1 00:00:00,000 --> 00:00:05,000 Now that we're getting more comfortable with navigating the darknet, we know how to access websites, 2 00:00:05,000 --> 00:00:08,000 how to search for data and search for websites. 3 00:00:08,000 --> 00:00:12,000 The next thing that you might need is an email account. 4 00:00:13,000 --> 00:00:19,000 Now, similar to search engines, you can actually use email accounts with clear net providers such 5 00:00:19,000 --> 00:00:21,000 as Google and Yahoo! 6 00:00:21,000 --> 00:00:26,000 Because as we know, we can actually load these websites through the Tor browser. 7 00:00:26,000 --> 00:00:29,000 So let me show you a quick look right here. 8 00:00:29,000 --> 00:00:32,000 I have the signup page for Gmail in my Tor browser. 9 00:00:32,000 --> 00:00:37,000 And as you can see, you're asked for a number of things such as your first name, your last name, 10 00:00:37,000 --> 00:00:40,000 the email that you want when you click on next. 11 00:00:40,000 --> 00:00:45,000 It will probably ask you for more personal information, such as your phone number and your address, 12 00:00:45,000 --> 00:00:48,000 and then it will sign you up with an email. 13 00:00:49,000 --> 00:00:49,000 Same. 14 00:00:49,000 --> 00:00:50,000 We have Yahoo! 15 00:00:50,000 --> 00:00:52,000 Here just as another example. 16 00:00:52,000 --> 00:00:57,000 Again, as you can see, it asks you for a number of personal information and then when you fill this 17 00:00:57,000 --> 00:01:04,000 up, you will get an email which you can use from Tor browser on darknet websites or in the darknet 18 00:01:04,000 --> 00:01:05,000 really in general. 19 00:01:06,000 --> 00:01:13,000 Now, first of all, we have a big problem where these mail providers are asking us for personal information, 20 00:01:13,000 --> 00:01:18,000 for our name, for our address, for our phone number, and so on date of birth. 21 00:01:18,000 --> 00:01:23,000 So these might be things that you don't really want to share with these mail providers. 22 00:01:23,000 --> 00:01:28,000 Now, to get around this, I want to show you a good website, which you can use in many cases. 23 00:01:28,000 --> 00:01:35,000 I'm going to include its link in the resources of this lecture, but as usual with with any other Darknet 24 00:01:35,000 --> 00:01:41,000 website, if the link I gave you doesn't work, look for the website name because the links can change. 25 00:01:42,000 --> 00:01:47,000 Now, basically what this website will do, it will create a fake identity for you. 26 00:01:47,000 --> 00:01:54,000 So it will give you a gender, a name, a second name, age, address, phone number, email. 27 00:01:54,000 --> 00:01:59,000 You can change this with your email once you actually change it, and it will basically give you detailed 28 00:01:59,000 --> 00:02:04,000 information about a specific person and what you should do. 29 00:02:04,000 --> 00:02:11,000 You should always use this information whenever you signing for any service on the darknet. 30 00:02:11,000 --> 00:02:12,000 So this will be your identity. 31 00:02:12,000 --> 00:02:18,000 You forget about who you are as soon as you start details, and from there on, you'll become the person 32 00:02:18,000 --> 00:02:20,000 that you're getting from here. 33 00:02:21,000 --> 00:02:27,000 Now, an even better solution to this is to take this information and even modify it yourself manually 34 00:02:27,000 --> 00:02:31,000 so that you don't forget the information in here. 35 00:02:31,000 --> 00:02:35,000 So maybe you can modify the first name, the second name, you can modify the email. 36 00:02:35,000 --> 00:02:42,000 But the main idea here is you want to create an identity that you will always use when you're on the 37 00:02:42,000 --> 00:02:46,000 darknet and you will never use when you're on the clear net. 38 00:02:46,000 --> 00:02:51,000 This way your fake identity can never be linked to your real identity. 39 00:02:52,000 --> 00:02:58,000 This is also better than you using different identities every time you sign up to a different service, 40 00:02:58,000 --> 00:03:03,000 because this way you'll be more consistent, and this way you'll always be filling the same data. 41 00:03:03,000 --> 00:03:06,000 But this data will be fake, so it's fine. 42 00:03:06,000 --> 00:03:08,000 It's not going to link to you. 43 00:03:08,000 --> 00:03:14,000 Now, you can use this information here, like I said, to sign up to one of these email services, 44 00:03:14,000 --> 00:03:19,000 and then you can use this email for whatever reason you want when you're communicating with friends 45 00:03:19,000 --> 00:03:24,000 or if you are signing up for other Darknet websites that require you to have an email address. 46 00:03:25,000 --> 00:03:31,000 So this could be an easy solution, but there are still a number of drawbacks to it. 47 00:03:31,000 --> 00:03:35,000 First, when you're accessing the service, you're exiting the Tor network. 48 00:03:35,000 --> 00:03:40,000 Because like we said, when you want to go to a clear net website, you're going to first go through 49 00:03:40,000 --> 00:03:45,000 the Tor network and then you're going to exit out of it to the service that you're trying to access. 50 00:03:46,000 --> 00:03:49,000 Now, this exit will be unencrypted, like I said. 51 00:03:49,000 --> 00:03:54,000 So anyone who intercepts this data might be able to read it and analyze it. 52 00:03:54,000 --> 00:04:02,000 Not only that, but these email providers are known for logging you and tracking everything you do on 53 00:04:02,000 --> 00:04:02,000 their servers. 54 00:04:02,000 --> 00:04:08,000 So whatever you type, whatever you send, whatever you receive, Gmail probably going to keep logs 55 00:04:08,000 --> 00:04:13,000 on every single thing you do now, even though you're using fake information. 56 00:04:13,000 --> 00:04:17,000 And even though I'm going to show you how to encrypt your messages in the future, this could still 57 00:04:17,000 --> 00:04:22,000 be a risk because like I said, they're going to be analyzing and tracking every single movement you 58 00:04:22,000 --> 00:04:22,000 do. 59 00:04:23,000 --> 00:04:24,000 So you can do this. 60 00:04:24,000 --> 00:04:26,000 Like I said, use it with a fake identity. 61 00:04:26,000 --> 00:04:31,000 Keep this fake identity completely separate from your real identity. 62 00:04:31,000 --> 00:04:35,000 So make sure you never use any of this information on a clear net website. 63 00:04:35,000 --> 00:04:42,000 Make sure you never use any account that's created within this fake identity to communicate with any 64 00:04:42,000 --> 00:04:46,000 of your real accounts or any of your real friends on the clear net. 65 00:04:46,000 --> 00:04:51,000 And this might be a good enough solution for you depending on your situation. 66 00:04:52,000 --> 00:04:58,000 But in the next lectures, I'm going to show you more options if you want a more private and more anonymous 67 00:04:58,000 --> 00:04:59,000 solution. 68 00:04:59,000 --> 00:05:06,000 So when it comes to picking up an email service, it really depends on why do you want this email and 69 00:05:06,000 --> 00:05:07,000 what's your threat model. 70 00:05:08,000 --> 00:05:14,000 So the solution that I showed you here could be perfect for you, but it might not be perfect for another 71 00:05:14,000 --> 00:05:17,000 person, or it could be perfect for you in a certain situation. 72 00:05:17,000 --> 00:05:21,000 But it won't be good for other scenarios or other situations. 73 00:05:21,000 --> 00:05:27,000 Therefore, in the next lectures, I'm going to show you a number of other solutions that you can use 74 00:05:27,000 --> 00:05:31,000 in order to set up an email and communicate with other emails. 75 00:05:31,000 --> 00:05:38,000 And then you can compare them and pick the best one for you based on the reason why you need this email 76 00:05:38,000 --> 00:05:40,000 and based on your threat model.