1 00:00:00,000 --> 00:00:06,000 In this video, I'm going to show you how to properly install the Tor browser and make sure that it 2 00:00:06,000 --> 00:00:09,000 was not modified as it was being downloaded. 3 00:00:10,000 --> 00:00:15,000 The method that I'm going to show you here will work on Windows 11 and Windows ten. 4 00:00:15,000 --> 00:00:22,000 If you want to install the Tor browser on Linux or Mac OS, then skip this lecture as I will cover this 5 00:00:22,000 --> 00:00:26,000 process for other operating systems in the next lectures. 6 00:00:28,000 --> 00:00:32,000 So first of all, we're going to download the Tor browser from their official website. 7 00:00:33,000 --> 00:00:34,000 We're going to scroll down. 8 00:00:35,000 --> 00:00:39,000 And we want to download it for Windows and I want to download the English version. 9 00:00:39,000 --> 00:00:45,000 And as you can see, we have a 32 bit and 64 bit version depending on your processor. 10 00:00:45,000 --> 00:00:48,000 Now I have a 64 bit processor in my computer. 11 00:00:48,000 --> 00:00:51,000 Therefore I'm going to click on the 64 bit. 12 00:00:52,000 --> 00:00:54,000 As you can see, it's going to download it here for me. 13 00:00:54,000 --> 00:00:58,000 And once the download is complete, it's going to go into your downloads. 14 00:00:58,000 --> 00:01:04,000 So I'm going to open up my file manager and I'm going to go to downloads and we have the installer right 15 00:01:04,000 --> 00:01:05,000 here. 16 00:01:05,000 --> 00:01:11,000 Now, just like any other program, you can simply double click this and click on next, next, next, 17 00:01:11,000 --> 00:01:14,000 next and it will be installed on your system. 18 00:01:14,000 --> 00:01:22,000 But because we are trying to protect our privacy and anonymity, it is a good idea to verify the integrity 19 00:01:22,000 --> 00:01:30,000 of this file before we run it, to make sure that this file did not get modified as it was downloaded. 20 00:01:30,000 --> 00:01:36,000 Because if the file gets modified as it's being downloaded, it could contain backdoors or it could 21 00:01:36,000 --> 00:01:43,000 contain code that would render the privacy and anonymity features that this browser offers useless. 22 00:01:43,000 --> 00:01:49,000 Because when you download something from the internet, it passes through a number of nodes in which 23 00:01:49,000 --> 00:01:50,000 it can be modified. 24 00:01:50,000 --> 00:01:58,000 So it can be modified by your Internet service provider, it can be modified by your network administrator, 25 00:01:58,000 --> 00:02:03,000 and it can even be modified by hackers who manage to intercept the connection. 26 00:02:04,000 --> 00:02:10,000 So in order to verify the integrity of this file, we're going to need to download the file signature 27 00:02:10,000 --> 00:02:12,000 associated with it. 28 00:02:12,000 --> 00:02:16,000 So as you can see, every single file has a sig. 29 00:02:16,000 --> 00:02:23,000 A sig is short for signature, and this is a file that the developers create once they package the program 30 00:02:23,000 --> 00:02:31,000 and they create it for us so that we can use it to make sure that the program did not get modified since 31 00:02:31,000 --> 00:02:32,000 this file was created. 32 00:02:32,000 --> 00:02:37,000 So if this file gets modified in any way, shape or form, it will break the signature. 33 00:02:37,000 --> 00:02:41,000 And the verification process that I'm about to show you will fail. 34 00:02:42,000 --> 00:02:47,000 So you want to make sure you download the right signature for the file that you downloaded. 35 00:02:47,000 --> 00:02:48,000 So I downloaded this file. 36 00:02:48,000 --> 00:02:50,000 That means I should download the signature. 37 00:02:51,000 --> 00:02:53,000 So we're going to download the signature. 38 00:02:53,000 --> 00:02:56,000 And again, it's going to go into my downloads. 39 00:02:56,000 --> 00:02:57,000 So we have it right here. 40 00:02:58,000 --> 00:03:04,000 And finally, we need to download the public key for the developers that create Tor. 41 00:03:05,000 --> 00:03:07,000 You can download it from their website from here. 42 00:03:07,000 --> 00:03:09,000 So if you scroll down. 43 00:03:10,000 --> 00:03:14,000 We have the download link in here so you can click on it. 44 00:03:14,000 --> 00:03:16,000 You're going to see gibberish on the page, but that's fine. 45 00:03:16,000 --> 00:03:18,000 That's their public key. 46 00:03:18,000 --> 00:03:26,000 So we're going to right click this file and save file as we're going to keep it in our downloads and 47 00:03:26,000 --> 00:03:27,000 you can name it anything you want. 48 00:03:27,000 --> 00:03:34,000 I'm just going to name it Tor browser key and you can use any extension you want, but I'm going to 49 00:03:34,000 --> 00:03:38,000 name it dot key just to eliminate the confusion. 50 00:03:38,000 --> 00:03:40,000 And we're going to select all files from here. 51 00:03:41,000 --> 00:03:42,000 We're going to click on Save. 52 00:03:43,000 --> 00:03:50,000 And if I go to my downloads now, I have the installer right here, I have the signature file right 53 00:03:50,000 --> 00:03:53,000 here and I have the developer's key right here. 54 00:03:53,000 --> 00:04:00,000 So the developers are the people that created the Tor browser and created this file right here. 55 00:04:00,000 --> 00:04:06,000 Once they create this file, they create a signature that corresponds to this version of the file. 56 00:04:06,000 --> 00:04:11,000 This signature will only be valid if this file is not modified. 57 00:04:11,000 --> 00:04:17,000 If this file gets modified in any way, shape or form, the verification between the two will break 58 00:04:17,000 --> 00:04:20,000 and this signature will become invalid. 59 00:04:20,000 --> 00:04:26,000 Now we have a full section about encryption and verification later on in the course, and we will explain 60 00:04:26,000 --> 00:04:29,000 how this whole process works in details. 61 00:04:29,000 --> 00:04:35,000 But basically we're going to use the public key for the developers that created this package to make 62 00:04:35,000 --> 00:04:42,000 sure that this package did not get modified since they created it and created this signature for it. 63 00:04:44,000 --> 00:04:49,000 Now to do all of this, we're going to need to use a program that does the verification for us. 64 00:04:49,000 --> 00:04:56,000 The program is called GPG for when I'm going to include the download link in the resources and to download 65 00:04:56,000 --> 00:04:56,000 it. 66 00:04:56,000 --> 00:05:00,000 We're just going to set this to zero because we don't want to donate anything and we're going to click 67 00:05:00,000 --> 00:05:01,000 on Download. 68 00:05:02,000 --> 00:05:09,000 And that said, download it for us and here we're going to run this program to install it on our computer. 69 00:05:10,000 --> 00:05:13,000 And installing it is going to be very, very simple. 70 00:05:13,000 --> 00:05:19,000 We're simply going to click on next next install, keeping everything to the default settings. 71 00:05:20,000 --> 00:05:22,000 Once the installation is complete. 72 00:05:22,000 --> 00:05:28,000 Again, we're going to click on next and I'm going to take this box so it doesn't launch it for me automatically. 73 00:05:28,000 --> 00:05:32,000 We're going to click on Finish and the program is installed for us. 74 00:05:32,000 --> 00:05:38,000 So we're going to use that program to verify that this package did not get modified. 75 00:05:38,000 --> 00:05:43,000 And as you can see, we have the program here on my desktop or you can find this under your application 76 00:05:43,000 --> 00:05:45,000 in the start menu. 77 00:05:45,000 --> 00:05:49,000 It's called Cleopatra, so we're going to double click it to start it. 78 00:05:50,000 --> 00:05:57,000 And we're going to click on import to import a key, and we want to import the public key for the developers. 79 00:05:57,000 --> 00:06:04,000 So we're going to select all files from here and we're going to select the file with the DOT key extension. 80 00:06:04,000 --> 00:06:07,000 So that's the file that we downloaded from the Internet. 81 00:06:07,000 --> 00:06:12,000 We're going to click on Open and give it some time to import it and verify it. 82 00:06:13,000 --> 00:06:14,000 And perfect. 83 00:06:14,000 --> 00:06:20,000 Now, the developer key, as you can see in here, is the Tor browser developer's key is added successfully 84 00:06:20,000 --> 00:06:23,000 to this program, Cleopatra. 85 00:06:23,000 --> 00:06:30,000 Next, we want to verify that the installer did not get modified and we're going to do this by clicking 86 00:06:30,000 --> 00:06:32,000 on Decrypt Verify. 87 00:06:32,000 --> 00:06:35,000 We're going to select the file that we want to verify. 88 00:06:35,000 --> 00:06:39,000 So I'm going to go to my downloads and we're going to select the installer. 89 00:06:39,000 --> 00:06:42,000 So this file right here, remember it's the application. 90 00:06:43,000 --> 00:06:48,000 Now, as you can see, we're actually not selecting the signature, but it's going to automatically 91 00:06:48,000 --> 00:06:52,000 use the signature that has the same name as the file that you downloaded. 92 00:06:52,000 --> 00:06:58,000 That's why it's very important to make sure when you're downloading Tor is to download the right signature 93 00:06:58,000 --> 00:07:01,000 file for the right file that you downloaded. 94 00:07:02,000 --> 00:07:07,000 So going back to Cleopatra, we're simply going to select the application, the Tor Installer. 95 00:07:07,000 --> 00:07:12,000 We're going to click on Open and give it some time to verify it for us. 96 00:07:14,000 --> 00:07:15,000 And perfect. 97 00:07:15,000 --> 00:07:22,000 As you can see, it's telling us that it's verified the third browser installer with the signature file. 98 00:07:22,000 --> 00:07:28,000 Now you could ignore this part that says the data could not be verified because it's only referring 99 00:07:28,000 --> 00:07:31,000 to the fact that the key is not trusted by us. 100 00:07:31,000 --> 00:07:35,000 So I can simply right click the key and trust it to get rid of this message. 101 00:07:35,000 --> 00:07:41,000 But the main thing that we're looking for is it's saying that the signature is matching the file and 102 00:07:41,000 --> 00:07:43,000 we know that the key is the key of the developers. 103 00:07:43,000 --> 00:07:46,000 And we downloaded it from the official website. 104 00:07:46,000 --> 00:07:52,000 And if we click on Show Audit Log, you will see that it's telling us that it is a good signature from 105 00:07:52,000 --> 00:07:56,000 Tor browser developers and we have their email right here. 106 00:07:56,000 --> 00:08:04,000 So this basically means that the file that we have right here, the installer did not get modified since 107 00:08:04,000 --> 00:08:09,000 the owner of this key created this file and created its signature. 108 00:08:10,000 --> 00:08:12,000 Now, like I said, this step is optional. 109 00:08:12,000 --> 00:08:18,000 You could have simply double click this file and install Tor, but now we know that it was not modified 110 00:08:18,000 --> 00:08:24,000 and we know that we can use it with confidence that it will work exactly the same way that the developers 111 00:08:24,000 --> 00:08:26,000 intended it to work. 112 00:08:26,000 --> 00:08:30,000 So as long as we trust the developers, we should trust this program. 113 00:08:30,000 --> 00:08:33,000 So we're going to double click it now to install and install. 114 00:08:33,000 --> 00:08:35,000 And it is very, very simple. 115 00:08:35,000 --> 00:08:40,000 We're simply going to click on okay for the language and we're just going to click on install to install 116 00:08:40,000 --> 00:08:40,000 it. 117 00:08:42,000 --> 00:08:44,000 And now the installation is complete. 118 00:08:44,000 --> 00:08:46,000 I'm going to antique run the Tor browser for now. 119 00:08:46,000 --> 00:08:51,000 We will talk about it in details on how to use it and its features in the next lectures. 120 00:08:51,000 --> 00:08:56,000 And we're just going to keep this ticked so that it's added to our start menu and desktop. 121 00:08:57,000 --> 00:09:03,000 We're going to click on Finish and now we have a verified version of the Tor browser installed on our 122 00:09:03,000 --> 00:09:04,000 Windows computer. 123 00:09:04,000 --> 00:09:10,000 As I mentioned, if you want to install it on Linux or Mac OS, then check out the next lectures.