1 00:00:00,000 --> 00:00:06,000 In the previous lecture, we learned what the Tor network is, how it works, and how it's supposed 2 00:00:06,000 --> 00:00:09,000 to protect our privacy and anonymity. 3 00:00:10,000 --> 00:00:15,000 We also learned how to connect to this network using the Tor browser. 4 00:00:15,000 --> 00:00:21,000 So we learned how to properly install it and configure it and then use it to connect to the network 5 00:00:21,000 --> 00:00:29,000 so that we can access websites privately and even access to our hidden services or online services or 6 00:00:29,000 --> 00:00:33,000 what most people refer to as the Darknet. 7 00:00:33,000 --> 00:00:39,000 Now, this is a very easy and simple method and it's great if you just want to access a website quickly, 8 00:00:39,000 --> 00:00:44,000 privately, or if you just want to have a quick look over the darknet. 9 00:00:44,000 --> 00:00:46,000 But it's not the best method. 10 00:00:47,000 --> 00:00:55,000 The reason for this is because we installed the Tor browser in a normal operating system such as Windows, 11 00:00:55,000 --> 00:00:56,000 Linux or OS X. 12 00:00:57,000 --> 00:01:05,000 These operating systems regularly collect data about the user, about you to improve user experience 13 00:01:05,000 --> 00:01:07,000 and who knows, maybe for other reasons. 14 00:01:08,000 --> 00:01:16,000 Not only that, but most of these operating systems have other programs installed on them which also 15 00:01:16,000 --> 00:01:22,000 collect data about you again to improve user experience and maybe for other reasons. 16 00:01:22,000 --> 00:01:29,000 Now, all of this collected data can be used to anonymize you and profile you. 17 00:01:29,000 --> 00:01:36,000 Not only that, but all of these programs, all of the programs outside the Tor browser itself access 18 00:01:36,000 --> 00:01:38,000 the Internet directly. 19 00:01:38,000 --> 00:01:40,000 They do not use the Tor network. 20 00:01:40,000 --> 00:01:44,000 The only program that is using the Tor network is the Tor browser. 21 00:01:44,000 --> 00:01:52,000 Therefore, when these programs leak information about you, they are leaking also your proper exact 22 00:01:52,000 --> 00:01:52,000 location. 23 00:01:53,000 --> 00:02:00,000 Not only that, but we also have issues such as DNS leaks, which also would leak information about 24 00:02:00,000 --> 00:02:00,000 you. 25 00:02:00,000 --> 00:02:07,000 And not to mention that all of these programs and operating systems have a history of being vulnerable 26 00:02:07,000 --> 00:02:11,000 to code execution and buffer overflow vulnerabilities. 27 00:02:11,000 --> 00:02:17,000 Now, these vulnerabilities can be used to gain full control over your computer. 28 00:02:17,000 --> 00:02:23,000 And obviously, when someone has control over your computer, knowing where you are or getting information 29 00:02:23,000 --> 00:02:26,000 about you is very, very simple. 30 00:02:27,000 --> 00:02:34,000 Therefore, in this section, I want to show you a much better method to protect our anonymity and privacy. 31 00:02:34,000 --> 00:02:40,000 This method is a little bit more complex and will require a little bit more work and a little bit more 32 00:02:40,000 --> 00:02:41,000 hardware. 33 00:02:41,000 --> 00:02:43,000 But don't worry about it. 34 00:02:43,000 --> 00:02:49,000 I'm going to break it into very simple lectures, and I'm going to walk you through the steps one by 35 00:02:49,000 --> 00:02:55,000 one, and you're going to learn exactly how it's going to work and why it's so much better than just 36 00:02:55,000 --> 00:02:59,000 installing the Tor browser on a normal operating system.