1 00:00:00,000 --> 00:00:01,000 Okay. 2 00:00:01,000 --> 00:00:08,000 So now that we understand that there is basically a network of devices connected to each other that 3 00:00:08,000 --> 00:00:12,000 we can use to improve our privacy and anonymity. 4 00:00:12,000 --> 00:00:16,000 The question is, how can we connect to this network and use it? 5 00:00:17,000 --> 00:00:20,000 Well, the answer is actually very simple. 6 00:00:20,000 --> 00:00:27,000 You can configure your computer regardless of what operating system it uses to route all traffic through 7 00:00:27,000 --> 00:00:28,000 the Tor network. 8 00:00:28,000 --> 00:00:35,000 And that way, hopefully everything will flow through the network, protecting your privacy and anonymity. 9 00:00:36,000 --> 00:00:43,000 Sadly, though, this is not always the case, as you probably have a lot of programs that I don't even 10 00:00:43,000 --> 00:00:51,000 know of that could leak information about you potentially revealing your location, your IP and more 11 00:00:51,000 --> 00:00:52,000 information. 12 00:00:53,000 --> 00:00:59,000 Not only that, but you could be running an unpatched version of Windows or Linux or even OS X. 13 00:01:00,000 --> 00:01:06,000 Also, your browser could leak information about you even if you think you properly configured it. 14 00:01:06,000 --> 00:01:06,000 Use Tor. 15 00:01:07,000 --> 00:01:14,000 Also, a lot of us use browser plugins and browser extensions, which also could potentially leak information. 16 00:01:15,000 --> 00:01:18,000 And finally, we have the exit node problem. 17 00:01:19,000 --> 00:01:25,000 In the previous lecture, I already mentioned that when you connect to Tor, all the data and green 18 00:01:25,000 --> 00:01:33,000 in here is sent encrypted and at any time none of the nodes know what websites you want to go to. 19 00:01:33,000 --> 00:01:39,000 They only know the address of the next node so they can forward the data to the next node. 20 00:01:39,000 --> 00:01:48,000 But as I mentioned, the red arrow in here means the data leaving in here will leave unencrypted unless 21 00:01:48,000 --> 00:01:49,000 https is used. 22 00:01:49,000 --> 00:01:57,000 So you'll have to go and manually install HTTPS everywhere to force data to be sent over https. 23 00:01:58,000 --> 00:02:01,000 Also we have this node right here. 24 00:02:01,000 --> 00:02:03,000 This is known as the exit node. 25 00:02:03,000 --> 00:02:12,000 And the problem here is anybody can actually configure a computer to work as a node in the Tor network. 26 00:02:12,000 --> 00:02:20,000 And if your computer is an exit node, you will be able to see this data leaving unencrypted. 27 00:02:20,000 --> 00:02:28,000 So you have to trust this person if you're really using the Tor network as they can potentially see 28 00:02:28,000 --> 00:02:29,000 everything you do. 29 00:02:30,000 --> 00:02:37,000 Now, like I said in the previous lecture, if the Target website uses https or if you're using a plugin 30 00:02:37,000 --> 00:02:45,000 that will force HTTPS connections, then this will be okay because the data will be encrypted by SSL 31 00:02:45,000 --> 00:02:50,000 because HTTPS encrypts the HTTP data, so you'll be fine. 32 00:02:50,000 --> 00:02:55,000 But this is again another step that you have to take and another plugin that you have to install on 33 00:02:55,000 --> 00:03:00,000 your browser in order to make sure that your data is fully encrypted along the whole way. 34 00:03:00,000 --> 00:03:07,000 And even if someone is able to see this data, such as the person running the exit node here, or if 35 00:03:07,000 --> 00:03:12,000 there is someone in here intercepting the connection, even if they capture the data, they will not 36 00:03:12,000 --> 00:03:16,000 be able to read it because it will be encrypted. 37 00:03:17,000 --> 00:03:24,000 So like I said, there's a lot of steps to do if you want to configure your computer to use the Tor 38 00:03:24,000 --> 00:03:24,000 network. 39 00:03:24,000 --> 00:03:30,000 And even if you do all of that, you could miss a tiny or a small detail that could potentially leak 40 00:03:30,000 --> 00:03:33,000 information and reveal your identity. 41 00:03:34,000 --> 00:03:42,000 Therefore a better solution is to either use the Tor browser and we'll talk about that in the next section. 42 00:03:42,000 --> 00:03:48,000 This is a web browser designed by the same people that run the Tor network. 43 00:03:48,000 --> 00:03:52,000 It routes all the data through the Tor network by default. 44 00:03:52,000 --> 00:04:00,000 It also has a lot of other features to prevent leaking your information and ensuring the data that you 45 00:04:00,000 --> 00:04:02,000 send is always encrypted. 46 00:04:03,000 --> 00:04:06,000 This is the simplest and a good solution. 47 00:04:06,000 --> 00:04:13,000 A better solution would be to use Thales, which is a Linux distro designed for anonymity and privacy, 48 00:04:13,000 --> 00:04:23,000 and the best solution would be using cubes OS with Unix gateway, which is an amazing operating system 49 00:04:23,000 --> 00:04:30,000 that is very, very secure and also can be configured to use TOR by default. 50 00:04:30,000 --> 00:04:34,000 Improving your security and anonymity and privacy. 51 00:04:35,000 --> 00:04:41,000 Now we will go over all of this in the next lectures, starting with the simplest and easiest, and 52 00:04:41,000 --> 00:04:45,000 will end with the more complex but the best approach.