1 00:00:00,000 --> 00:00:05,000 We've seen so far how great Cuba's is at improving our security. 2 00:00:06,000 --> 00:00:13,000 It improves our security through the different security domains by isolating them inside individual 3 00:00:13,000 --> 00:00:16,000 virtual machines that use their own resources. 4 00:00:16,000 --> 00:00:21,000 We saw how cool the disposable and the vault virtual machines are and more. 5 00:00:21,000 --> 00:00:28,000 All of these features make a really secure operating system and they also improve our user experience 6 00:00:28,000 --> 00:00:33,000 and force the users to use their operating system in a more secure manner. 7 00:00:33,000 --> 00:00:40,000 So that's the security part covered, but we still haven't covered how to become anonymous and how to 8 00:00:40,000 --> 00:00:44,000 improve our privacy while surfing the Internet using cubes. 9 00:00:44,000 --> 00:00:50,000 Because all of the virtual machines that we see in so far access the Internet directly and therefore 10 00:00:50,000 --> 00:00:53,000 are vulnerable to trackers and so on. 11 00:00:53,000 --> 00:01:01,000 Now all of these operating systems use the same networking virtual machine, which is the sixth net 12 00:01:01,000 --> 00:01:02,000 right here. 13 00:01:02,000 --> 00:01:07,000 Like I said, this routes the traffic directly to the Internet and therefore they're not anonymous or 14 00:01:07,000 --> 00:01:08,000 private. 15 00:01:09,000 --> 00:01:15,000 However, Cubes also offer another networking service, which is the Cisco Unix. 16 00:01:15,000 --> 00:01:21,000 This is a networking service that forces the traffic to go through the Tor network. 17 00:01:22,000 --> 00:01:29,000 Therefore, when a machine is configured to use this Unix as the gateway, this machine is traffic will 18 00:01:29,000 --> 00:01:35,000 be forced to go through the Tor network, therefore improving our privacy and anonymity. 19 00:01:36,000 --> 00:01:40,000 Now, by default, we have a domain called anon Unix. 20 00:01:40,000 --> 00:01:42,000 This is something that I haven't covered so far. 21 00:01:42,000 --> 00:01:48,000 And as usual, because this is a domain, this means that this is a virtual machine designed for us 22 00:01:48,000 --> 00:01:52,000 to use to carry out day to day tasks, to carry out normal tasks. 23 00:01:52,000 --> 00:02:01,000 And this virtual machine is a template of the UNIX workstation right here, and it's configured to use 24 00:02:01,000 --> 00:02:03,000 the CIS Unix as its gateway. 25 00:02:03,000 --> 00:02:11,000 Therefore, all of the traffic going out of the anon who next virtual machine will be forced to go through 26 00:02:11,000 --> 00:02:12,000 the Tor network? 27 00:02:13,000 --> 00:02:15,000 Let me show you real quick before we run this machine. 28 00:02:15,000 --> 00:02:23,000 So I'm going to go to my cubes manager and in here you'll notice that we have the EIN on UNIX right 29 00:02:23,000 --> 00:02:23,000 here. 30 00:02:23,000 --> 00:02:29,000 This is the virtual machine that we can use for our day to day use because it is a domain. 31 00:02:29,000 --> 00:02:37,000 And if you look under the net VM right here, you'll see that it is configured to use this UNIX as its 32 00:02:37,000 --> 00:02:43,000 network virtual machine, which means that all of the traffic in this virtual machine will be forced 33 00:02:43,000 --> 00:02:48,000 to go to this Unix, which will force that traffic to go through the Tor network. 34 00:02:48,000 --> 00:02:54,000 Now, if you look at all of the other virtual machines, you'll see that they're configured to use this 35 00:02:54,000 --> 00:02:57,000 firewall, for example, the work right here. 36 00:02:57,000 --> 00:03:03,000 You'll see that it is configured to use the CIS firewall as its networking virtual machine. 37 00:03:03,000 --> 00:03:09,000 And if we follow this, we have this firewall right here, you'll see this will redirect the traffic 38 00:03:09,000 --> 00:03:10,000 to the Internet. 39 00:03:10,000 --> 00:03:17,000 So any traffic in my work domain and all of the other virtual machines will go to the CIS firewall and 40 00:03:17,000 --> 00:03:19,000 then to this net and to the Internet. 41 00:03:19,000 --> 00:03:23,000 Therefore, it is not anonymous and it's not private. 42 00:03:24,000 --> 00:03:27,000 So let's go ahead and use this virtual machine. 43 00:03:27,000 --> 00:03:33,000 So we're just going to go again, as usual, to the virtual machine we want to start, which is a non 44 00:03:33,000 --> 00:03:39,000 Unix and you can see a list of all of the programs that you can run inside this virtual machine. 45 00:03:39,000 --> 00:03:46,000 First one is an IRC chat client that you can use to communicate over I.R.S. if you want. 46 00:03:46,000 --> 00:03:51,000 You got your settings, you get your file manager, you have the Tor browser, which we've been using 47 00:03:51,000 --> 00:03:53,000 inside different operating systems. 48 00:03:53,000 --> 00:03:55,000 So using it in here is identical. 49 00:03:56,000 --> 00:04:01,000 You have a wizard that will allow you to download an update tor using. 50 00:04:01,000 --> 00:04:02,000 This is very simple. 51 00:04:02,000 --> 00:04:04,000 You can just click it to run it. 52 00:04:04,000 --> 00:04:09,000 It will check what's the latest version and if there is a new version, you can install it from here. 53 00:04:09,000 --> 00:04:16,000 You can run the index check right here to check the whole Unix operating system, the whole Unix virtual 54 00:04:16,000 --> 00:04:21,000 machine, make sure that it's up to date, make sure that it is configured and it's running as expected. 55 00:04:21,000 --> 00:04:24,000 This actually runs the first time you run tails. 56 00:04:24,000 --> 00:04:29,000 If you remember when we got the Unix wizard, then we went through it in the first basic lecture of 57 00:04:29,000 --> 00:04:30,000 the section. 58 00:04:30,000 --> 00:04:32,000 So there is no need to run this again. 59 00:04:32,000 --> 00:04:38,000 And you also have your terminal where you can execute commands inside this virtual machine. 60 00:04:39,000 --> 00:04:42,000 So right now, let's just go ahead and run the Tor browser. 61 00:04:42,000 --> 00:04:48,000 Obviously, as usual, this will start the next virtual machine first and then as soon as it starts, 62 00:04:48,000 --> 00:04:51,000 it will launch an instance of the Tor browser. 63 00:04:52,000 --> 00:04:53,000 And perfect. 64 00:04:53,000 --> 00:04:58,000 As you can see, we have the Tor browser running inside the anon next domain. 65 00:04:58,000 --> 00:04:59,000 Notice the color. 66 00:04:59,000 --> 00:05:01,000 It's different than all of the other domains. 67 00:05:01,000 --> 00:05:06,000 Again, this will help you to easily know which domain you're working in or which virtual machine. 68 00:05:07,000 --> 00:05:14,000 And you can navigate to check dotcom or just click on the IP check in here and you'll see that that 69 00:05:14,000 --> 00:05:18,000 this machine is configured to use the Tor browser properly. 70 00:05:18,000 --> 00:05:21,000 So we are accessing the Internet through Tor. 71 00:05:21,000 --> 00:05:26,000 So right now you can go ahead and access Tor hidden services from this browser. 72 00:05:27,000 --> 00:05:31,000 It can also change its settings in here from the same places that you're used to. 73 00:05:31,000 --> 00:05:34,000 So this is the exact same browser that we're using. 74 00:05:34,000 --> 00:05:40,000 The only difference is right now it's running through its own isolated virtual machine. 75 00:05:40,000 --> 00:05:46,000 And as usual, if this virtual machine gets compromised or hacked in any way, it is completely isolated. 76 00:05:46,000 --> 00:05:53,000 So it is very difficult and highly unlikely that the hacker will be able to exit this and compromise 77 00:05:53,000 --> 00:05:55,000 other virtual machines. 78 00:05:55,000 --> 00:06:02,000 Now, just to confirm, I already have a web browser here running in my work domain, and let's just 79 00:06:02,000 --> 00:06:05,000 go to Google and check what's my IP. 80 00:06:06,000 --> 00:06:13,000 You'll see that my IP, my actual real IP in here is completely different than the IP that we see in 81 00:06:13,000 --> 00:06:15,000 here inside the Tor browser. 82 00:06:15,000 --> 00:06:20,000 Because inside the Unix virtual machine, like I said, everything is being forced to go through the 83 00:06:20,000 --> 00:06:27,000 Tor network, whereas my work virtual machine, if we look at the Cube's VM in here, the work virtual 84 00:06:27,000 --> 00:06:33,000 machine is using the CIS firewall as its virtual machine, which forwards data directly to this net 85 00:06:33,000 --> 00:06:36,000 and therefore goes directly to the internet. 86 00:06:38,000 --> 00:06:44,000 Now another really cool virtual machine that we have in here is the disposable who next workstation. 87 00:06:44,000 --> 00:06:50,000 So we already covered the normal disposable virtual machine and we saw how this can be very useful to 88 00:06:50,000 --> 00:06:55,000 run untrusted applications, untrusted files or open untrusted websites. 89 00:06:55,000 --> 00:07:01,000 Because like we said, every time you start a disposable virtual machine, cubes create a completely 90 00:07:01,000 --> 00:07:02,000 new virtual machine. 91 00:07:02,000 --> 00:07:07,000 And then when you stop it, this virtual machine is completely destroyed. 92 00:07:07,000 --> 00:07:12,000 Therefore, even if it contained any malware, this malware will be destroyed along with the actual 93 00:07:12,000 --> 00:07:13,000 virtual machine. 94 00:07:13,000 --> 00:07:20,000 And because this is a completely isolated virtual machine, it is very difficult to compromise the other 95 00:07:20,000 --> 00:07:20,000 machines. 96 00:07:21,000 --> 00:07:25,000 So right here we have another disposable virtual machine. 97 00:07:25,000 --> 00:07:31,000 The only difference between the Unix and the fedora one, the Unix one, as the name suggests, will 98 00:07:31,000 --> 00:07:36,000 force all of the traffic to go through the gateway, which forces all the traffic to go through the 99 00:07:36,000 --> 00:07:37,000 Tor network. 100 00:07:37,000 --> 00:07:44,000 So you can think of this like a disposable virtual machine that will force all the traffic through the 101 00:07:44,000 --> 00:07:44,000 Tor network. 102 00:07:44,000 --> 00:07:49,000 So you can use this virtual machine to run any untrusted darknet links. 103 00:07:49,000 --> 00:07:52,000 And there are a lot of untrusted darknet links. 104 00:07:52,000 --> 00:07:54,000 So this is very, very useful. 105 00:07:54,000 --> 00:08:00,000 And you can also use it to run any untrusted files that you get through the darknet. 106 00:08:00,000 --> 00:08:05,000 Now, usually you shouldn't trust any files you get even on the clear net, but if you are receiving 107 00:08:05,000 --> 00:08:10,000 files or if you want to open files that you download from the darknet, then you should definitely run 108 00:08:10,000 --> 00:08:13,000 it inside a disposable virtual machine. 109 00:08:13,000 --> 00:08:16,000 Now using this is similar to any other virtual machine. 110 00:08:16,000 --> 00:08:18,000 You can run the application that you want from here. 111 00:08:18,000 --> 00:08:24,000 And because it is disposable, like I said, when you click on an application, a virtual machine will 112 00:08:24,000 --> 00:08:27,000 be created specifically to run this application only. 113 00:08:27,000 --> 00:08:32,000 And when you close the application, the whole virtual machine will be destroyed. 114 00:08:33,000 --> 00:08:39,000 Now with these two virtual machines and with the way cubes is structured, you can do so much more. 115 00:08:39,000 --> 00:08:46,000 You can actually create a different virtual machine for every identity that you want to use on the darknet. 116 00:08:46,000 --> 00:08:52,000 So for example, you can have a number of domains similar to the way we have work and personal and untrusted 117 00:08:52,000 --> 00:08:54,000 here that all go through the clear net. 118 00:08:54,000 --> 00:08:59,000 You can have a number of virtual machines that force their traffic through the index gateway through 119 00:08:59,000 --> 00:09:05,000 Tor and use each one of them for every identity you use on the darknet. 120 00:09:05,000 --> 00:09:07,000 Or, for example, use one of them for chat. 121 00:09:07,000 --> 00:09:13,000 Use one of them to only include your crypto wallets and use the other for surfing the Internet or for 122 00:09:13,000 --> 00:09:14,000 surfing the darknet. 123 00:09:14,000 --> 00:09:17,000 So you can really structure this any way you want. 124 00:09:17,000 --> 00:09:20,000 And doing that is very, very simple. 125 00:09:20,000 --> 00:09:21,000 Let me show you. 126 00:09:21,000 --> 00:09:27,000 So, again, you need to go back to your cubes manager and all you have to do is right click the machine 127 00:09:27,000 --> 00:09:30,000 that you want to clone or create a copy of. 128 00:09:30,000 --> 00:09:36,000 And in this case, let's say you want to make a copy of our and on UNIX because this is the virtual 129 00:09:36,000 --> 00:09:40,000 machine that forces traffic through the Tor network. 130 00:09:40,000 --> 00:09:45,000 And all you have to do is right click it and click on Clone Cube. 131 00:09:45,000 --> 00:09:52,000 This will create a new virtual machine that is identical to an on Unix and then you can use this for 132 00:09:52,000 --> 00:09:54,000 any other reason you want. 133 00:09:54,000 --> 00:10:00,000 So this is really, really cool and can be tailored to fit so many scenarios and so many uses.