1 00:00:00,960 --> 00:00:03,730 Now, what is taught and how it works? 2 00:00:05,010 --> 00:00:11,160 Now, what is taught now that the Inter can refer to several different components, now there is a program 3 00:00:11,250 --> 00:00:16,360 that you can run on your computer that helps you or helps keep you safe on the Internet. 4 00:00:16,530 --> 00:00:24,120 It protects you by bouncing your communications around a distributed network of relays run by volunteers 5 00:00:24,120 --> 00:00:25,030 all around the world. 6 00:00:25,830 --> 00:00:32,340 It prevents somebody watching your Internet connection from learning what sites you visit. 7 00:00:32,700 --> 00:00:39,440 OK, so actually this set of volunteer relays is called the tornado. 8 00:00:39,480 --> 00:00:46,890 The way most people use Tor is with Tor browser, which is a version of Firefox that fixes many privacy 9 00:00:46,890 --> 00:00:47,320 issues. 10 00:00:47,790 --> 00:00:54,300 Now, the whole project is a nonprofit or charity organization that maintains and develops the tool 11 00:00:54,330 --> 00:00:55,220 for software. 12 00:00:55,680 --> 00:01:03,330 It has received funds from the U.S. government primarily, and additional aid from Swedish government 13 00:01:03,330 --> 00:01:07,740 and different NGOs and individual sponsors right now. 14 00:01:07,740 --> 00:01:08,730 Who created the TOR? 15 00:01:09,610 --> 00:01:15,550 Now, actually, torus is the principle of onion routing, which was developed by Paul Severe son, 16 00:01:16,180 --> 00:01:18,680 Michael Green and David Skalak. 17 00:01:18,790 --> 00:01:22,210 Now, I'm sorry, maybe I missed pronounce the names. 18 00:01:22,450 --> 00:01:24,490 So again, I'm so sorry about this. 19 00:01:24,970 --> 00:01:32,350 At the United States, they created that or developed that at the United States Naval Research Laboratory 20 00:01:32,350 --> 00:01:33,700 in 1990s. 21 00:01:34,180 --> 00:01:36,970 Now, again, you may say now this is a boring stuff. 22 00:01:36,970 --> 00:01:37,420 Please. 23 00:01:37,450 --> 00:01:43,630 I know this is somehow boring, but please follow me for now, because when the real tech start, it's 24 00:01:43,630 --> 00:01:52,030 very important to have a history, of course, now because somebody may say, oh, yeah, they have 25 00:01:52,030 --> 00:01:56,970 a connection with the NSA and they are spying on us. 26 00:01:57,280 --> 00:01:59,900 Now, this this may sound true now. 27 00:01:59,920 --> 00:02:02,130 Maybe this is true or this is false. 28 00:02:02,140 --> 00:02:09,340 And I'm not sure, actually, but I want for you to know all of the history and every detail about it. 29 00:02:09,380 --> 00:02:15,430 No further development was carried out and the financial rule of the Electronic Frontier Foundation, 30 00:02:15,790 --> 00:02:16,390 the effort. 31 00:02:16,810 --> 00:02:19,810 OK, no, here is the most important part. 32 00:02:19,810 --> 00:02:25,090 Actually, I know this this that was a very boring part, a history of Tor project. 33 00:02:25,300 --> 00:02:26,860 But this is the most important part. 34 00:02:26,860 --> 00:02:30,850 And this is required to focus here to understand what Eliot did. 35 00:02:31,510 --> 00:02:37,990 OK, now Tor uses the concept of the uninvolved method in which the use of data is encrypted and then 36 00:02:37,990 --> 00:02:41,370 transferred through different layers present in the tornado. 37 00:02:41,800 --> 00:02:44,170 OK, now here is the first step. 38 00:02:44,620 --> 00:02:49,990 Now we actually talk makes it possible for users to hide their location while offering various kind 39 00:02:49,990 --> 00:02:55,270 of services, such as publishing or an instant messaging server. 40 00:02:55,480 --> 00:02:55,960 All right. 41 00:02:56,530 --> 00:03:05,500 So using something called 24 points and other Tor users can connect to this on your services or formerly 42 00:03:05,500 --> 00:03:06,910 known as hidden services. 43 00:03:06,940 --> 00:03:07,360 OK. 44 00:03:07,750 --> 00:03:08,160 All right. 45 00:03:08,590 --> 00:03:12,100 Now here you can see that in the step one book. 46 00:03:12,490 --> 00:03:17,590 Here we have BOPE, we have ELLIS', we have this DB or database server. 47 00:03:17,950 --> 00:03:25,000 We have this, as you can see from the Tor Cloud or the Tower Network, there are a lot of relays or 48 00:03:25,090 --> 00:03:32,230 nodes and these nodes called the IP or introduction points, as you can see, IP, which means introduction 49 00:03:32,230 --> 00:03:32,650 points. 50 00:03:32,980 --> 00:03:40,480 And here the green line here is talk circuit talk circuit, which means that there are a network between 51 00:03:40,480 --> 00:03:42,440 those three for Bob. 52 00:03:42,640 --> 00:03:48,820 OK, and here is the public key and here is the deeper point. 53 00:03:49,000 --> 00:03:50,170 OK, or the Arpey. 54 00:03:50,470 --> 00:03:58,310 OK, now the step one is that book because some introduction point, as you can see, I.B. one, two 55 00:03:58,310 --> 00:04:00,490 or three and build circuits to them. 56 00:04:00,880 --> 00:04:01,300 All right. 57 00:04:01,990 --> 00:04:02,430 All right. 58 00:04:02,800 --> 00:04:08,410 And he will ask them to act as introduction point by telling them it's public key. 59 00:04:08,680 --> 00:04:15,280 OK, but not that in the following figures here, the green links are selected rather than direct connection. 60 00:04:15,430 --> 00:04:23,080 OK, so by using a full Tor circuit, it is hard for anyone to associate and connection point with the 61 00:04:23,080 --> 00:04:24,790 onion servers IP address. 62 00:04:24,820 --> 00:04:27,210 OK, so these are not connected. 63 00:04:27,250 --> 00:04:32,130 These are circuit and BOPE share his public key with them. 64 00:04:32,230 --> 00:04:32,710 All right. 65 00:04:32,980 --> 00:04:33,450 All right. 66 00:04:33,460 --> 00:04:37,000 By the way, I got this from the official website of Tor Project. 67 00:04:37,600 --> 00:04:42,010 If you are interested to read more, I provide you with the link to it. 68 00:04:42,230 --> 00:04:46,510 Please check that external resources here from this lecture. 69 00:04:46,660 --> 00:04:47,380 You can see it. 70 00:04:47,710 --> 00:04:50,480 Just go to it and read more if you want to. 71 00:04:50,530 --> 00:04:55,360 Actually, there are a lot of low level detail of the protocol, if you are interested. 72 00:04:55,490 --> 00:05:01,440 OK, but I will try to make it readable and easy to understand as much as possible. 73 00:05:01,930 --> 00:05:08,230 The step to book advertises his service, which is the X, Y, Z, The Onion at the database. 74 00:05:08,320 --> 00:05:16,450 OK, so actually here book assembles and on your service descriptor, as you can see, this one that 75 00:05:16,460 --> 00:05:18,050 dots square here. 76 00:05:18,250 --> 00:05:25,090 So actually this descriptor containing its public key and summary of each interaction point and sign 77 00:05:25,090 --> 00:05:28,330 this descriptor, which is this one with its private key. 78 00:05:28,360 --> 00:05:33,670 OK, so a book will sign this descriptor, as you can see, that contains the introduction point and 79 00:05:33,670 --> 00:05:34,390 the B.K.. 80 00:05:34,780 --> 00:05:45,210 And after it signs with this this key, this private key, it will go it will be uploaded to that nasty 81 00:05:45,370 --> 00:05:49,570 habit that inside that database or the DB server. 82 00:05:49,630 --> 00:05:57,340 OK, no, in step three here, you can see that Enis here's that X, Y, Z, that Onion exists and she 83 00:05:57,340 --> 00:05:59,420 requests more info from the database. 84 00:05:59,830 --> 00:06:05,530 She also sits up at individual point, though she couldn't have done this before. 85 00:06:05,650 --> 00:06:08,590 OK, so here actually any. 86 00:06:09,290 --> 00:06:17,750 Want to connect or to contact the online service, which is the tour or their stuff, to learn more 87 00:06:17,750 --> 00:06:24,440 about their own interests first, so then I can initiate the connection establishment by downloading 88 00:06:24,440 --> 00:06:26,930 the descriptor from the step by step. 89 00:06:26,990 --> 00:06:37,550 And so it will get that descriptor that uploaded, remember, and the previous about upload this descriptor 90 00:06:37,550 --> 00:06:43,940 that signed by his private key and he uploaded to that DB, by the way, it contains the introduction 91 00:06:43,940 --> 00:06:48,830 point and the public key then unless you retrieve it. 92 00:06:49,130 --> 00:06:54,890 OK, now and it's no the set of introduction points and that right. 93 00:06:54,890 --> 00:06:55,900 Publicly to use. 94 00:06:56,480 --> 00:07:05,210 OK, so around this time that Ellis will create a circuit to another randomly relay and ask it to act 95 00:07:05,210 --> 00:07:09,190 as a rendezvous point by turning it a one time secret. 96 00:07:09,380 --> 00:07:17,810 OK, now in step four actually, and it's the right message to Bob encrypted to be listing the rendezvous 97 00:07:17,870 --> 00:07:22,970 point at a one time secret and asked an introduction point to to both. 98 00:07:23,000 --> 00:07:29,440 So you can see that the descriptor this time, it has the one time secret and it put it on the agenda 99 00:07:29,450 --> 00:07:30,050 for Boyte. 100 00:07:30,930 --> 00:07:38,280 OK, and it will request to be delivered and then I would request it to be delivered to the onea service, 101 00:07:38,580 --> 00:07:39,000 OK? 102 00:07:39,120 --> 00:07:41,830 Now, the only service here in our case is Bob. 103 00:07:42,200 --> 00:07:43,250 OK, no. 104 00:07:43,260 --> 00:07:49,890 In step five, Bob connects to Ellis Randy for point and provides here one time secret. 105 00:07:50,130 --> 00:07:57,000 OK, so Bob will connect to that individual for Ellis and it will provide it with a one time secret. 106 00:07:57,120 --> 00:08:05,070 So Bob will decrypt that and introduce message and it will find the address of that in the void. 107 00:08:05,130 --> 00:08:14,220 OK, so how Bob actually know about that individual point actually got this encrypted key, this encrypted 108 00:08:14,220 --> 00:08:21,600 descriptor and they kept it and it will find the address of the rendezvous point and the one time secret 109 00:08:21,690 --> 00:08:22,140 in it. 110 00:08:22,590 --> 00:08:26,300 So the service creates a circuit to a rendezvous point. 111 00:08:26,310 --> 00:08:30,880 And since the one time secret to it and Aaron Devor message. 112 00:08:31,160 --> 00:08:36,690 OK, now finally, Bob and Alice proceed to use their thoughts circuit like Norman. 113 00:08:36,870 --> 00:08:44,310 So because the rendezvous point notifies that and it's about successful connection established by Bob 114 00:08:44,820 --> 00:08:45,870 then after that. 115 00:08:46,230 --> 00:08:53,850 But Alice and Bob can use their circuits to their rendezvous point and communicating for each other, 116 00:08:54,010 --> 00:08:54,450 OK. 117 00:08:54,870 --> 00:09:01,440 No, actually, the complete connection between Alice and Bob consists of six relays. 118 00:09:01,890 --> 00:09:09,360 Three of them were picked by the client, which is Alice, and three of them were picked by the only 119 00:09:09,360 --> 00:09:12,030 service, which is in our case. 120 00:09:12,060 --> 00:09:12,550 All right. 121 00:09:12,960 --> 00:09:17,260 So actually, it is secure and each time actually it is randomized. 122 00:09:17,580 --> 00:09:22,890 OK, so it creates multilayered encryption like the onion. 123 00:09:23,160 --> 00:09:27,450 And it is hard to photograph to keep the identity of the user safe. 124 00:09:28,370 --> 00:09:32,420 As a result, nobody can link your identity to any single point. 125 00:09:33,150 --> 00:09:40,460 OK, now here is a simple graph, actually, so you can see that we have this Tor client and this is 126 00:09:40,460 --> 00:09:41,160 the destination. 127 00:09:41,450 --> 00:09:45,200 Now, here is the entry card and here is the Tor network. 128 00:09:45,350 --> 00:09:48,360 And inside it we have relays or relays. 129 00:09:48,830 --> 00:09:55,070 Finally, we have Exit Renai and this exit relay, it will give the traffic to the destination. 130 00:09:55,250 --> 00:10:02,450 But you can see that the green is encrypted and the dotted red lines are not encrypted by Tor. 131 00:10:02,570 --> 00:10:11,330 OK, so for this tallit, what the entry guard and the exit really knows, what is tor? 132 00:10:11,780 --> 00:10:17,990 OK, actually the entry guard know the IP of our client, but the exit relay. 133 00:10:18,470 --> 00:10:19,040 No. 134 00:10:19,430 --> 00:10:21,050 Where is the destination. 135 00:10:21,200 --> 00:10:23,950 As you can see this, these are encrypted by Tor. 136 00:10:24,230 --> 00:10:32,030 So the exit relay will understand or know what is the destination but actually will exit relay. 137 00:10:32,120 --> 00:10:32,420 No. 138 00:10:32,420 --> 00:10:33,790 The idea of torture. 139 00:10:33,980 --> 00:10:37,220 No, actually the media really will not know. 140 00:10:37,400 --> 00:10:42,970 The idea of not only the aggregate will know the origin or the IP of the talks. 141 00:10:43,340 --> 00:10:44,730 OK, but exactly. 142 00:10:44,810 --> 00:10:47,130 They will not know whether they will not know. 143 00:10:47,360 --> 00:10:48,140 Another question. 144 00:10:48,320 --> 00:10:51,140 Will the entry guard know the destination? 145 00:10:51,260 --> 00:10:53,060 No, actually, it will not know. 146 00:10:53,970 --> 00:10:56,110 Then literally, no, it will not. 147 00:10:56,130 --> 00:10:57,710 No, but they exist really. 148 00:10:57,750 --> 00:11:03,720 Yeah, it will understand and it will know the destination because this is the entry guard, it will 149 00:11:03,720 --> 00:11:07,610 know the origin or the turbulent I.B. and the exit. 150 00:11:08,190 --> 00:11:12,540 It will not know the IP of the turtling, but it will know the idea of the destination. 151 00:11:12,690 --> 00:11:19,220 And the entry guard will not know the IP of the destination, only the IP of turtled. 152 00:11:19,530 --> 00:11:19,930 OK. 153 00:11:20,280 --> 00:11:26,910 Now I know you may get confused, but again, if you want to read more about Tor, actually you can 154 00:11:27,390 --> 00:11:28,470 check the link. 155 00:11:28,470 --> 00:11:33,930 I provided you to that Option Tor project and you can read more about it if you are interested. 156 00:11:33,990 --> 00:11:41,280 Hear what Elliot did actually is that he know that there are a destination or there are a server running 157 00:11:41,820 --> 00:11:44,230 behind or running on the terror network. 158 00:11:44,250 --> 00:11:49,500 OK, and how we did know that we will discuss that indicates no worries. 159 00:11:49,530 --> 00:11:55,980 OK, so what encryption there is decrypted at each successful tor and the remaining data is forwarded 160 00:11:55,980 --> 00:11:59,260 to any random RENEA until it reached its destination. 161 00:11:59,280 --> 00:12:06,300 So so for the destination server, the last or not or exit relay appears as the origin of the data. 162 00:12:06,650 --> 00:12:07,110 OK. 163 00:12:08,110 --> 00:12:16,510 So it does tough to trace the identity of the user or the server by any civilian system, acting as 164 00:12:16,510 --> 00:12:23,490 the middlemen other than providing anonymity to standalone users can also provide anonymity to you. 165 00:12:23,500 --> 00:12:30,550 Websites and servers in the form of Tor hidden services also appear to be applications like Bit Torrent 166 00:12:30,790 --> 00:12:35,020 can be configured to the Tor network and download torrent files. 167 00:12:35,650 --> 00:12:37,850 No is using Tor in the event. 168 00:12:38,050 --> 00:12:42,880 No, because Tor browser and Dark Web are illegal on their own. 169 00:12:43,060 --> 00:12:49,630 However, if you end up performing some illegal activity obviously on the Dark Web using Tor, that 170 00:12:49,630 --> 00:12:51,340 would surely invite trouble. 171 00:12:52,120 --> 00:12:57,880 So as always, we recommend and by the way, I got this from the official website. 172 00:12:58,330 --> 00:13:04,840 As you can see, we recommend that you use this technology to perform legal actions and enhance your 173 00:13:04,840 --> 00:13:05,890 privacy only. 174 00:13:06,070 --> 00:13:09,910 So, of course, obviously don't use it for bad stuff. 175 00:13:10,090 --> 00:13:17,020 Now, the NSA agent, Edward Snowden, used Tor to leak information about PRISM to The Guardian and 176 00:13:17,020 --> 00:13:18,010 The Washington Post. 177 00:13:18,490 --> 00:13:20,320 However, the story is not all good. 178 00:13:20,320 --> 00:13:26,770 Good, because Tor faces criticism for the reason that it acts as a medium for different illegal activities 179 00:13:26,950 --> 00:13:32,090 like data breaches, drug dealing, gambling, being home to dark websites and so on. 180 00:13:32,530 --> 00:13:40,180 OK, now Tor is also used by criminals minds to communicate over the network or the Internet while keeping 181 00:13:40,180 --> 00:13:44,440 their identity hidden, which makes it difficult for the security agencies to trace them. 182 00:13:45,190 --> 00:13:52,450 The U.S. National Security Agency NSA has called for the king of high, secure, low latency Internet 183 00:13:52,450 --> 00:13:57,970 anonymity, and it has received similar comments by BusinessWeek magazine. 184 00:13:58,540 --> 00:14:04,420 Perhaps the most effective means of defeating the online surveillance effort of intelligence agencies 185 00:14:04,420 --> 00:14:05,080 around the world. 186 00:14:05,440 --> 00:14:12,910 OK, now another speculation made is that Tor takes its funding from the US government, which may lead 187 00:14:12,910 --> 00:14:18,680 to the assumption that NSA may have compromised the identities of individual Tor users. 188 00:14:19,210 --> 00:14:27,300 However, towards former executive director Andrew Luman disclaimed any considerations with NSA. 189 00:14:27,700 --> 00:14:31,050 When I'm not saying to believe that or not, I'm just reading you. 190 00:14:31,060 --> 00:14:34,270 You are the one to judge if this is true or not. 191 00:14:34,540 --> 00:14:42,910 So is to say there are various of claims that have been made about compromising towards anonymity and 192 00:14:42,910 --> 00:14:44,270 security from time to time. 193 00:14:44,740 --> 00:14:50,620 The most famous one was the back of an attack in which the researchers claimed to have identified around 194 00:14:50,980 --> 00:14:58,510 ten thousand IP addresses of active BitTorrent users who were connected to the ATO and the Heartbleed, 195 00:14:58,510 --> 00:15:05,990 but was behind another major compromise in April 2014, which halted the Tor network for several days. 196 00:15:06,460 --> 00:15:14,230 OK, there are traffic fingerprinting methods that used to analyze Web traffic by analyzing the responses 197 00:15:14,230 --> 00:15:16,840 and Becket's in a particular direction. 198 00:15:17,170 --> 00:15:22,720 This technique can be used to attack the terror network by making the attackers computer act as the 199 00:15:22,720 --> 00:15:28,360 guard OK, so that the computer would act as the guard or the trigger. 200 00:15:28,630 --> 00:15:35,770 The entry point that we saw previously, the main vulnerability was found at its exit points where the 201 00:15:35,770 --> 00:15:39,850 level of security is very low as compared to the rest of the Tor network.