1 00:00:00,000 --> 00:00:01,000 So what? 2 00:00:01,000 --> 00:00:10,000 A store tour is short for the onion router, and it's basically a network of computers or servers designed 3 00:00:10,000 --> 00:00:13,000 to improve anonymity and privacy. 4 00:00:13,000 --> 00:00:21,000 It's the most common anonymizing network with the most amount of users, and it also allows connected 5 00:00:21,000 --> 00:00:25,000 users to offer hidden services or online services. 6 00:00:25,000 --> 00:00:32,000 So these are basically deep net or darknet websites, and that's what most people refer to when they're 7 00:00:32,000 --> 00:00:40,000 talking about Darknet or the deep net websites, even though it could mean many other anonymizing networks 8 00:00:40,000 --> 00:00:42,000 and hidden services networks. 9 00:00:43,000 --> 00:00:48,000 I should also note that Tor relies on onion routing. 10 00:00:48,000 --> 00:00:56,000 This is a technique that was designed by the US Army in order to protect their intelligence communications. 11 00:00:56,000 --> 00:00:58,000 You might want to use Tor. 12 00:00:58,000 --> 00:01:05,000 Even if you don't want to access the deep net, you can literally just use it if you want to protect 13 00:01:05,000 --> 00:01:07,000 your privacy and anonymity. 14 00:01:07,000 --> 00:01:10,000 So why you might want to do that? 15 00:01:10,000 --> 00:01:14,000 Well, let's see what happens when you connect to a website. 16 00:01:14,000 --> 00:01:21,000 So let's say, for example, you open your browser and you navigate to Google.com or Facebook.com by 17 00:01:21,000 --> 00:01:27,000 default without really doing or trying anything, these websites will be able to see your location, 18 00:01:27,000 --> 00:01:32,000 your browser version, your operating system, and much more information. 19 00:01:32,000 --> 00:01:39,000 And it doesn't stop there, for example, because you use Google to search for a lot of things. 20 00:01:39,000 --> 00:01:45,000 Google can see everything you search right now and even everything that you searched before. 21 00:01:46,000 --> 00:01:53,000 Not only that, but again, big websites such as Google and Facebook, they can even potentially access 22 00:01:53,000 --> 00:01:57,000 your activity outside of these websites. 23 00:01:58,000 --> 00:02:02,000 They use this relying on the features they offer to other websites. 24 00:02:02,000 --> 00:02:07,000 For example, any website that would have a Google or a Facebook share button would have a piece of 25 00:02:07,000 --> 00:02:11,000 code from Google or from Facebook running on their website. 26 00:02:11,000 --> 00:02:17,000 And again, Google and Facebook use this code in order to see which websites you visit. 27 00:02:17,000 --> 00:02:21,000 And obviously they use that in order to serve you ads related to you. 28 00:02:21,000 --> 00:02:27,000 We all know that you search for something and you start seeing it everywhere else, but it doesn't stop 29 00:02:27,000 --> 00:02:27,000 there. 30 00:02:27,000 --> 00:02:34,000 We've all read the Cambridge Analytica scandal and how they were able to access private information 31 00:02:34,000 --> 00:02:35,000 about Facebook users. 32 00:02:35,000 --> 00:02:38,000 And it doesn't even stop at this. 33 00:02:38,000 --> 00:02:46,000 There are several reports reporting that websites such as Facebook creates ghost profiles, so profiles 34 00:02:46,000 --> 00:02:50,000 for people that don't even have a Facebook account. 35 00:02:50,000 --> 00:02:53,000 So you might think, okay, I don't have a Facebook account. 36 00:02:53,000 --> 00:02:55,000 They can't really track me. 37 00:02:55,000 --> 00:03:02,000 No, they still probably have a profile about you because like I said, any website that you visit that 38 00:03:02,000 --> 00:03:09,000 has a Facebook like button or a Facebook share button will collect data about you. 39 00:03:09,000 --> 00:03:11,000 And Facebook is not going to stop there. 40 00:03:11,000 --> 00:03:13,000 They will create a profile. 41 00:03:13,000 --> 00:03:19,000 They'll add some name to it or some identity to it, and they'll have all the things related to you 42 00:03:19,000 --> 00:03:25,000 what you like, what websites you visit, what did you purchase recently, and so on. 43 00:03:25,000 --> 00:03:27,000 This is only what's been reported. 44 00:03:27,000 --> 00:03:33,000 So you can only imagine what's happening without getting caught and without being reported. 45 00:03:34,000 --> 00:03:36,000 So what's the solution? 46 00:03:37,000 --> 00:03:41,000 Well, Thor is actually a pretty good solution to prevent this. 47 00:03:41,000 --> 00:03:50,000 So when you connect to Tor, you can imagine Tor being this really big network and it has a large number 48 00:03:50,000 --> 00:03:51,000 of servers. 49 00:03:51,000 --> 00:03:57,000 So each circle in here is literally a server in the Tor network. 50 00:03:57,000 --> 00:04:02,000 So you'll connect to Tor and let's say you want to go to Google.com. 51 00:04:02,000 --> 00:04:09,000 What's going to happen is your request is going to bounce over three different servers or three different 52 00:04:09,000 --> 00:04:12,000 nodes before it goes to Google. 53 00:04:13,000 --> 00:04:21,000 So Google can only see the last node or the last server or the last computer that the request was sent 54 00:04:21,000 --> 00:04:22,000 from. 55 00:04:22,000 --> 00:04:26,000 It can't see you or the original user. 56 00:04:27,000 --> 00:04:30,000 Keep in mind that these servers are shared. 57 00:04:30,000 --> 00:04:36,000 So at any point of time there would be millions of users using the Tor network. 58 00:04:36,000 --> 00:04:40,000 So there would be lots of requests going in and out of each node. 59 00:04:40,000 --> 00:04:44,000 So when you're going into this node, you're not the only user accessing this node. 60 00:04:44,000 --> 00:04:50,000 So there are lots of requests coming in and out of here, same in here and same in here. 61 00:04:51,000 --> 00:04:58,000 So this node could potentially be sending thousands of requests out to a number of websites. 62 00:04:58,000 --> 00:05:06,000 Therefore, whatever website these requests are going to, it is very hard for it to profile that request 63 00:05:06,000 --> 00:05:09,000 or to know where that request came from. 64 00:05:09,000 --> 00:05:18,000 Also, data sent within the Tor network is always encrypted, so you can see the green arrows in here. 65 00:05:18,000 --> 00:05:26,000 These represent encrypted data and the only two times where your data is sent unencrypted is the red 66 00:05:26,000 --> 00:05:27,000 arrows. 67 00:05:27,000 --> 00:05:34,000 So it's when you try to send something to the terror network and it's when data leave the Tor network. 68 00:05:35,000 --> 00:05:44,000 This arrow right here is not very important because if the Target website uses https or if you're using 69 00:05:44,000 --> 00:05:52,000 a browser plugin that forces https, then this data right here will be encrypted by HTTPS, by SSL. 70 00:05:52,000 --> 00:05:59,000 So the only point where your data is sent unencrypted is when you're sending data to Tor. 71 00:06:00,000 --> 00:06:08,000 Also keep in mind, whenever you're sending data to Tor, even with to your Internet service provider, 72 00:06:08,000 --> 00:06:14,000 they can see that you're trying to access Tor, but they won't be able to see the websites you're trying 73 00:06:14,000 --> 00:06:15,000 to access. 74 00:06:15,000 --> 00:06:20,000 So all they'll be able to see is this person right here is trying to access Tor, but they won't really 75 00:06:20,000 --> 00:06:24,000 be able to see that you're trying to go to Google.com. 76 00:06:24,000 --> 00:06:30,000 So even if there was a hacker or even if there was censorship in place, they really won't be able to 77 00:06:30,000 --> 00:06:32,000 see which websites you're going to. 78 00:06:32,000 --> 00:06:36,000 They'll only be able to see that you're accessing the Tor network.