1 00:00:00,000 --> 00:00:06,000 Previously we learned how to install and use the Tor browser, and in the previous lecture I showed 2 00:00:06,000 --> 00:00:08,000 you how to use it with tails. 3 00:00:08,000 --> 00:00:14,000 Now this will be the browser that will use most of the time to protect our anonymity and privacy and 4 00:00:14,000 --> 00:00:18,000 to access the hidden services or the darknet websites. 5 00:00:18,000 --> 00:00:25,000 In this lecture, though, I want to show you another browser that comes with tails, which is the insecure 6 00:00:25,000 --> 00:00:26,000 or unsafe browser. 7 00:00:28,000 --> 00:00:32,000 Now you might think, why would I want to use an insecure or unsafe browser? 8 00:00:33,000 --> 00:00:40,000 See, as we mentioned before, unlike installing the Tor browser on other operating systems such as 9 00:00:40,000 --> 00:00:47,000 Windows, OSX or Linux, where only traffic going through the Tor browser will go through the Tor network, 10 00:00:47,000 --> 00:00:56,000 and all other traffic will literally go directly to the Internet until all traffic is forced to go through 11 00:00:56,000 --> 00:00:57,000 the Tor network. 12 00:00:57,000 --> 00:01:04,000 So regardless of what application generates this traffic, even if it's a system update, even if it's 13 00:01:04,000 --> 00:01:12,000 some malware that got downloaded and got executed on your system, it will always be forced to go through 14 00:01:12,000 --> 00:01:13,000 the Tor network. 15 00:01:13,000 --> 00:01:16,000 Now, like we said, this is great because it prevents leaks. 16 00:01:17,000 --> 00:01:23,000 It improves our security and anonymity because no other programs can access the Internet directly. 17 00:01:23,000 --> 00:01:27,000 Therefore, all of our connections are always going through the Tor network. 18 00:01:28,000 --> 00:01:32,000 So this is really, really good and an amazing feature of Thales. 19 00:01:33,000 --> 00:01:41,000 The only problem is sometimes you actually need to access the Internet directly, or you need a browser 20 00:01:41,000 --> 00:01:43,000 that will not use the Tor network. 21 00:01:43,000 --> 00:01:50,000 For example, if you are trying to connect to a captive portal, what I mean by a captive portal is 22 00:01:50,000 --> 00:01:56,000 a network similar to the networks you see in airports, universities or coffee shops where once you 23 00:01:56,000 --> 00:02:00,000 connect, you have to log in or you have to authenticate. 24 00:02:00,000 --> 00:02:04,000 Now, usually the authentication is done using a web browser. 25 00:02:04,000 --> 00:02:10,000 Any web browser will work, but the Tor browser will not work because as we know, Tor browser will 26 00:02:10,000 --> 00:02:12,000 drive traffic through the Tor network. 27 00:02:12,000 --> 00:02:14,000 And therefore you want. 28 00:02:15,000 --> 00:02:18,000 Be able to authenticate with the local network. 29 00:02:19,000 --> 00:02:25,000 Now, if you were running the Tor browser from a normal operating system like Linux, Windows or Ice 30 00:02:25,000 --> 00:02:27,000 X, the solution to this is easy. 31 00:02:27,000 --> 00:02:33,000 You just go to one of your other browsers and like I said, these will be accessing the Internet directly. 32 00:02:33,000 --> 00:02:34,000 So that will be fine. 33 00:02:34,000 --> 00:02:40,000 The problem is, as we mentioned, Intel's everything is forced to go through the Tor network. 34 00:02:40,000 --> 00:02:46,000 So even if you had another web browser, it will be forced to go through the Tor network and therefore 35 00:02:46,000 --> 00:02:50,000 you still won't be able to authenticate with these networks. 36 00:02:50,000 --> 00:02:57,000 Therefore, for this reason and for any other rare cases where you would actually need to access the 37 00:02:57,000 --> 00:03:01,000 Internet directly tells comes with another web browser. 38 00:03:01,000 --> 00:03:09,000 It's actually called the unsafe browser because this is the only application on the operating system 39 00:03:09,000 --> 00:03:15,000 that can make direct connection to the Internet outside of the Tor network. 40 00:03:16,000 --> 00:03:21,000 So you want to be very, very careful when you're using this and you want to make sure that you know 41 00:03:21,000 --> 00:03:25,000 what you're doing because it is not using the terror network. 42 00:03:25,000 --> 00:03:31,000 It's going to be accessing the Internet directly, revealing your location, your IP and so on. 43 00:03:32,000 --> 00:03:35,000 So right here, I'm back at tails. 44 00:03:35,000 --> 00:03:40,000 And if I go to my wi fi networks and look for a wi fi network. 45 00:03:41,000 --> 00:03:45,000 You can see that there is a Starbucks wi fi around me. 46 00:03:45,000 --> 00:03:51,000 So this is a coffee shop network and this is an example of a network that uses a captive portal. 47 00:03:51,000 --> 00:03:58,000 Like I said, these networks are commonly used in coffee shops, colleges, hotels or airports. 48 00:03:58,000 --> 00:04:00,000 So it's all the same scenario. 49 00:04:00,000 --> 00:04:04,000 Once you connect, so I'm going to click on it and connect. 50 00:04:04,000 --> 00:04:11,000 You'll see that I will be able to connect to the network, but I won't have Internet access. 51 00:04:12,000 --> 00:04:16,000 So if I go up here, you can see that I am connected to the network. 52 00:04:16,000 --> 00:04:21,000 But as you can see, the tour icon right here still has an X beside it. 53 00:04:21,000 --> 00:04:24,000 So I'm not able to connect to the Tor network. 54 00:04:24,000 --> 00:04:31,000 And even if I go and run my Tor browser, as you can see, it's telling me that the Tor network is not 55 00:04:31,000 --> 00:04:36,000 ready yet, so the browser will probably not be able to access the internet. 56 00:04:36,000 --> 00:04:39,000 And even if you wait for this, it's not going to connect. 57 00:04:39,000 --> 00:04:42,000 So I'm going to click on Start anyway. 58 00:04:46,000 --> 00:04:48,000 And as you can see, nothing will load. 59 00:04:48,000 --> 00:04:50,000 We'll be stuck at the welcome page. 60 00:04:50,000 --> 00:04:56,000 And even if you try to go to any website, it's not going to load because the captive portal needs you 61 00:04:56,000 --> 00:04:58,000 to first authenticate with it. 62 00:04:58,000 --> 00:05:06,000 So this network is configured in a way that the users have to authenticate using a web interface first. 63 00:05:06,000 --> 00:05:13,000 See, usually on normal operating systems, when you launch your browser, you'll see the authentication 64 00:05:13,000 --> 00:05:16,000 web interface, the authentication page by default. 65 00:05:17,000 --> 00:05:25,000 But because Thales is configured so that it routes all traffic through the Tor network, the web interface 66 00:05:25,000 --> 00:05:29,000 or the authentication page is inaccessible to us. 67 00:05:29,000 --> 00:05:36,000 Therefore, the only way around this is to go ahead and use the insecure browser which accesses the 68 00:05:36,000 --> 00:05:37,000 internet directly. 69 00:05:38,000 --> 00:05:39,000 To do this. 70 00:05:39,000 --> 00:05:41,000 We're going to go to applications. 71 00:05:42,000 --> 00:05:43,000 Internet. 72 00:05:44,000 --> 00:05:47,000 And we're going to click on the unsafe browser. 73 00:05:47,000 --> 00:05:51,000 It's going to show us a warning telling us that this will access the Internet directly. 74 00:05:51,000 --> 00:05:54,000 You will not be anonymous, so be careful. 75 00:05:54,000 --> 00:05:56,000 I've explained all this to you. 76 00:05:56,000 --> 00:05:57,000 So we're going to click on launch. 77 00:05:59,000 --> 00:06:05,000 And as you can see, we get another Web browser with a big warning again about the implications of using 78 00:06:05,000 --> 00:06:09,000 this browser, but we know what we're doing, so that's fine. 79 00:06:09,000 --> 00:06:16,000 And now you can use this browser similar to the way that you use any web browser on any other operating 80 00:06:16,000 --> 00:06:19,000 system that does not force traffic through the Tor network. 81 00:06:20,000 --> 00:06:25,000 So you probably already connected to such networks in hotels or airports. 82 00:06:25,000 --> 00:06:30,000 Once you connect to it, you open your web browser and you can go to a new website you want. 83 00:06:30,000 --> 00:06:33,000 For example, I'm going to go to DuckDuckGo dot com. 84 00:06:37,000 --> 00:06:43,000 And as you can see, the website that I want will not load, but I will get the page for the captive 85 00:06:43,000 --> 00:06:44,000 portal. 86 00:06:44,000 --> 00:06:47,000 Now some captive portals will ask you for a name and email. 87 00:06:47,000 --> 00:06:49,000 They might ask for your phone number. 88 00:06:49,000 --> 00:06:52,000 You can fill this with any information you want. 89 00:06:52,000 --> 00:06:57,000 You don't have to give valid information, and once you do this, you can click on Connect. 90 00:06:57,000 --> 00:07:00,000 In my case, I can just connect without filling any information. 91 00:07:00,000 --> 00:07:04,000 And as you can see, I'll get redirected to the Starbucks website. 92 00:07:04,000 --> 00:07:09,000 So I get authenticated with the network, with the captive portal now. 93 00:07:09,000 --> 00:07:15,000 So now tables should be able to establish a connection with the Tor network and the Tor browser should 94 00:07:15,000 --> 00:07:16,000 work for us as well. 95 00:07:18,000 --> 00:07:19,000 And perfect. 96 00:07:19,000 --> 00:07:23,000 As you can see, we get a notification telling us now we can access the Internet. 97 00:07:23,000 --> 00:07:24,000 On the top, right. 98 00:07:24,000 --> 00:07:25,000 The X has disappeared. 99 00:07:26,000 --> 00:07:33,000 So if I go to check the Tor project dot org, as you can see, we get a nice message telling us that 100 00:07:33,000 --> 00:07:36,000 we are connected properly to the Tor network. 101 00:07:36,000 --> 00:07:40,000 Our IP is changed and everything is working as expected. 102 00:07:40,000 --> 00:07:43,000 So now we don't need the unsafe browser anymore. 103 00:07:43,000 --> 00:07:49,000 We can close it because we have authenticated with the target network properly and the network is going 104 00:07:49,000 --> 00:07:51,000 to allow us to access the internet. 105 00:07:51,000 --> 00:07:57,000 And then Thales is going to force all traffic through the Tor network, which is exactly what we want, 106 00:07:57,000 --> 00:08:00,000 which will improve our privacy and anonymity.