1 00:00:00,000 --> 00:00:07,000 In the previous lecture, we learned that there is an anonymizing network that we can use in order to 2 00:00:07,000 --> 00:00:09,000 protect our anonymity and privacy. 3 00:00:10,000 --> 00:00:17,000 We learned that it works because it has a number of computers or nodes connected to the network. 4 00:00:17,000 --> 00:00:24,000 And then when we send data through the network, it will bounce over a minimum of three nodes before 5 00:00:24,000 --> 00:00:27,000 it goes to the destination. 6 00:00:28,000 --> 00:00:28,000 Now. 7 00:00:28,000 --> 00:00:37,000 I also mentioned in the previous lecture that Thor allows connected devices to host or to offer services. 8 00:00:37,000 --> 00:00:40,000 Now these services can be a simple website. 9 00:00:40,000 --> 00:00:49,000 And because these websites are connected to Tor, they will benefit from the anonymity that Tor offers, 10 00:00:49,000 --> 00:00:56,000 and therefore they're usually referred to as Tor hidden services or onion services. 11 00:00:57,000 --> 00:01:03,000 So this diagram right here would usually look more like this in real life. 12 00:01:03,000 --> 00:01:09,000 So you'd have some nodes or relays which you can use in order to go to a certain destination on the 13 00:01:09,000 --> 00:01:10,000 Internet. 14 00:01:10,000 --> 00:01:17,000 But at the same time, some of the connected nodes or some of the connected devices are actually acting 15 00:01:17,000 --> 00:01:18,000 as onion services. 16 00:01:18,000 --> 00:01:26,000 So these are similar to normal websites that you see on the Internet, but they exist within the Tor 17 00:01:26,000 --> 00:01:27,000 network. 18 00:01:27,000 --> 00:01:36,000 They also use a really smart protocol developed by Tor, which is designed to hide the identity of the 19 00:01:36,000 --> 00:01:42,000 server, offering the service and the client trying to access the service. 20 00:01:43,000 --> 00:01:52,000 So whenever you try to access a TOR service at any point of time, both the client and the server offering 21 00:01:52,000 --> 00:01:57,000 the service do not know where or who the other party is. 22 00:01:59,000 --> 00:02:06,000 So let's say instead of trying to go to Google.com, you try to go to this onion service right here. 23 00:02:06,000 --> 00:02:10,000 What's going to happen is you're going to connect to the Tor network again. 24 00:02:10,000 --> 00:02:17,000 Connection right here is not encrypted by TOR, but the ISP, like I said, the internet service provider 25 00:02:17,000 --> 00:02:23,000 or any other entity trying to censor your connection, they won't be able to see that you're trying 26 00:02:23,000 --> 00:02:25,000 to access an onion service. 27 00:02:25,000 --> 00:02:29,000 They'll only be able to see that you're connecting to the Tor network. 28 00:02:30,000 --> 00:02:35,000 Then once you're in the network, you're going to bounce your request over a random node. 29 00:02:35,000 --> 00:02:38,000 You're going to go to a second random node. 30 00:02:38,000 --> 00:02:45,000 And finally, instead of going to a third node, then out to the Internet to another website on the 31 00:02:45,000 --> 00:02:51,000 Internet, on the service web, you're going to stay within the Tor network and you're literally just 32 00:02:51,000 --> 00:02:53,000 going to go to your onion service. 33 00:02:54,000 --> 00:03:00,000 Now, whenever you try to communicate or connect to an onion service, the process is actually much 34 00:03:00,000 --> 00:03:04,000 more complex than what's shown in this diagram. 35 00:03:04,000 --> 00:03:13,000 It is done over a really smart protocol that is developed by Tor, so that when you connect to an onion 36 00:03:13,000 --> 00:03:20,000 service, you won't be able to see or get information about the server offering the service. 37 00:03:21,000 --> 00:03:28,000 At the same time, the server offering the onion service or the hidden service will not be able to get 38 00:03:28,000 --> 00:03:34,000 information about you regarding your location or anything that can identify you. 39 00:03:35,000 --> 00:03:42,000 Again, all of this done in order to protect the privacy and anonymity of both the server offering the 40 00:03:42,000 --> 00:03:45,000 service and the user. 41 00:03:45,000 --> 00:03:51,000 Now, in the next lecture, I'm going to show you how to connect to Tor, how to access a hidden service, 42 00:03:51,000 --> 00:03:54,000 and you'll be able to understand this better.