again. 34 00:02:29,000 --> 00:02:35,000 It will pass through a number of routers and a number of stops and eventually reaches Google servers, 35 00:02:35,000 --> 00:02:41,000 which again are not controlled by you and then you get your response through a similar route. 36 00:02:41,000 --> 00:02:47,000 Therefore, both your request and the response will pass through a number of stops that you don't own 37 00:02:47,000 --> 00:02:48,000 or don't control. 38 00:02:48,000 --> 00:02:54,000 So anybody operating or working on these tabs will be able to see your traffic. 39 00:02:54,000 --> 00:02:56,000 You will be able to see your activity. 40 00:02:56,000 --> 00:03:02,000 Not only that, but hackers and government agencies and other entities can possibly intercept these 41 00:03:02,000 --> 00:03:07,000 requests and responses at any point and therefore see what you're doing. 42 00:03:07,000 --> 00:03:10,000 Therefore, your privacy is gone. 43 00:03:11,000 --> 00:03:15,000 So we use encryption whenever possible in order to improve our privacy. 44 00:03:15,000 --> 00:03:22,000 But like I said, there will be some points and some situations where it is just not possible to be 45 00:03:22,000 --> 00:03:22,000 private. 46 00:03:22,000 --> 00:03:28,000 Therefore, the best solution is to try to become as anonymous as possible. 47 00:03:28,000 --> 00:03:36,000 So if anybody manages to intercept our data, they won't be able to link it to ourselves or to our identity. 48 00:03:36,000 --> 00:03:42,000 Now there are some situations where people actually want to be just anonymous. 49 00:03:42,000 --> 00:03:48,000 For example, journalists usually prefer to publish sensitive posts anonymously so that everybody can 50 00:03:48,000 --> 00:03:49,000 see the post. 51 00:03:49,000 --> 00:03:55,000 So it's not hidden, it's not private, but at the same time it can't be linked to their real identity. 52 00:03:56,000 --> 00:03:59,000 This way the post will be linked to some kind of identity. 53 00:03:59,000 --> 00:04:04,000 So it will be linked to a fake name or simply just numbers or a ghost profile. 54 00:04:04,000 --> 00:04:07,000 But it is linked to some kind of identity. 55 00:04:07,000 --> 00:04:10,000 Therefore, this is known as pseudo anonymity. 56 00:04:11,000 --> 00:04:17,000 Now, in order to achieve the above two things to become more private and more anonymous, we're going 57 00:04:17,000 --> 00:04:18,000 to need two things. 58 00:04:18,000 --> 00:04:24,000 First, we're going to need an anonymizing service that will allow us to become more anonymous. 59 00:04:24,000 --> 00:04:31,000 And two, we're going to need to change our habits when it comes to using online services and use different 60 00:04:31,000 --> 00:04:35,000 services that are more private and more anonymous. 61 00:04:35,000 --> 00:04:40,000 Because the search engines that you're used to, for example, Google and Bing, the emails that you're 62 00:04:40,000 --> 00:04:45,000 used to, Gmail and the others and all of the other services that you're used to use are simply not 63 00:04:45,000 --> 00:04:47,000 private and not anonymous. 64 00:04:47,000 --> 00:04:48,000 They profile you. 65 00:04:48,000 --> 00:04:53,000 They collect data about you, and sometimes even sell it to third parties. 66 00:04:55,000 --> 00:05:02,000 Unfortunately, on the clear net, there aren't a lot of useful online services that are private and 67 00:05:02,000 --> 00:05:02,000 anonymous. 68 00:05:02,000 --> 00:05:09,000 Luckily, though, the anonymizing services that we're going to use from 0.1 in order to become more 69 00:05:09,000 --> 00:05:17,000 anonymous also contain a number of services and websites that only exist within this anonymizing service 70 00:05:17,000 --> 00:05:18,000 or network. 71 00:05:18,000 --> 00:05:23,000 Therefore, these are referred to as Darknet or dark web websites or services. 72 00:05:23,000 --> 00:05:29,000 So I'm going to show you how to properly access the darknet and then use these services to carry out 73 00:05:29,000 --> 00:05:34,000 our day to day tasks in a more anonymous and more private manner. 74 00:05:34,000 --> 00:05:42,000 Last but not least, I also wanted to cover security in this course because you cannot be private and 75 00:05:42,000 --> 00:05:48,000 anonymous if you are not secure, even if you're using the best privacy methods, the best anonymity 76 00:05:48,000 --> 00:05:52,000 methods, the best VPNs, multiple proxies, and so on. 77 00:05:52,000 --> 00:05:58,000 If somebody manages to hack into your computer, then first of all, they'll be able to see all of your 78 00:05:58,000 --> 00:06:01,000 files and see your activity so you're not private. 79 00:06:01,000 --> 00:06:08,000 And they'll also be able to bypass whatever methods you use to become anonymous and anonymize you. 80 00:06:08,000 --> 00:06:13,000 That's why, like I said, you can't really be private and anonymous without being secure. 81 00:06:13,000 --> 00:06:18,000 And by being private and anonymous, you're going to have to use some Darknet services. 82 00:06:18,000 --> 00:06:21,000 Therefore, I'll have to teach you how to access the darknet and use it. 83 00:06:22,000 --> 00:06:27,000 So the four topics really click with each other, and when you learn these topics, you'll be able to 84 00:06:27,000 --> 00:06:30,000 use them and apply them in different situations. 85 00:06:30,000 --> 00:06:36,000 You might be at a scenario that I can think of that requires you to be a little bit private or anonymous, 86 00:06:36,000 --> 00:06:41,000 so you'll be able to learn whatever techniques I teach you in here in terms of anonymity or privacy 87 00:06:41,000 --> 00:06:45,000 and apply them to whatever situation that you're in.