All language subtitles for [English (auto-generated)] How to be Invisible Online (and the hard truth about it)... [DownSub.com]

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,000 --> 00:00:01,800 as a matter of fact you know being in 2 00:00:01,800 --> 00:00:04,020 the U.S makes it uh somewhat more 3 00:00:04,020 --> 00:00:07,080 challenging to be too anonymous because 4 00:00:07,080 --> 00:00:10,920 we have the NSA who has uh who has their 5 00:00:10,920 --> 00:00:15,719 fingers into every transaction so all 6 00:00:15,719 --> 00:00:17,699 you NSA people out there who are 7 00:00:17,699 --> 00:00:20,100 watching this video we know we know we 8 00:00:20,100 --> 00:00:22,199 know what you're doing and 9 00:00:22,199 --> 00:00:23,939 um so that was episode one that's an 10 00:00:23,939 --> 00:00:26,279 important lesson Elliot says whoever 11 00:00:26,279 --> 00:00:30,060 controls the final hop on the network 12 00:00:30,060 --> 00:00:32,579 controls the traffic the onion reading 13 00:00:32,579 --> 00:00:34,320 protocol it's not as Anonymous as you 14 00:00:34,320 --> 00:00:36,780 think it is whoever's in control of the 15 00:00:36,780 --> 00:00:38,880 exit nodes is also in control of the 16 00:00:38,880 --> 00:00:41,640 traffic which makes me 17 00:00:41,640 --> 00:00:44,219 the one in control and that's the same 18 00:00:44,219 --> 00:00:47,100 thing that the NSA knows is that they 19 00:00:47,100 --> 00:00:49,020 know whoever controls the final hop 20 00:00:49,020 --> 00:00:52,079 controls the network 21 00:00:52,079 --> 00:00:54,300 you know from my experience of dealing 22 00:00:54,300 --> 00:00:55,800 with all of these these young people 23 00:00:55,800 --> 00:00:58,379 that's that's like their ultimate goal 24 00:00:58,379 --> 00:01:00,360 is to be able to hack their neighbor's 25 00:01:00,360 --> 00:01:03,420 Wi-Fi yeah that that's that's why they 26 00:01:03,420 --> 00:01:05,159 all want those Wi-Fi they want to get 27 00:01:05,159 --> 00:01:06,720 the white they want to get the Wi-Fi of 28 00:01:06,720 --> 00:01:08,460 the neighbors and they think also that 29 00:01:08,460 --> 00:01:10,439 maybe we should throw this in here is 30 00:01:10,439 --> 00:01:13,080 that they think that if they use the 31 00:01:13,080 --> 00:01:15,479 neighbor's IP address that they're safe 32 00:01:15,479 --> 00:01:17,520 so joking aside because obviously we 33 00:01:17,520 --> 00:01:19,500 don't recommend that would using your 34 00:01:19,500 --> 00:01:21,240 neighbor's Wi-Fi actually keep you safe 35 00:01:21,240 --> 00:01:23,520 you know a lot of people believe that if 36 00:01:23,520 --> 00:01:25,200 they use their neighbor's Wi-Fi that 37 00:01:25,200 --> 00:01:27,060 they're going to be safe because the IP 38 00:01:27,060 --> 00:01:29,340 address is going to be show that the 39 00:01:29,340 --> 00:01:31,740 neighbor was on that website many years 40 00:01:31,740 --> 00:01:35,460 ago I was working with an investigator 41 00:01:35,460 --> 00:01:37,799 for I think it was with the Navy at the 42 00:01:37,799 --> 00:01:39,840 time he was uh what they call the naval 43 00:01:39,840 --> 00:01:42,420 criminal investigation unit and he and I 44 00:01:42,420 --> 00:01:44,460 were talking he said to me that doesn't 45 00:01:44,460 --> 00:01:46,979 work and I said why not he says because 46 00:01:46,979 --> 00:01:49,799 whenever there's a crime committed the 47 00:01:49,799 --> 00:01:53,340 first it is clear that the people whose 48 00:01:53,340 --> 00:01:55,920 whole Wi-Fi did not commit the crime the 49 00:01:55,920 --> 00:01:57,659 first thing we do is we start knocking 50 00:01:57,659 --> 00:02:00,479 on the doors of everybody within a few 51 00:02:00,479 --> 00:02:03,060 houses and a hundred percent of the time 52 00:02:03,060 --> 00:02:04,740 a hundred percent that is what he said 53 00:02:04,740 --> 00:02:06,540 I'm not saying this he said he said a 54 00:02:06,540 --> 00:02:08,759 hundred percent of the time we will find 55 00:02:08,759 --> 00:02:10,380 the person who committed the crime 56 00:02:10,380 --> 00:02:13,860 within a few houses all right so he says 57 00:02:13,860 --> 00:02:16,080 I said 100 of the time it was yes a 58 00:02:16,080 --> 00:02:17,700 hundred percent of the time even though 59 00:02:17,700 --> 00:02:19,980 it's possible to be able to pick up 60 00:02:19,980 --> 00:02:22,620 Wi-Fi in some circumstances with special 61 00:02:22,620 --> 00:02:25,140 yagi antennas and what have you you can 62 00:02:25,140 --> 00:02:28,379 pick up Wi-Fi for or two right but 63 00:02:28,379 --> 00:02:31,020 hackers because they're people who think 64 00:02:31,020 --> 00:02:32,640 that they can get away with a crime by 65 00:02:32,640 --> 00:02:35,160 using their neighbors they almost always 66 00:02:35,160 --> 00:02:38,459 get caught because they are using the 67 00:02:38,459 --> 00:02:41,160 next door neighbors or the person two or 68 00:02:41,160 --> 00:02:43,440 three houses down and then law 69 00:02:43,440 --> 00:02:45,300 enforcement just has to go knocking on 70 00:02:45,300 --> 00:02:47,459 doors and asking questions I was 71 00:02:47,459 --> 00:02:49,080 surprised when he told me that he said 72 00:02:49,080 --> 00:02:51,300 100 of the time and so since that this 73 00:02:51,300 --> 00:02:53,280 is over 10 years yeah I've I've kind of 74 00:02:53,280 --> 00:02:55,860 checked the cases and he's right 100 of 75 00:02:55,860 --> 00:02:58,440 the time the person is is right next 76 00:02:58,440 --> 00:03:01,019 door or right behind the house or in the 77 00:03:01,019 --> 00:03:02,519 same apartment building hey everyone 78 00:03:02,519 --> 00:03:04,200 it's David Bumble back with occupy the 79 00:03:04,200 --> 00:03:05,879 web it's been too long since our last 80 00:03:05,879 --> 00:03:07,739 interview so glad to have him back okay 81 00:03:07,739 --> 00:03:09,720 by the web welcome thanks David it's 82 00:03:09,720 --> 00:03:13,080 always good to be back on the best I.T 83 00:03:13,080 --> 00:03:16,140 cyber security Channel on YouTube that's 84 00:03:16,140 --> 00:03:17,640 very kind of you to say that if you 85 00:03:17,640 --> 00:03:19,019 don't know who occupy the web is have a 86 00:03:19,019 --> 00:03:20,099 look at our previous videos which I've 87 00:03:20,099 --> 00:03:22,019 linked below he's also the author of 88 00:03:22,019 --> 00:03:23,760 this book Linux basics for hackers 89 00:03:23,760 --> 00:03:24,900 fantastic book if you want to learn 90 00:03:24,900 --> 00:03:26,940 Linux from a hacker's point of view he's 91 00:03:26,940 --> 00:03:28,560 also recently published this book 92 00:03:28,560 --> 00:03:31,140 Network basics for hackers what I love 93 00:03:31,140 --> 00:03:33,840 about his books is he takes subjects 94 00:03:33,840 --> 00:03:37,500 like networking Wi-Fi whichever subject 95 00:03:37,500 --> 00:03:39,300 you're interested in like Linux and he 96 00:03:39,300 --> 00:03:40,980 teaches it from a hacker's point of view 97 00:03:40,980 --> 00:03:42,959 he's also got this book getting started 98 00:03:42,959 --> 00:03:44,700 becoming a master hacker really great to 99 00:03:44,700 --> 00:03:46,680 have you back occupy the web what are we 100 00:03:46,680 --> 00:03:48,480 talking about today because this is a 101 00:03:48,480 --> 00:03:50,340 really good topic I think well today's 102 00:03:50,340 --> 00:03:53,280 topic is how to remain anonymous on the 103 00:03:53,280 --> 00:03:55,799 internet this is a subject matter that 104 00:03:55,799 --> 00:03:58,200 is near and dear to my heart I've just 105 00:03:58,200 --> 00:03:59,580 got to interrupt you before because I 106 00:03:59,580 --> 00:04:01,500 want to say this for everyone who asks 107 00:04:01,500 --> 00:04:03,959 because I get this a lot I don't know 108 00:04:03,959 --> 00:04:06,000 who occupy the web actually is because 109 00:04:06,000 --> 00:04:07,440 you're anonymous to me as well I don't 110 00:04:07,440 --> 00:04:08,519 know your name I don't know where you 111 00:04:08,519 --> 00:04:10,200 live I kind of believe that you live in 112 00:04:10,200 --> 00:04:11,040 the US 113 00:04:11,040 --> 00:04:12,720 um but I know almost nothing about you 114 00:04:12,720 --> 00:04:13,980 so you've done a really good job of 115 00:04:13,980 --> 00:04:15,239 being anonymous so I think you're the 116 00:04:15,239 --> 00:04:16,739 right person to talk about this ah 117 00:04:16,739 --> 00:04:19,560 thanks uh yeah I am in the US so we can 118 00:04:19,560 --> 00:04:23,040 you can tell my American accent I'm in 119 00:04:23,040 --> 00:04:24,840 the U.S as a matter of fact you know 120 00:04:24,840 --> 00:04:27,180 being in the US makes it uh somewhat 121 00:04:27,180 --> 00:04:30,000 more challenging to be uh to anonymous 122 00:04:30,000 --> 00:04:33,660 because we have the NSA who has uh who 123 00:04:33,660 --> 00:04:38,040 has their fingers into every transaction 124 00:04:38,040 --> 00:04:41,220 every packet that traverses the internet 125 00:04:41,220 --> 00:04:43,139 through the US they don't necessarily 126 00:04:43,139 --> 00:04:45,360 have that around the world they try to 127 00:04:45,360 --> 00:04:47,340 have that around the world but they 128 00:04:47,340 --> 00:04:49,800 definitely have it in the US so all you 129 00:04:49,800 --> 00:04:51,900 NSA people out there who are watching 130 00:04:51,900 --> 00:04:54,360 this video we know we know we know what 131 00:04:54,360 --> 00:04:56,460 you're doing and we know that you're 132 00:04:56,460 --> 00:04:58,620 looking at every packet and they know 133 00:04:58,620 --> 00:05:01,440 exactly who everybody is and the NSA 134 00:05:01,440 --> 00:05:03,720 folks they have made it really clear to 135 00:05:03,720 --> 00:05:06,000 me that they know who I am they have 136 00:05:06,000 --> 00:05:07,680 actually you know they accept me 137 00:05:07,680 --> 00:05:10,199 messages saying we know who you are and 138 00:05:10,199 --> 00:05:13,520 they do that on purpose because the NSA 139 00:05:13,520 --> 00:05:17,040 they kind of see the internet as their 140 00:05:17,040 --> 00:05:19,080 territory and they want to know 141 00:05:19,080 --> 00:05:21,180 everybody who's in their territory so 142 00:05:21,180 --> 00:05:24,780 trying to stay Anonymous from the NSA 143 00:05:24,780 --> 00:05:27,120 is really really hard if you're in the 144 00:05:27,120 --> 00:05:28,919 U.S it's not as hard in your other 145 00:05:28,919 --> 00:05:30,539 countries but in the U.S it's really 146 00:05:30,539 --> 00:05:32,699 hard because they basically have Taps 147 00:05:32,699 --> 00:05:35,699 into all the pipelines of all the 148 00:05:35,699 --> 00:05:37,800 traffic in the U.S and they capture 149 00:05:37,800 --> 00:05:40,800 every packet and can examine it if they 150 00:05:40,800 --> 00:05:43,560 want to know who you are and they can 151 00:05:43,560 --> 00:05:46,139 find out so but if you're in other 152 00:05:46,139 --> 00:05:48,180 countries it's a little bit easier to 153 00:05:48,180 --> 00:05:51,000 stay Anonymous from the NSA and the 154 00:05:51,000 --> 00:05:53,340 other intelligence agencies but it's 155 00:05:53,340 --> 00:05:55,919 really hard to stay Anonymous from your 156 00:05:55,919 --> 00:05:58,800 own countries intelligence agencies 157 00:05:58,800 --> 00:06:02,100 because all of them have Taps into the 158 00:06:02,100 --> 00:06:04,680 local internet so let's let's say this 159 00:06:04,680 --> 00:06:07,259 right up front Okay that is really hard 160 00:06:07,259 --> 00:06:09,539 to stay Anonymous from your own 161 00:06:09,539 --> 00:06:12,360 countries intelligence agencies I also 162 00:06:12,360 --> 00:06:16,020 want to point out that if you become a 163 00:06:16,020 --> 00:06:18,240 target from these intelligence agencies 164 00:06:18,240 --> 00:06:21,300 it's really really hard to remain 165 00:06:21,300 --> 00:06:24,180 anonymous because they have tools that 166 00:06:24,180 --> 00:06:26,340 make it really really difficult to stay 167 00:06:26,340 --> 00:06:29,160 Anonymous uh David you and I are going 168 00:06:29,160 --> 00:06:33,720 to do a show on Pegasus yeah Pegasus is 169 00:06:33,720 --> 00:06:36,300 this notorious cell phone hacking 170 00:06:36,300 --> 00:06:41,460 software put out by NOS I mean NSO the 171 00:06:41,460 --> 00:06:44,639 um Israeli hacking group and with NS 172 00:06:44,639 --> 00:06:46,440 with Pegasus they can basically just 173 00:06:46,440 --> 00:06:49,020 Target your phone and take over your 174 00:06:49,020 --> 00:06:50,940 phone and then of course you're not 175 00:06:50,940 --> 00:06:52,979 Anonymous every message that you send on 176 00:06:52,979 --> 00:06:55,319 your phone all your geolocation Services 177 00:06:55,319 --> 00:06:58,620 every message you send becomes captured 178 00:06:58,620 --> 00:07:00,960 by the intelligence agency so that's a 179 00:07:00,960 --> 00:07:03,360 whole different bailiwick of trying to 180 00:07:03,360 --> 00:07:05,280 remain anonymous from those guys because 181 00:07:05,280 --> 00:07:08,419 they have capabilities and they have 182 00:07:08,419 --> 00:07:11,819 legal sanction to do things that nobody 183 00:07:11,819 --> 00:07:13,380 else does if you're talking offline 184 00:07:13,380 --> 00:07:14,699 there's different levels right so you've 185 00:07:14,699 --> 00:07:16,020 got like the commercial companies is 186 00:07:16,020 --> 00:07:17,759 that right and then it like the NSA is 187 00:07:17,759 --> 00:07:20,400 like right at the extreme NSA is the 188 00:07:20,400 --> 00:07:22,199 extreme in the United States because 189 00:07:22,199 --> 00:07:25,500 literally they're given access to to all 190 00:07:25,500 --> 00:07:27,479 the pipes and they can see all the 191 00:07:27,479 --> 00:07:29,880 traffic and they can trace but they 192 00:07:29,880 --> 00:07:31,500 don't have that necessary that access in 193 00:07:31,500 --> 00:07:33,000 other countries some countries they do 194 00:07:33,000 --> 00:07:35,639 but in U.S they've been given Total 195 00:07:35,639 --> 00:07:38,039 Access to all the pipes and so they they 196 00:07:38,039 --> 00:07:40,319 collect all of the data they have this 197 00:07:40,319 --> 00:07:42,780 big data Farm where they put all the 198 00:07:42,780 --> 00:07:44,759 data in there and they can basically 199 00:07:44,759 --> 00:07:47,699 Trace just about they can trace anybody 200 00:07:47,699 --> 00:07:50,580 and they get metadata off all of the 201 00:07:50,580 --> 00:07:53,160 packets and all the traffic if they if 202 00:07:53,160 --> 00:07:55,560 you become a Target then they can do 203 00:07:55,560 --> 00:07:57,960 even more and get more information about 204 00:07:57,960 --> 00:07:59,699 you so I mean some people might be 205 00:07:59,699 --> 00:08:00,780 disappointed about what you said because 206 00:08:00,780 --> 00:08:02,460 it's like how do I stay invisible how do 207 00:08:02,460 --> 00:08:04,919 I stay you know Anonymous is can I stay 208 00:08:04,919 --> 00:08:06,300 Anonymous from Google can I stay 209 00:08:06,300 --> 00:08:09,479 Anonymous from from anyone or as soon as 210 00:08:09,479 --> 00:08:10,680 I go on the internet I'm not going to be 211 00:08:10,680 --> 00:08:12,539 discovered well if you're trying to stay 212 00:08:12,539 --> 00:08:14,639 Anonymous from the commercial interest 213 00:08:14,639 --> 00:08:16,620 that's relatively easy and we can talk 214 00:08:16,620 --> 00:08:18,660 about that the other thing that I find 215 00:08:18,660 --> 00:08:20,819 with a lot of people is that they 216 00:08:20,819 --> 00:08:24,120 believe that the only way to trace them 217 00:08:24,120 --> 00:08:26,099 is through through their IP address so 218 00:08:26,099 --> 00:08:29,340 this is fixation on on being able to 219 00:08:29,340 --> 00:08:31,740 hide their IP address there's other ways 220 00:08:31,740 --> 00:08:34,140 of tracing your identity other than your 221 00:08:34,140 --> 00:08:36,000 IP address so if all you're focused on 222 00:08:36,000 --> 00:08:37,919 is hiding your IP address you're going 223 00:08:37,919 --> 00:08:40,260 to be exposed by both the commercial 224 00:08:40,260 --> 00:08:43,919 interests and you know the the law 225 00:08:43,919 --> 00:08:46,140 enforcement and intelligence agencies so 226 00:08:46,140 --> 00:08:49,080 you have to think about all of the 227 00:08:49,080 --> 00:08:51,779 different ways that somebody can trace 228 00:08:51,779 --> 00:08:53,519 you and that's why one of the things 229 00:08:53,519 --> 00:08:56,100 that I emphasize is that if you want to 230 00:08:56,100 --> 00:08:59,100 remain anonymous and safe you need to 231 00:08:59,100 --> 00:09:01,680 understand forensics you need to 232 00:09:01,680 --> 00:09:05,279 understand OSN so if you understand both 233 00:09:05,279 --> 00:09:08,100 of those fields and you understand then 234 00:09:08,100 --> 00:09:11,880 what people can do to find you and find 235 00:09:11,880 --> 00:09:14,399 your information then the better off you 236 00:09:14,399 --> 00:09:18,300 are in being able to hide your identity 237 00:09:18,300 --> 00:09:20,700 and your traffic are you saying that 238 00:09:20,700 --> 00:09:23,700 that vpns are like all these VPN adverts 239 00:09:23,700 --> 00:09:25,380 are wrong you know if I get a VPN I'm 240 00:09:25,380 --> 00:09:27,560 safe 241 00:09:27,920 --> 00:09:32,640 let's start off by saying one okay that 242 00:09:32,640 --> 00:09:35,640 you're only as safe as the VPN is safe 243 00:09:35,640 --> 00:09:38,580 right so the VPN is going to hide your 244 00:09:38,580 --> 00:09:40,860 IP address right that's what I was my 245 00:09:40,860 --> 00:09:42,360 point I was trying to make earlier is 246 00:09:42,360 --> 00:09:44,399 that there's obsession with the IP 247 00:09:44,399 --> 00:09:45,839 address but the whole business has been 248 00:09:45,839 --> 00:09:47,459 built on this whole industry so I'm just 249 00:09:47,459 --> 00:09:49,260 I'm just being sarcastic yeah and we're 250 00:09:49,260 --> 00:09:51,180 gonna blow it apart right because yes 251 00:09:51,180 --> 00:09:53,279 it's a it's a good it's a good measure 252 00:09:53,279 --> 00:09:55,440 vpns are a good measure proxies are good 253 00:09:55,440 --> 00:09:58,260 measures Tor are good measures but there 254 00:09:58,260 --> 00:10:01,500 are ways of tracing you other than just 255 00:10:01,500 --> 00:10:05,100 the IP all of those okay are going to 256 00:10:05,100 --> 00:10:07,860 hide your IP address but there's other 257 00:10:07,860 --> 00:10:10,200 ways of tracing you other than just your 258 00:10:10,200 --> 00:10:12,240 IP address one of the things you have to 259 00:10:12,240 --> 00:10:13,680 keep in mind when trying to remain 260 00:10:13,680 --> 00:10:16,740 anonymous is that you you can only put 261 00:10:16,740 --> 00:10:19,080 up you know you can put up hurdles all 262 00:10:19,080 --> 00:10:21,360 right but it's almost impossible if an 263 00:10:21,360 --> 00:10:23,100 intelligence agency wants to find you 264 00:10:23,100 --> 00:10:26,580 that they do if law enforcement is going 265 00:10:26,580 --> 00:10:29,459 to try to find you they have resources 266 00:10:29,459 --> 00:10:31,920 but they have to spend a lot of 267 00:10:31,920 --> 00:10:33,779 resources if you're good they have to 268 00:10:33,779 --> 00:10:35,880 spend a lot of resources to find you now 269 00:10:35,880 --> 00:10:38,580 in general you know most people who are 270 00:10:38,580 --> 00:10:41,279 navigating the internet are not thinking 271 00:10:41,279 --> 00:10:44,160 about anonymity and basically they're 272 00:10:44,160 --> 00:10:46,200 giving away all of their information 273 00:10:46,200 --> 00:10:48,839 about their entire life to commercial 274 00:10:48,839 --> 00:10:52,740 interests like Facebook or Google and 275 00:10:52,740 --> 00:10:54,660 others I don't know I'm not comfortable 276 00:10:54,660 --> 00:10:58,500 with that maybe you are but yeah and so 277 00:10:58,500 --> 00:11:00,060 one of the things you have to keep in 278 00:11:00,060 --> 00:11:02,640 mind is that if you're using Chrome 279 00:11:02,640 --> 00:11:04,860 which is a great browser by the way 280 00:11:04,860 --> 00:11:06,480 Google Google makes a really good 281 00:11:06,480 --> 00:11:09,300 browser and I really love Chrome but 282 00:11:09,300 --> 00:11:12,899 it's constantly sending back all your 283 00:11:12,899 --> 00:11:15,060 personal information back to Google 284 00:11:15,060 --> 00:11:18,180 Headquarters if you if you ever using 285 00:11:18,180 --> 00:11:20,760 Chrome open up say Wireshark while 286 00:11:20,760 --> 00:11:22,620 you're using Chrome and what you'll see 287 00:11:22,620 --> 00:11:24,240 when you're using Wireshark is that 288 00:11:24,240 --> 00:11:27,420 Chrome home is constantly communicating 289 00:11:27,420 --> 00:11:29,519 back to Google Headquarters everything 290 00:11:29,519 --> 00:11:32,220 that you're doing they're constantly 291 00:11:32,220 --> 00:11:34,680 sending back information on you so when 292 00:11:34,680 --> 00:11:37,500 you get an ad then you go cash that's 293 00:11:37,500 --> 00:11:39,540 amazing I was just thinking about buying 294 00:11:39,540 --> 00:11:41,339 that how did that pop up on my screen 295 00:11:41,339 --> 00:11:44,459 well that's no mystery because you know 296 00:11:44,459 --> 00:11:46,680 they not only are they sending back 297 00:11:46,680 --> 00:11:49,260 information about you but remember we're 298 00:11:49,260 --> 00:11:51,540 living in the era of artificial 299 00:11:51,540 --> 00:11:54,240 intelligence and artificial intelligence 300 00:11:54,240 --> 00:11:57,660 is not only looking at what you're 301 00:11:57,660 --> 00:11:59,760 searching for but they're trying to 302 00:11:59,760 --> 00:12:02,700 create a mind map of you so what they're 303 00:12:02,700 --> 00:12:04,440 doing is that they're saying the person 304 00:12:04,440 --> 00:12:07,680 who is doing these types of searches is 305 00:12:07,680 --> 00:12:09,660 likely the next thing they're going to 306 00:12:09,660 --> 00:12:12,300 want is this because that's the pattern 307 00:12:12,300 --> 00:12:14,700 that we understand from looking at 308 00:12:14,700 --> 00:12:17,940 billions of people in the world that 309 00:12:17,940 --> 00:12:19,920 with these characteristics they're going 310 00:12:19,920 --> 00:12:22,760 to want this and they can actually 311 00:12:22,760 --> 00:12:25,920 anticipate your need leads and send you 312 00:12:25,920 --> 00:12:28,560 an ad for it so if you want to stay 313 00:12:28,560 --> 00:12:31,440 Anonymous from those people that's a 314 00:12:31,440 --> 00:12:33,300 little bit easier to do now one of the 315 00:12:33,300 --> 00:12:34,980 things is first off just don't use 316 00:12:34,980 --> 00:12:36,380 Google Chrome 317 00:12:36,380 --> 00:12:39,779 because Google Chrome is is owned by 318 00:12:39,779 --> 00:12:42,480 Google right and it's communicating Bing 319 00:12:42,480 --> 00:12:45,240 is communicating to Microsoft even 320 00:12:45,240 --> 00:12:48,360 Mozilla is communicating back it's most 321 00:12:48,360 --> 00:12:50,339 of those a little safer than the others 322 00:12:50,339 --> 00:12:52,320 but still you know they're they're 323 00:12:52,320 --> 00:12:54,360 communicating back what you're searching 324 00:12:54,360 --> 00:12:57,360 for on the web there's a relatively new 325 00:12:57,360 --> 00:13:01,380 browser called Brave right that um yeah 326 00:13:01,380 --> 00:13:05,760 you use it I use it that is a is more 327 00:13:05,760 --> 00:13:08,279 Anonymous than the others so that's one 328 00:13:08,279 --> 00:13:10,320 of my first recommendations is get away 329 00:13:10,320 --> 00:13:13,320 from using Chrome and Bing and when you 330 00:13:13,320 --> 00:13:15,240 say you mean you mean one of the new 331 00:13:15,240 --> 00:13:18,720 browsers Edge right Edge I'm sorry being 332 00:13:18,720 --> 00:13:20,639 the search engine yeah Bing is their 333 00:13:20,639 --> 00:13:23,220 search engine edges so yeah those those 334 00:13:23,220 --> 00:13:26,579 products are designed to capture 335 00:13:26,579 --> 00:13:29,040 information about you and then once 336 00:13:29,040 --> 00:13:30,959 somebody captures information about you 337 00:13:30,959 --> 00:13:34,139 it's pretty easy for them to be able to 338 00:13:34,139 --> 00:13:36,300 to determine who you are there's other 339 00:13:36,300 --> 00:13:38,880 things that can also be captured like 340 00:13:38,880 --> 00:13:41,160 for instance there's a whenever you 341 00:13:41,160 --> 00:13:43,639 visit a website you know you're 342 00:13:43,639 --> 00:13:47,040 presenting these cookies that are in 343 00:13:47,040 --> 00:13:48,959 your browser right so if there's any 344 00:13:48,959 --> 00:13:51,480 cookies in your browser they are going 345 00:13:51,480 --> 00:13:54,959 to appear and that cookie is has 346 00:13:54,959 --> 00:13:57,540 identifying information at least if it's 347 00:13:57,540 --> 00:14:00,600 a cookie that has been placed there by 348 00:14:00,600 --> 00:14:03,660 Google or Facebook okay and those both 349 00:14:03,660 --> 00:14:05,279 those companies put cookies in your 350 00:14:05,279 --> 00:14:08,339 browser then it's going to identify who 351 00:14:08,339 --> 00:14:10,079 you are all right so one of the things 352 00:14:10,079 --> 00:14:13,019 you can do with your browser is go to 353 00:14:13,019 --> 00:14:15,420 the settings and turn off no cookies now 354 00:14:15,420 --> 00:14:18,000 that's going to make your life a little 355 00:14:18,000 --> 00:14:20,160 bit less convenient because that means 356 00:14:20,160 --> 00:14:21,779 you're going to have to log into every 357 00:14:21,779 --> 00:14:23,639 website and nobody's going to know who 358 00:14:23,639 --> 00:14:25,440 you are when you go when you log into 359 00:14:25,440 --> 00:14:27,000 your Facebook account they're not going 360 00:14:27,000 --> 00:14:28,440 to automatically know who you are and 361 00:14:28,440 --> 00:14:31,620 log you in or other services so it makes 362 00:14:31,620 --> 00:14:33,839 life a little more difficult but it's 363 00:14:33,839 --> 00:14:36,000 going to save your identity you would 364 00:14:36,000 --> 00:14:37,740 use like recommend using private browser 365 00:14:37,740 --> 00:14:39,240 windows stuff like that right private 366 00:14:39,240 --> 00:14:41,760 browser windows and just turning off the 367 00:14:41,760 --> 00:14:45,000 no cookings okay on any browser that you 368 00:14:45,000 --> 00:14:46,320 use it's going to come in different 369 00:14:46,320 --> 00:14:47,699 places it's usually going to be in 370 00:14:47,699 --> 00:14:49,980 settings security and you can go ahead 371 00:14:49,980 --> 00:14:53,220 and and click on no cookies cookies are 372 00:14:53,220 --> 00:14:55,680 a lot of information for those who 373 00:14:55,680 --> 00:14:57,120 aren't familiar with cookies cookies 374 00:14:57,120 --> 00:15:00,120 basically a text file that has 375 00:15:00,120 --> 00:15:02,519 information about who you are and what 376 00:15:02,519 --> 00:15:04,199 your interests are it may actually 377 00:15:04,199 --> 00:15:05,699 include 378 00:15:05,699 --> 00:15:08,940 um things like uh your your username and 379 00:15:08,940 --> 00:15:12,240 password this is it as you Traverse the 380 00:15:12,240 --> 00:15:14,760 internet these cookies can be presented 381 00:15:14,760 --> 00:15:18,180 to other people other websites so people 382 00:15:18,180 --> 00:15:21,300 are focused on IP addresses but remember 383 00:15:21,300 --> 00:15:24,060 for somebody to identify You by IP 384 00:15:24,060 --> 00:15:25,620 address us they actually would have to 385 00:15:25,620 --> 00:15:29,160 get into the ISP or the VPN to get their 386 00:15:29,160 --> 00:15:31,320 records their log files to identify you 387 00:15:31,320 --> 00:15:33,120 IP addresses are something to be 388 00:15:33,120 --> 00:15:35,220 concerned about but these other issues 389 00:15:35,220 --> 00:15:38,459 are equally important in terms of trying 390 00:15:38,459 --> 00:15:40,920 to maintain your anonymity on the 391 00:15:40,920 --> 00:15:42,959 internet one of the things that I'd like 392 00:15:42,959 --> 00:15:46,500 to show you here let's go into Kali and 393 00:15:46,500 --> 00:15:49,139 talking about IP addresses one of the 394 00:15:49,139 --> 00:15:51,360 things that is available to us in Cali 395 00:15:51,360 --> 00:15:53,399 and other places is what's called proxy 396 00:15:53,399 --> 00:15:57,300 chains so proxy chains is a tool that 397 00:15:57,300 --> 00:16:00,000 uses multiple you can use a single proxy 398 00:16:00,000 --> 00:16:03,660 or multiple proxies okay to be able to 399 00:16:03,660 --> 00:16:05,820 hide your IP address so let's go just 400 00:16:05,820 --> 00:16:07,680 hiding your IP address we're going ahead 401 00:16:07,680 --> 00:16:09,779 let's open up a terminal in I've got 402 00:16:09,779 --> 00:16:11,279 some let's open up a new one here 403 00:16:11,279 --> 00:16:14,399 there's a tool in Cali that allows you 404 00:16:14,399 --> 00:16:17,220 to use proxies it's called proxy genes 405 00:16:17,220 --> 00:16:19,980 so you can just go proxy changes built 406 00:16:19,980 --> 00:16:21,300 into 407 00:16:21,300 --> 00:16:24,779 um Cali and others not just not just uh 408 00:16:24,779 --> 00:16:27,300 Cali but now there's parrot and Arch 409 00:16:27,300 --> 00:16:29,279 Linux and a number of others have proxy 410 00:16:29,279 --> 00:16:31,260 chains built into it as well the key to 411 00:16:31,260 --> 00:16:33,899 using proxy chains is simply to set up 412 00:16:33,899 --> 00:16:36,720 the configuration file in Linux you know 413 00:16:36,720 --> 00:16:38,579 every configuration file is simply a 414 00:16:38,579 --> 00:16:40,500 text file all you have to do is go into 415 00:16:40,500 --> 00:16:42,899 the text file to be able to edit it so 416 00:16:42,899 --> 00:16:45,480 let's go and look at the proxy chains 417 00:16:45,480 --> 00:16:47,880 configuration file let's see it's I'm 418 00:16:47,880 --> 00:16:49,500 going to use that I 419 00:16:49,500 --> 00:16:52,440 mouse pad which is built into Cali it's 420 00:16:52,440 --> 00:16:55,199 a GUI bass person's Bim and we're gonna 421 00:16:55,199 --> 00:16:58,740 go is that Etsy proxy but I remember 422 00:16:58,740 --> 00:17:00,680 where is that 423 00:17:00,680 --> 00:17:03,860 proxychains.com nope it's not there 424 00:17:03,860 --> 00:17:07,679 we'll close this yeah okay let's go to 425 00:17:07,679 --> 00:17:11,880 CD Etsy and we'll go to etsy's where 426 00:17:11,880 --> 00:17:13,620 most of the configuration files are in 427 00:17:13,620 --> 00:17:17,100 Linux and you go up to you'll see up 428 00:17:17,100 --> 00:17:19,260 here proxy chains four that's what I had 429 00:17:19,260 --> 00:17:21,900 wrong it's four so we're gonna go up 430 00:17:21,900 --> 00:17:24,419 Arrow here let me clear my screen all 431 00:17:24,419 --> 00:17:26,699 right so then we're gonna go mouse pad 432 00:17:26,699 --> 00:17:29,940 proxy chains four and then look at that 433 00:17:29,940 --> 00:17:31,980 all right all right here we go this is 434 00:17:31,980 --> 00:17:34,020 the configuration file for proxy chains 435 00:17:34,020 --> 00:17:36,780 what proxy chains will do is it'll allow 436 00:17:36,780 --> 00:17:41,160 you to select proxies that will then 437 00:17:41,160 --> 00:17:44,220 take your traffic and move it through a 438 00:17:44,220 --> 00:17:47,580 proxy hiding your IP and you can even 439 00:17:47,580 --> 00:17:50,340 send it through multiple procs as you 440 00:17:50,340 --> 00:17:53,460 can see here there's all of this up here 441 00:17:53,460 --> 00:17:55,980 is basically comments describing what 442 00:17:55,980 --> 00:17:58,260 they do the option below identifies how 443 00:17:58,260 --> 00:18:00,600 proxy this is treated you can have a 444 00:18:00,600 --> 00:18:02,400 dynamic chain where each connection will 445 00:18:02,400 --> 00:18:05,160 be done via chain proxies a strict chain 446 00:18:05,160 --> 00:18:08,340 okay which is what I have uncomment and 447 00:18:08,340 --> 00:18:09,660 so we'll just use a strict chain 448 00:18:09,660 --> 00:18:11,880 initially there's a round robin chain 449 00:18:11,880 --> 00:18:13,860 each connection will be done via chain 450 00:18:13,860 --> 00:18:16,980 proxies at the chain length which is a 451 00:18:16,980 --> 00:18:18,900 variable you can set the chain length 452 00:18:18,900 --> 00:18:21,000 there's a random chain each connection 453 00:18:21,000 --> 00:18:23,640 will be done via a random proxy all 454 00:18:23,640 --> 00:18:25,740 right here's a chain length by default 455 00:18:25,740 --> 00:18:28,320 it's set to three and if we scroll down 456 00:18:28,320 --> 00:18:30,600 a little further we'll see there's a 457 00:18:30,600 --> 00:18:32,520 number of other variables here here's 458 00:18:32,520 --> 00:18:35,160 the proxy list format it's going to look 459 00:18:35,160 --> 00:18:37,860 like this sucks five and then the port 460 00:18:37,860 --> 00:18:39,660 number and if there's a username and 461 00:18:39,660 --> 00:18:43,020 password okay HTTP these are all local 462 00:18:43,020 --> 00:18:44,820 IP addresses so you know that really 463 00:18:44,820 --> 00:18:47,039 those are ones that you want to use all 464 00:18:47,039 --> 00:18:50,580 right what what I've done and usually 465 00:18:50,580 --> 00:18:55,080 it's set by default within the Cali in 466 00:18:55,080 --> 00:18:58,020 this proxy chains is using the sox5 and 467 00:18:58,020 --> 00:18:59,360 then using 468 00:18:59,360 --> 00:19:03,600 127001 your local host on 90 50. this is 469 00:19:03,600 --> 00:19:08,580 tor as you know Tor is the special and 470 00:19:08,580 --> 00:19:11,820 separate network of routers okay that 471 00:19:11,820 --> 00:19:14,580 encrypts your traffic from Hop to hop to 472 00:19:14,580 --> 00:19:17,820 hop Tor was originally developed by the 473 00:19:17,820 --> 00:19:21,960 U.S Navy so that they could go ahead and 474 00:19:21,960 --> 00:19:25,080 navigate anonymously it's now an open 475 00:19:25,080 --> 00:19:28,919 source project we do know that there are 476 00:19:28,919 --> 00:19:31,559 some issues with Tor where it's not 477 00:19:31,559 --> 00:19:33,140 totally Anonymous 478 00:19:33,140 --> 00:19:36,120 institutions and intelligence agencies 479 00:19:36,120 --> 00:19:40,440 like the NSA can still crack Tor but 480 00:19:40,440 --> 00:19:43,860 it's still pretty effective for what we 481 00:19:43,860 --> 00:19:45,419 want to do here so let's go ahead and 482 00:19:45,419 --> 00:19:49,140 try it out just using Tor as a our proxy 483 00:19:49,140 --> 00:19:51,660 chain you can go ahead once you you set 484 00:19:51,660 --> 00:19:53,520 those major settings go ahead and save 485 00:19:53,520 --> 00:19:55,860 and then close it and now what you need 486 00:19:55,860 --> 00:19:59,820 to do is to go ahead and start Tour 487 00:19:59,820 --> 00:20:02,580 alright so you can go pseudo system 488 00:20:02,580 --> 00:20:06,600 control start core or enable tour so 489 00:20:06,600 --> 00:20:08,160 tour should be running now on your 490 00:20:08,160 --> 00:20:12,059 system then let's go to proxy chains you 491 00:20:12,059 --> 00:20:16,919 can use use a sudo because uh Mozilla 492 00:20:16,919 --> 00:20:19,559 doesn't like it and then just go Mozilla 493 00:20:19,559 --> 00:20:21,780 and now what this says is it runs proxy 494 00:20:21,780 --> 00:20:24,480 chains and then runs Mozilla Firefox I 495 00:20:24,480 --> 00:20:26,160 guess it's actually Firefox is the 496 00:20:26,160 --> 00:20:27,960 Mozilla is the name of the Project's 497 00:20:27,960 --> 00:20:31,080 Firefox is what it is and there we go so 498 00:20:31,080 --> 00:20:33,240 what you've done now is you've started 499 00:20:33,240 --> 00:20:35,280 um Firefox my browser but going through 500 00:20:35,280 --> 00:20:37,799 tool Network right right it's I'm 501 00:20:37,799 --> 00:20:41,160 running my Mozilla Firefox simulator to 502 00:20:41,160 --> 00:20:42,720 our Network you can see it in the 503 00:20:42,720 --> 00:20:44,340 background here let's kind of see if we 504 00:20:44,340 --> 00:20:46,500 can get both of those online yeah all 505 00:20:46,500 --> 00:20:47,820 right you can see it's running through a 506 00:20:47,820 --> 00:20:49,260 strict chain it tells us right here 507 00:20:49,260 --> 00:20:51,720 chain which means that it's only it's 508 00:20:51,720 --> 00:20:54,000 it's going to go through all of the 509 00:20:54,000 --> 00:20:55,620 proxies that you've listed in our case 510 00:20:55,620 --> 00:20:57,600 we've only listed one we've listed the 511 00:20:57,600 --> 00:21:00,360 Torah Network and then let's go and 512 00:21:00,360 --> 00:21:03,900 let's go to uh hackers arise I hear it's 513 00:21:03,900 --> 00:21:06,720 a good website I hear this too yeah lots 514 00:21:06,720 --> 00:21:08,360 of good information there that's right 515 00:21:08,360 --> 00:21:10,880 so you can see that it's going through 516 00:21:10,880 --> 00:21:14,160 and uh and it's anonymizing my traffic 517 00:21:14,160 --> 00:21:17,940 coming through the the Torah Network so 518 00:21:17,940 --> 00:21:21,419 we could use both there is a separate 519 00:21:21,419 --> 00:21:24,480 Mozilla perhaps a Mozilla a Tor Browser 520 00:21:24,480 --> 00:21:30,299 or we can use the uh Mozilla built in to 521 00:21:30,299 --> 00:21:32,640 Cali and just send it through the Torah 522 00:21:32,640 --> 00:21:34,919 Network let's check our IP on this okay 523 00:21:34,919 --> 00:21:36,780 let's go what's my IP 524 00:21:36,780 --> 00:21:38,460 yeah you live in Amsterdam now right 525 00:21:38,460 --> 00:21:41,700 Amsterdam okay Amsterdam is where it's 526 00:21:41,700 --> 00:21:44,580 at that's my location let's go and uh 527 00:21:44,580 --> 00:21:46,740 and refresh again and see if we can get 528 00:21:46,740 --> 00:21:50,220 a different tour router and this one's 529 00:21:50,220 --> 00:21:52,700 still the same same IP okay 530 00:21:52,700 --> 00:21:54,600 sometimes you can go ahead and just 531 00:21:54,600 --> 00:21:57,840 refresh it and it'll jump to another IP 532 00:21:57,840 --> 00:21:59,520 let's see if we can get another IP out 533 00:21:59,520 --> 00:22:02,340 of it you can see how slow it is this is 534 00:22:02,340 --> 00:22:04,799 one of the drawbacks to use in tor 535 00:22:04,799 --> 00:22:07,220 some of the commercial 536 00:22:07,220 --> 00:22:10,260 proxies will run a lot faster I think 537 00:22:10,260 --> 00:22:12,900 I've told the story before that when I 538 00:22:12,900 --> 00:22:15,360 was doing some work in Washington DC I 539 00:22:15,360 --> 00:22:19,140 was doing a training of FBI at the uh a 540 00:22:19,140 --> 00:22:20,760 few years back and I thought it'd be 541 00:22:20,760 --> 00:22:22,500 funny that when everybody was out at 542 00:22:22,500 --> 00:22:24,900 lunch that I was going to go ahead and 543 00:22:24,900 --> 00:22:27,720 this was when the Silk Road was still up 544 00:22:27,720 --> 00:22:30,299 and running I said I had the Silk Road 545 00:22:30,299 --> 00:22:32,220 up on the screen as they walked in from 546 00:22:32,220 --> 00:22:34,200 lunch and had all the drugs all the 547 00:22:34,200 --> 00:22:37,140 drugs for sale so so they came back from 548 00:22:37,140 --> 00:22:39,120 lunch and I had the Silk Road up on the 549 00:22:39,120 --> 00:22:40,799 screen you can tell us it's been a while 550 00:22:40,799 --> 00:22:42,600 because the Silk Road's been down for a 551 00:22:42,600 --> 00:22:43,799 while but of course there's other other 552 00:22:43,799 --> 00:22:46,440 sites now that do the same thing on the 553 00:22:46,440 --> 00:22:48,720 dark web and I said okay you guys what 554 00:22:48,720 --> 00:22:50,820 are you gonna do about this and they 555 00:22:50,820 --> 00:22:53,580 said that's not our problem that's drug 556 00:22:53,580 --> 00:22:57,179 enforcements had interestingly if you 557 00:22:57,179 --> 00:22:59,220 know the story that it actually was the 558 00:22:59,220 --> 00:23:02,039 FBI then who took down the Silk Road 559 00:23:02,039 --> 00:23:05,340 even though their response to me he was 560 00:23:05,340 --> 00:23:07,020 no that's not our job that's that's drug 561 00:23:07,020 --> 00:23:08,760 enforcement and didn't you say something 562 00:23:08,760 --> 00:23:10,440 along the lines that it was it was 563 00:23:10,440 --> 00:23:12,000 actually very fussed because it looked 564 00:23:12,000 --> 00:23:13,140 like you were using one of the local 565 00:23:13,140 --> 00:23:15,539 nodes or something exactly so I did tell 566 00:23:15,539 --> 00:23:17,340 the story here before yeah so I'm I'm 567 00:23:17,340 --> 00:23:21,419 I'm in Washington DC and I'm like gosh 568 00:23:21,419 --> 00:23:24,780 you know it's so much faster in 569 00:23:24,780 --> 00:23:27,840 Washington DC and that was before I knew 570 00:23:27,840 --> 00:23:31,740 that the NSA had nodes all around the 571 00:23:31,740 --> 00:23:33,960 Washington DC so that it was running 572 00:23:33,960 --> 00:23:35,700 just as fast as my regular internet 573 00:23:35,700 --> 00:23:39,240 would in DC because they've got no 574 00:23:39,240 --> 00:23:41,820 distributed all over DC to make sure 575 00:23:41,820 --> 00:23:43,460 that they can see all the traffic 576 00:23:43,460 --> 00:23:45,600 interestingly if you've watched the Mr 577 00:23:45,600 --> 00:23:48,380 Robot Series in the very first episode 578 00:23:48,380 --> 00:23:51,900 Elliott is able to he goes into a coffee 579 00:23:51,900 --> 00:23:54,900 shop and it's like Dan's coffee shop or 580 00:23:54,900 --> 00:23:56,640 something like that and it turns out 581 00:23:56,640 --> 00:24:00,919 that Dan is actually running a 582 00:24:01,140 --> 00:24:06,240 server from his coffee shop and uh and 583 00:24:06,240 --> 00:24:09,900 Elliot discovers this and confronts him 584 00:24:09,900 --> 00:24:12,900 with this information and he's like how 585 00:24:12,900 --> 00:24:14,640 do you know that you know how could you 586 00:24:14,640 --> 00:24:16,919 he said well because your internet is so 587 00:24:16,919 --> 00:24:19,140 fast that I was counting you to use your 588 00:24:19,140 --> 00:24:21,720 internet and then I began to wonder why 589 00:24:21,720 --> 00:24:25,260 is it so fast and so and he put up a a 590 00:24:25,260 --> 00:24:28,260 node on the Tor Network and was able to 591 00:24:28,260 --> 00:24:31,740 see the traffic going to his server and 592 00:24:31,740 --> 00:24:33,419 then got into the server and saw that 593 00:24:33,419 --> 00:24:35,700 was all 594 00:24:35,700 --> 00:24:37,500 um so that was episode one and that's an 595 00:24:37,500 --> 00:24:39,840 important lesson and Elliot says whoever 596 00:24:39,840 --> 00:24:43,559 controls the final hop on the network 597 00:24:43,559 --> 00:24:46,140 controls the traffic the onion rooting 598 00:24:46,140 --> 00:24:47,820 protocol it's not as Anonymous as you 599 00:24:47,820 --> 00:24:50,159 think it is whoever's in control of the 600 00:24:50,159 --> 00:24:52,320 exit nodes is also in control of the 601 00:24:52,320 --> 00:24:55,200 traffic which makes me 602 00:24:55,200 --> 00:24:57,720 the one in control and that's the same 603 00:24:57,720 --> 00:25:00,600 thing that the NSA knows is that they 604 00:25:00,600 --> 00:25:02,520 know whoever controls the final hot 605 00:25:02,520 --> 00:25:05,460 controls the network so he did the same 606 00:25:05,460 --> 00:25:08,159 thing it's easy you can set up a a a 607 00:25:08,159 --> 00:25:10,679 router on the Tor Network easy enough 608 00:25:10,679 --> 00:25:12,960 just go to the website and they have the 609 00:25:12,960 --> 00:25:14,760 software you can download and put 610 00:25:14,760 --> 00:25:16,980 yourself as a router on the tour Network 611 00:25:16,980 --> 00:25:18,720 so this is the problem you're telling us 612 00:25:18,720 --> 00:25:20,340 about tour but we could be still 613 00:25:20,340 --> 00:25:22,020 compromised right because they could 614 00:25:22,020 --> 00:25:24,360 have could have like exit notes exactly 615 00:25:24,360 --> 00:25:26,700 Whoever has that last exit node and 616 00:25:26,700 --> 00:25:28,620 controls the traffic I'm not going to 617 00:25:28,620 --> 00:25:30,240 refresh it one more time and see if we 618 00:25:30,240 --> 00:25:32,039 it's still sending me back to Amsterdam 619 00:25:32,039 --> 00:25:35,220 consistently I'm gonna go let's uh let's 620 00:25:35,220 --> 00:25:38,400 let's stop it and and try connecting 621 00:25:38,400 --> 00:25:40,679 again and let's see if we can't get a 622 00:25:40,679 --> 00:25:43,260 different IP address there we go and 623 00:25:43,260 --> 00:25:47,220 let's go uh what is my what is my IP is 624 00:25:47,220 --> 00:25:48,840 this coming out socket here is there 625 00:25:48,840 --> 00:25:51,600 timeouts whenever I go there let's go to 626 00:25:51,600 --> 00:25:53,039 Google again 627 00:25:53,039 --> 00:25:56,039 right here let's go what's my IP and see 628 00:25:56,039 --> 00:25:57,960 if we get a different IP this time here 629 00:25:57,960 --> 00:26:00,179 we go detecting should get a different 630 00:26:00,179 --> 00:26:04,440 IP just give me a uh the IPv6 but not 631 00:26:04,440 --> 00:26:07,320 the ipv4 yeah yet at least 632 00:26:07,320 --> 00:26:09,480 well this would actually be best right 633 00:26:09,480 --> 00:26:12,419 if it's the ipv4 is not detected but it 634 00:26:12,419 --> 00:26:15,120 does have the IPv6 and still working on 635 00:26:15,120 --> 00:26:17,400 it and it still comes back with not 636 00:26:17,400 --> 00:26:19,620 detected so you could make the case that 637 00:26:19,620 --> 00:26:21,480 that's even better that's not detecting 638 00:26:21,480 --> 00:26:23,039 it but but I think it's basically the 639 00:26:23,039 --> 00:26:25,799 website is the problem in that 640 00:26:25,799 --> 00:26:29,640 um and that the IP address is not uh no 641 00:26:29,640 --> 00:26:31,559 okay so I'm going to go ahead and shut 642 00:26:31,559 --> 00:26:33,179 this down I'm going to go ahead and shut 643 00:26:33,179 --> 00:26:36,179 down our our proxy chains one of the 644 00:26:36,179 --> 00:26:38,700 other things that I wanted to show is 645 00:26:38,700 --> 00:26:42,299 that um there's actually a tool called a 646 00:26:42,299 --> 00:26:44,700 non-surf that you can install on your 647 00:26:44,700 --> 00:26:47,700 Cali that will automatically send all 648 00:26:47,700 --> 00:26:51,419 your traffic okay through Tor so let's 649 00:26:51,419 --> 00:26:54,080 go there 650 00:26:54,659 --> 00:26:56,940 okay we've got it installed now all 651 00:26:56,940 --> 00:26:59,460 right so now we've got a directory 652 00:26:59,460 --> 00:27:01,980 called Kalyan on surf let's just take a 653 00:27:01,980 --> 00:27:04,740 look and see where it's at all right 654 00:27:04,740 --> 00:27:07,080 here's Cali and on surf right here 655 00:27:07,080 --> 00:27:10,700 let's go into that directory 656 00:27:17,940 --> 00:27:21,059 okay let's take a look inside there 657 00:27:21,059 --> 00:27:23,760 there's the installer and then we gotta 658 00:27:23,760 --> 00:27:26,940 run sudo 659 00:27:28,880 --> 00:27:32,360 installer sh 660 00:27:34,640 --> 00:27:37,559 gives me a ears while processing and see 661 00:27:37,559 --> 00:27:40,559 if we can get it to run okay go pseudo 662 00:27:40,559 --> 00:27:42,659 and then 663 00:27:42,659 --> 00:27:44,820 surf 664 00:27:44,820 --> 00:27:47,480 start 665 00:27:48,059 --> 00:27:51,000 there it is we're running that surf okay 666 00:27:51,000 --> 00:27:52,559 you can see it's killing dangerous 667 00:27:52,559 --> 00:27:54,659 applications cleaning some dangerous 668 00:27:54,659 --> 00:27:57,240 cash elements stopping IPv6 starting 669 00:27:57,240 --> 00:28:00,000 Anonymous mode saving IP tables rules 670 00:28:00,000 --> 00:28:03,000 modified resolve dot confuse tour and 671 00:28:03,000 --> 00:28:05,700 private internet access DNS all traffic 672 00:28:05,700 --> 00:28:08,100 was redirected through Tor and you're 673 00:28:08,100 --> 00:28:11,100 under an non-served tunnel so now what 674 00:28:11,100 --> 00:28:13,620 happens is that everything you do on 675 00:28:13,620 --> 00:28:15,900 this operating system is going to go 676 00:28:15,900 --> 00:28:17,760 through the Torah Network it's going to 677 00:28:17,760 --> 00:28:19,080 be a little bit slower but it's going to 678 00:28:19,080 --> 00:28:24,200 give you better anonymity than it would 679 00:28:24,200 --> 00:28:27,059 otherwise so your IP address is going to 680 00:28:27,059 --> 00:28:29,520 be hidden except for the from the person 681 00:28:29,520 --> 00:28:31,620 who has the exit node on the Torah 682 00:28:31,620 --> 00:28:32,820 Network 683 00:28:32,820 --> 00:28:34,320 um and hope and hopefully that's not the 684 00:28:34,320 --> 00:28:36,779 NSA or the law enforcement so a couple 685 00:28:36,779 --> 00:28:38,159 of the things that we want to talk about 686 00:28:38,159 --> 00:28:41,159 we talked about using you know a browser 687 00:28:41,159 --> 00:28:44,159 like Brave okay that's not and not uh 688 00:28:44,159 --> 00:28:46,440 collecting cookies along cookies on your 689 00:28:46,440 --> 00:28:48,000 browser one of the things that people 690 00:28:48,000 --> 00:28:51,179 often ask me about is what's the safest 691 00:28:51,179 --> 00:28:53,940 operating system and there's a number of 692 00:28:53,940 --> 00:28:56,340 them that are out there that you know 693 00:28:56,340 --> 00:28:58,620 all of them all of them pretty much are 694 00:28:58,620 --> 00:29:02,159 using the Tor Network to make you more 695 00:29:02,159 --> 00:29:05,820 secure I found that using Kali using the 696 00:29:05,820 --> 00:29:08,039 announcer is actually works pretty good 697 00:29:08,039 --> 00:29:10,080 pushing everything through the Torah 698 00:29:10,080 --> 00:29:11,820 Network the other issues that people 699 00:29:11,820 --> 00:29:14,700 often ask me about is how about using a 700 00:29:14,700 --> 00:29:17,520 phone isn't a phone a major 701 00:29:17,520 --> 00:29:20,820 vulnerability trying to whether it be 702 00:29:20,820 --> 00:29:23,100 Android or Apple because both of them 703 00:29:23,100 --> 00:29:26,279 can be hacked by Pegasus right and so 704 00:29:26,279 --> 00:29:27,840 one of the things about your phone is 705 00:29:27,840 --> 00:29:30,960 that you probably don't want to use your 706 00:29:30,960 --> 00:29:32,700 actual phone whenever you're doing 707 00:29:32,700 --> 00:29:34,860 anything that where you want to remain 708 00:29:34,860 --> 00:29:37,980 anonymous because the data that's 709 00:29:37,980 --> 00:29:40,200 collected from your phone is all 710 00:29:40,200 --> 00:29:42,480 available to law enforcement they can 711 00:29:42,480 --> 00:29:45,539 trace your your geolocation they can see 712 00:29:45,539 --> 00:29:47,940 your messages one of the things that I 713 00:29:47,940 --> 00:29:50,340 recommend is to go out and buy a burger 714 00:29:50,340 --> 00:29:52,620 phone a burger phone is simply a phone 715 00:29:52,620 --> 00:29:55,820 it could be a cheap phone if you go into 716 00:29:55,820 --> 00:29:58,140 some of the phone stores you can buy 717 00:29:58,140 --> 00:30:00,360 these phones that are inexpensive I 718 00:30:00,360 --> 00:30:01,740 think I've bought some of them as little 719 00:30:01,740 --> 00:30:04,620 as twenty dollars thirty dollars and put 720 00:30:04,620 --> 00:30:07,080 them on a pay-as-you-go contract where 721 00:30:07,080 --> 00:30:09,240 you pay cash for them and then that's 722 00:30:09,240 --> 00:30:11,460 really really difficult to trace there's 723 00:30:11,460 --> 00:30:14,520 no way to connect that phone to your 724 00:30:14,520 --> 00:30:16,980 identity and so then you can go ahead 725 00:30:16,980 --> 00:30:19,500 and make your calls and your messages 726 00:30:19,500 --> 00:30:21,659 from that phone one of the things you 727 00:30:21,659 --> 00:30:23,820 want to keep in mind though is that when 728 00:30:23,820 --> 00:30:26,940 you go to buy that phone that you're not 729 00:30:26,940 --> 00:30:29,760 traveling with that your other phone in 730 00:30:29,760 --> 00:30:33,779 your pocket because you're you can be 731 00:30:33,779 --> 00:30:37,500 then traced to the purchase of that 732 00:30:37,500 --> 00:30:39,059 phone okay because every one of your 733 00:30:39,059 --> 00:30:42,059 steps is being followed whenever you're 734 00:30:42,059 --> 00:30:44,120 traveling with your phone there's always 735 00:30:44,120 --> 00:30:46,080 geolocation that's available because 736 00:30:46,080 --> 00:30:47,760 your phone is connecting to the cell 737 00:30:47,760 --> 00:30:49,799 phone phone towers and from the cell 738 00:30:49,799 --> 00:30:51,659 phone towers they have to get your 739 00:30:51,659 --> 00:30:54,539 location now it's not as precise as GPS 740 00:30:54,539 --> 00:30:56,580 but it's still they can tell if you're 741 00:30:56,580 --> 00:30:59,580 going into a store to buy the phone they 742 00:30:59,580 --> 00:31:02,460 can trace you that close so don't take 743 00:31:02,460 --> 00:31:04,860 your phone with you all right go buy 744 00:31:04,860 --> 00:31:06,899 your burner phone use your burner phone 745 00:31:06,899 --> 00:31:08,340 for anything you want to remain 746 00:31:08,340 --> 00:31:11,580 anonymous do not do any of the same 747 00:31:11,580 --> 00:31:15,240 things on your usual phone your normal 748 00:31:15,240 --> 00:31:18,059 phone as you would do on your burner 749 00:31:18,059 --> 00:31:20,279 phone do not go to the same websites 750 00:31:20,279 --> 00:31:23,279 don't go use the same browsers and so 751 00:31:23,279 --> 00:31:25,919 that's kind of the rules of thumb for 752 00:31:25,919 --> 00:31:28,799 using a burger film ultimately if you 753 00:31:28,799 --> 00:31:31,620 really want to remain anonymous I 754 00:31:31,620 --> 00:31:35,100 recommend using two separate systems 755 00:31:35,100 --> 00:31:38,100 this is if you can afford it this is 756 00:31:38,100 --> 00:31:40,200 probably the best way to go of course 757 00:31:40,200 --> 00:31:42,299 you know you could have two separate 758 00:31:42,299 --> 00:31:45,419 internet services all right or you know 759 00:31:45,419 --> 00:31:47,340 you can hack your neighbor's Wi-Fi you 760 00:31:47,340 --> 00:31:49,799 can use their that service I'm not 761 00:31:49,799 --> 00:31:50,880 recommending that you do that but 762 00:31:50,880 --> 00:31:53,580 someone else I would never recommend 763 00:31:53,580 --> 00:31:55,559 that I'll never recommend that no 764 00:31:55,559 --> 00:31:57,720 and then you could use somebody else's 765 00:31:57,720 --> 00:32:00,299 IP address maybe but keeping your 766 00:32:00,299 --> 00:32:01,980 activities separate in two separate 767 00:32:01,980 --> 00:32:04,980 systems is going to be one of the safest 768 00:32:04,980 --> 00:32:06,419 things that you can do because you're 769 00:32:06,419 --> 00:32:08,100 using a different browser you're using 770 00:32:08,100 --> 00:32:10,740 different uh operating system you're 771 00:32:10,740 --> 00:32:12,779 using a different IP address so they 772 00:32:12,779 --> 00:32:15,179 can't be connected back to you one of 773 00:32:15,179 --> 00:32:17,220 the things I also do is that I create 774 00:32:17,220 --> 00:32:20,279 false profiles I I put false information 775 00:32:20,279 --> 00:32:22,679 out on the internet so that that 776 00:32:22,679 --> 00:32:24,840 information doesn't need back to me 777 00:32:24,840 --> 00:32:26,580 people try to connect that information 778 00:32:26,580 --> 00:32:29,700 to the lead but it really is false 779 00:32:29,700 --> 00:32:31,799 information that's going to be you know 780 00:32:31,799 --> 00:32:33,840 there's breadcrumbs out there somebody's 781 00:32:33,840 --> 00:32:34,980 going to follow and it's going to take 782 00:32:34,980 --> 00:32:36,720 them to the wrong place and if they 783 00:32:36,720 --> 00:32:38,399 follow all the bread comes it's going to 784 00:32:38,399 --> 00:32:40,320 take them to separate identities this is 785 00:32:40,320 --> 00:32:42,899 the kind of work that you need to do to 786 00:32:42,899 --> 00:32:46,080 truly remain anonymous because there's 787 00:32:46,080 --> 00:32:48,240 an awful lot of information that's out 788 00:32:48,240 --> 00:32:51,299 there about you from OS in sources from 789 00:32:51,299 --> 00:32:54,179 your cookies from your IP address and to 790 00:32:54,179 --> 00:32:56,039 really remain anonymous it's like a a 791 00:32:56,039 --> 00:32:58,260 full-time job you have to think about 792 00:32:58,260 --> 00:33:00,840 everything that you do on the internet 793 00:33:00,840 --> 00:33:03,720 and whether or not it's going to leave a 794 00:33:03,720 --> 00:33:06,779 trace back to you is it safe for me to 795 00:33:06,779 --> 00:33:08,940 use an ISP or or should are there 796 00:33:08,940 --> 00:33:10,380 certain isps that you recommend I think 797 00:33:10,380 --> 00:33:11,700 starlink was one that we've kind of 798 00:33:11,700 --> 00:33:13,260 mentioned in the past well I use 799 00:33:13,260 --> 00:33:15,179 starlink and I use starlink primarily 800 00:33:15,179 --> 00:33:18,419 because they their IP addresses are not 801 00:33:18,419 --> 00:33:21,000 geo-located right so if you go and 802 00:33:21,000 --> 00:33:22,799 somebody looks at your IP address all 803 00:33:22,799 --> 00:33:23,880 it's going to do is it's going to take 804 00:33:23,880 --> 00:33:26,159 them to a regional office of starting so 805 00:33:26,159 --> 00:33:28,740 I find Starlight to be just create one 806 00:33:28,740 --> 00:33:33,059 more level of anonymity into your 807 00:33:33,059 --> 00:33:35,100 traffic on the internet it just all it's 808 00:33:35,100 --> 00:33:37,140 going to do is going to say hey it's a 809 00:33:37,140 --> 00:33:39,179 starlink IP address now if starting 810 00:33:39,179 --> 00:33:41,340 wants to give up your identity then 811 00:33:41,340 --> 00:33:43,200 that's a different thing or a starting 812 00:33:43,200 --> 00:33:46,519 gets hacked then your identity can be 813 00:33:46,519 --> 00:33:50,779 resolved from that but most isps 814 00:33:50,779 --> 00:33:53,580 distribute IP addresses by location 815 00:33:53,580 --> 00:33:56,279 right so somebody can find out what City 816 00:33:56,279 --> 00:33:58,620 you're in not with 100 accuracy but 817 00:33:58,620 --> 00:34:00,240 pretty close to it what city you're in 818 00:34:00,240 --> 00:34:02,279 simply buy your IP address knowing 819 00:34:02,279 --> 00:34:05,760 there's there is these databases of IP 820 00:34:05,760 --> 00:34:07,980 addresses and cities so so I would say 821 00:34:07,980 --> 00:34:10,859 to create one more level of anonymity I 822 00:34:10,859 --> 00:34:13,440 like starlink and then run starlink say 823 00:34:13,440 --> 00:34:18,060 through proxies or vpns or Tor so a 824 00:34:18,060 --> 00:34:19,560 great thing about stalling is you can 825 00:34:19,560 --> 00:34:21,720 often buy this mobile solution can't you 826 00:34:21,720 --> 00:34:23,280 so you could drive around and you know 827 00:34:23,280 --> 00:34:25,139 you doesn't matter where you are you 828 00:34:25,139 --> 00:34:26,580 could take it with you and then you 829 00:34:26,580 --> 00:34:28,080 could access the internet from different 830 00:34:28,080 --> 00:34:30,659 physical locations but I like what you 831 00:34:30,659 --> 00:34:32,580 said there because if I use internet at 832 00:34:32,580 --> 00:34:34,320 my house as an example and it's a fiber 833 00:34:34,320 --> 00:34:35,940 link or something like that I mean it's 834 00:34:35,940 --> 00:34:37,679 tied directly to my my house it's very 835 00:34:37,679 --> 00:34:39,540 easy to find me right but exactly I 836 00:34:39,540 --> 00:34:41,580 could be anywhere starlink allows you to 837 00:34:41,580 --> 00:34:44,220 be mobile they charge an extra 25 a 838 00:34:44,220 --> 00:34:46,399 month that gives you mobile and so the 839 00:34:46,399 --> 00:34:49,139 Satellite Dish can move around it 840 00:34:49,139 --> 00:34:51,359 automatically unlike some of the old 841 00:34:51,359 --> 00:34:53,399 satellite technology where you were 842 00:34:53,399 --> 00:34:56,099 fixed on a single satellite in in 843 00:34:56,099 --> 00:34:57,839 starting they have thousands of 844 00:34:57,839 --> 00:35:00,480 satellites and the dish is smart enough 845 00:35:00,480 --> 00:35:03,599 to find the closest satellite so as 846 00:35:03,599 --> 00:35:06,300 you're moving it goes and finds the note 847 00:35:06,300 --> 00:35:09,480 the closest satellite to you makes it 848 00:35:09,480 --> 00:35:12,240 much harder to be able to geo-locate you 849 00:35:12,240 --> 00:35:13,619 when you're using Starbucks I mean 850 00:35:13,619 --> 00:35:15,359 that's at least like I'm trying to think 851 00:35:15,359 --> 00:35:17,940 in layers okay so how do I get to the 852 00:35:17,940 --> 00:35:19,380 internet I could use stalling I could 853 00:35:19,380 --> 00:35:21,000 for instance go to McDonald's or 854 00:35:21,000 --> 00:35:22,200 somewhere else and get onto the internet 855 00:35:22,200 --> 00:35:24,300 that way but then I've got to all sort 856 00:35:24,300 --> 00:35:26,400 and look cold train station or somewhere 857 00:35:26,400 --> 00:35:27,839 you know get onto the internet somewhere 858 00:35:27,839 --> 00:35:30,300 somehow at least with stalling I'm I've 859 00:35:30,300 --> 00:35:31,800 got something with me that I can take 860 00:35:31,800 --> 00:35:34,500 her on yes yeah you can if you're you 861 00:35:34,500 --> 00:35:36,500 can put it in your vehicle 862 00:35:36,500 --> 00:35:38,760 you know if you're if you're traveling 863 00:35:38,760 --> 00:35:41,640 you can take it with you and it will 864 00:35:41,640 --> 00:35:43,079 automatically connect and there's 865 00:35:43,079 --> 00:35:45,960 nothing there's no geolocation that's 866 00:35:45,960 --> 00:35:47,760 assigned to it although you know you 867 00:35:47,760 --> 00:35:50,280 have to pay for with a credit card so 868 00:35:50,280 --> 00:35:52,200 your name is still linked to that IP 869 00:35:52,200 --> 00:35:55,079 address if somebody gets inside of 870 00:35:55,079 --> 00:35:57,540 starlink or Starling gives up your 871 00:35:57,540 --> 00:36:00,180 information now to you know starlink is 872 00:36:00,180 --> 00:36:02,579 an American company as we all know owned 873 00:36:02,579 --> 00:36:04,800 by Elon Musk and Elon Musk wants to give 874 00:36:04,800 --> 00:36:07,260 up the information about you then you're 875 00:36:07,260 --> 00:36:09,359 still not Anonymous but at least it's 876 00:36:09,359 --> 00:36:11,220 one layer um it's one layer and that's 877 00:36:11,220 --> 00:36:12,420 what you think about you're right you 878 00:36:12,420 --> 00:36:14,760 gotta think about later layers right 879 00:36:14,760 --> 00:36:16,859 this is one layer that makes it just a 880 00:36:16,859 --> 00:36:18,540 little bit more difficult to identify 881 00:36:18,540 --> 00:36:20,460 you next one and this is always a 882 00:36:20,460 --> 00:36:22,079 question people have do I use a Windows 883 00:36:22,079 --> 00:36:24,660 computer do I use apple do I use Linux 884 00:36:24,660 --> 00:36:27,780 or you know Apple Windows seem to both 885 00:36:27,780 --> 00:36:30,240 have a lot of like data that they pull 886 00:36:30,240 --> 00:36:32,280 from your Telemetry data that they pull 887 00:36:32,280 --> 00:36:33,359 from you 888 00:36:33,359 --> 00:36:35,160 um a lot of people don't trust them so 889 00:36:35,160 --> 00:36:37,200 perhaps Linux is the best Well I 890 00:36:37,200 --> 00:36:40,079 obviously would recommend Linux one of 891 00:36:40,079 --> 00:36:43,079 the things that that both apple and 892 00:36:43,079 --> 00:36:46,680 Microsoft do is that they put in user 893 00:36:46,680 --> 00:36:50,579 IDs a guid into documents and so that if 894 00:36:50,579 --> 00:36:53,339 you if you're creating a document and 895 00:36:53,339 --> 00:36:55,020 you're just Distributing that document 896 00:36:55,020 --> 00:36:57,839 it could be true increased right back to 897 00:36:57,839 --> 00:37:00,000 your computer one of the things I 898 00:37:00,000 --> 00:37:03,119 recommend is do not use Microsoft Word 899 00:37:03,119 --> 00:37:06,060 or the whole Suite of Microsoft products 900 00:37:06,060 --> 00:37:08,820 because they'll pull the the globally 901 00:37:08,820 --> 00:37:11,040 unique ID off the machine and put it 902 00:37:11,040 --> 00:37:13,680 into the document this is where 903 00:37:13,680 --> 00:37:16,980 forensics becomes really critical so you 904 00:37:16,980 --> 00:37:18,480 know if you're a forensic investigator 905 00:37:18,480 --> 00:37:20,579 you know that you know that there's a 906 00:37:20,579 --> 00:37:23,880 globally unique ID on that word document 907 00:37:23,880 --> 00:37:26,160 so if you're trying to trace somebody 908 00:37:26,160 --> 00:37:28,140 you can pull that globally unique ID 909 00:37:28,140 --> 00:37:32,339 it's not going to have geolocation data 910 00:37:32,339 --> 00:37:35,280 in it but once your machines identified 911 00:37:35,280 --> 00:37:37,980 they can say that this document came 912 00:37:37,980 --> 00:37:40,260 from this machine is it safe enough to 913 00:37:40,260 --> 00:37:42,000 use a virtual machine or should I have a 914 00:37:42,000 --> 00:37:43,680 dedicated physical machine that runs 915 00:37:43,680 --> 00:37:45,960 Linux physical machine creates one more 916 00:37:45,960 --> 00:37:48,420 layer if you're going to run multiple 917 00:37:48,420 --> 00:37:50,940 machines I would recommend one one 918 00:37:50,940 --> 00:37:52,920 machine that you're doing stuff that you 919 00:37:52,920 --> 00:37:54,480 don't want to be traced on and one 920 00:37:54,480 --> 00:37:55,440 machine that you're doing everything 921 00:37:55,440 --> 00:37:57,599 thing else if you can afford that if you 922 00:37:57,599 --> 00:38:00,000 can't afford that I would say run a 923 00:38:00,000 --> 00:38:02,940 Linux machine in a virtual machine such 924 00:38:02,940 --> 00:38:06,000 as virtualbox or VMware Workstation it's 925 00:38:06,000 --> 00:38:07,619 all about like cost versus what you're 926 00:38:07,619 --> 00:38:08,940 really trying to accomplish right so I 927 00:38:08,940 --> 00:38:11,040 mean if you really want to go hardcore 928 00:38:11,040 --> 00:38:12,480 you go to you've got to spend the money 929 00:38:12,480 --> 00:38:14,400 to to do something like that I would say 930 00:38:14,400 --> 00:38:16,380 yeah yeah if you want to really make 931 00:38:16,380 --> 00:38:18,180 sure that you're you're not going to be 932 00:38:18,180 --> 00:38:20,099 traced you want to go and spend a little 933 00:38:20,099 --> 00:38:22,260 bit of money possibly have two systems 934 00:38:22,260 --> 00:38:24,780 okay one of them that you're only doing 935 00:38:24,780 --> 00:38:26,940 the work you're gonna have a separate 936 00:38:26,940 --> 00:38:29,460 identity for each machine right and you 937 00:38:29,460 --> 00:38:31,560 can create separate identities and not 938 00:38:31,560 --> 00:38:33,839 have them be connected in any way shape 939 00:38:33,839 --> 00:38:36,180 or form so like we mentioned stalling so 940 00:38:36,180 --> 00:38:37,500 as an example I could have like an 941 00:38:37,500 --> 00:38:39,420 internet connection at home that's my 942 00:38:39,420 --> 00:38:40,980 normal internet let's say fiber whatever 943 00:38:40,980 --> 00:38:42,780 and then I have a starlink which I do 944 00:38:42,780 --> 00:38:45,599 all my Anonymous stuff on and then I 945 00:38:45,599 --> 00:38:47,220 have like a Linux machine that I use for 946 00:38:47,220 --> 00:38:48,480 my Anonymous stuff and then perhaps 947 00:38:48,480 --> 00:38:50,160 whatever operating system I like for my 948 00:38:50,160 --> 00:38:52,680 normal stuff what about phones because 949 00:38:52,680 --> 00:38:55,380 like um they all seem to be you know to 950 00:38:55,380 --> 00:38:57,660 choose the worst type it's like is it 951 00:38:57,660 --> 00:38:59,460 iOS is it Android or do I have to go and 952 00:38:59,460 --> 00:39:00,780 use graphene or something like that 953 00:39:00,780 --> 00:39:02,700 that's a good question 954 00:39:02,700 --> 00:39:04,619 um basically the most important thing I 955 00:39:04,619 --> 00:39:07,200 think is simply have a phone that isn't 956 00:39:07,200 --> 00:39:09,300 linked to any carrier right so any 957 00:39:09,300 --> 00:39:10,980 carrier in any credit card because once 958 00:39:10,980 --> 00:39:13,079 you've linked a credit card you pay for 959 00:39:13,079 --> 00:39:14,460 it by credit card or have a service 960 00:39:14,460 --> 00:39:16,460 through any one of the major carriers 961 00:39:16,460 --> 00:39:19,560 then you can be traced these burner 962 00:39:19,560 --> 00:39:21,660 phones that you can buy for cash you can 963 00:39:21,660 --> 00:39:23,460 pay for them with cash the service for 964 00:39:23,460 --> 00:39:25,800 cash the month-to-month the service uh 965 00:39:25,800 --> 00:39:28,140 with cash that's really the only way to 966 00:39:28,140 --> 00:39:30,359 remain to make certain that you're going 967 00:39:30,359 --> 00:39:32,460 to remain anonymous and like I said they 968 00:39:32,460 --> 00:39:34,740 they should not be in the same location 969 00:39:34,740 --> 00:39:37,859 right at the same time right if if 970 00:39:37,859 --> 00:39:39,420 they're in the same location same time 971 00:39:39,420 --> 00:39:41,280 one of them has to be turned off because 972 00:39:41,280 --> 00:39:43,320 once they're in the same location then 973 00:39:43,320 --> 00:39:45,060 they can be tied together to your 974 00:39:45,060 --> 00:39:47,640 location and your identity so in other 975 00:39:47,640 --> 00:39:49,260 words graphene by itself wouldn't be 976 00:39:49,260 --> 00:39:51,240 enough you'd want to buy a Bono phone 977 00:39:51,240 --> 00:39:52,500 with cash or something because it's not 978 00:39:52,500 --> 00:39:53,760 the operating system that's a problem 979 00:39:53,760 --> 00:39:55,260 it's the fact that it can be traced to 980 00:39:55,260 --> 00:39:58,320 you right exactly exactly that's I agree 981 00:39:58,320 --> 00:40:01,079 it's I what I feel safest with is simply 982 00:40:01,079 --> 00:40:03,119 using a burner phone right that's what I 983 00:40:03,119 --> 00:40:05,520 feel confident that can't be traced and 984 00:40:05,520 --> 00:40:07,640 what about VPN versus Tor there's this 985 00:40:07,640 --> 00:40:10,560 always good argument on YouTube and you 986 00:40:10,560 --> 00:40:12,000 know on the internet and that's why it's 987 00:40:12,000 --> 00:40:13,859 great to get your opinion because you're 988 00:40:13,859 --> 00:40:15,300 well experiencing this should I use a 989 00:40:15,300 --> 00:40:19,200 VPN like XYZ VPN or should I use tool or 990 00:40:19,200 --> 00:40:21,300 should I use Tor over a VPN or you know 991 00:40:21,300 --> 00:40:23,099 what would you recommend it all depends 992 00:40:23,099 --> 00:40:25,320 upon you know how much protection that 993 00:40:25,320 --> 00:40:28,020 you want VPN for the average individual 994 00:40:28,020 --> 00:40:30,119 who's trying to protect themselves from 995 00:40:30,119 --> 00:40:32,820 Commercial Services VPN generally are 996 00:40:32,820 --> 00:40:34,079 going to be pretty good but remember 997 00:40:34,079 --> 00:40:36,300 that you're putting your hands you're 998 00:40:36,300 --> 00:40:38,520 putting your life maybe into the hands 999 00:40:38,520 --> 00:40:42,119 of the VPN developer they have all of 1000 00:40:42,119 --> 00:40:44,339 your information if they get hacked 1001 00:40:44,339 --> 00:40:46,800 right and they do get hacked then all of 1002 00:40:46,800 --> 00:40:48,480 your information is available so that's 1003 00:40:48,480 --> 00:40:50,520 a trust that you have to place in them 1004 00:40:50,520 --> 00:40:52,859 so for the average user a VPN is going 1005 00:40:52,859 --> 00:40:55,079 to be fine if you're working in cyber 1006 00:40:55,079 --> 00:40:57,599 War Warfare where your life is dependent 1007 00:40:57,599 --> 00:41:00,240 upon the remaining Anonymous that may 1008 00:41:00,240 --> 00:41:02,280 not be adequate in that case that a 1009 00:41:02,280 --> 00:41:04,320 cyber warfare environment where your 1010 00:41:04,320 --> 00:41:06,900 life isn't in is dependent upon 1011 00:41:06,900 --> 00:41:09,119 remaining Anonymous I would prefer 1012 00:41:09,119 --> 00:41:12,599 either proxies or the Tor Network 1013 00:41:12,599 --> 00:41:15,599 proxies can pose a an additional problem 1014 00:41:15,599 --> 00:41:17,880 once again that they can be hacked as 1015 00:41:17,880 --> 00:41:20,640 well I would never trust a free proxy 1016 00:41:20,640 --> 00:41:23,160 right because why would somebody put up 1017 00:41:23,160 --> 00:41:25,140 a free proxy why would somebody put out 1018 00:41:25,140 --> 00:41:29,540 [Laughter] 1019 00:41:29,540 --> 00:41:33,119 or it's a GRU or whoever so remember 1020 00:41:33,119 --> 00:41:35,220 that the NSA the gru all the 1021 00:41:35,220 --> 00:41:37,079 intelligence agencies one of the things 1022 00:41:37,079 --> 00:41:39,240 that they want to know is everybody's 1023 00:41:39,240 --> 00:41:41,880 identity they know that people use 1024 00:41:41,880 --> 00:41:45,960 proxies so their job is to figure out 1025 00:41:45,960 --> 00:41:48,480 who you are and what you're doing if you 1026 00:41:48,480 --> 00:41:50,640 were them and your job was to find that 1027 00:41:50,640 --> 00:41:52,859 out wouldn't you put up free proxies 1028 00:41:52,859 --> 00:41:55,740 here connect to our free proxy and of 1029 00:41:55,740 --> 00:41:57,900 course we keep no logs and of course 1030 00:41:57,900 --> 00:42:00,000 that's what they advertise and that way 1031 00:42:00,000 --> 00:42:01,980 they can at least get some of the 1032 00:42:01,980 --> 00:42:04,320 traffic going through their proxies it 1033 00:42:04,320 --> 00:42:06,720 doesn't make any money so they have no 1034 00:42:06,720 --> 00:42:09,119 business model to if there's no 1035 00:42:09,119 --> 00:42:11,280 legitimate business model to keep them 1036 00:42:11,280 --> 00:42:13,500 safe if somebody's putting up a free 1037 00:42:13,500 --> 00:42:16,079 proxy there's no legitimate business 1038 00:42:16,079 --> 00:42:18,359 interest to keeping you safe as a matter 1039 00:42:18,359 --> 00:42:20,160 of fact there's an interest in keeping 1040 00:42:20,160 --> 00:42:23,099 you unsafe and selling your data so I 1041 00:42:23,099 --> 00:42:24,720 recommend if you're going to use a proxy 1042 00:42:24,720 --> 00:42:27,180 use a commercial proxy where you're are 1043 00:42:27,180 --> 00:42:29,640 paying somebody to keep you safe so 1044 00:42:29,640 --> 00:42:31,079 let's take you to the extreme I mean 1045 00:42:31,079 --> 00:42:33,240 let's say you want to your life depends 1046 00:42:33,240 --> 00:42:34,859 on it you're a journalist or someone 1047 00:42:34,859 --> 00:42:36,119 who's involved in cyber warfare 1048 00:42:36,119 --> 00:42:37,740 something like that you really want to 1049 00:42:37,740 --> 00:42:40,020 keep yourself safe so if I've if I 1050 00:42:40,020 --> 00:42:40,920 understand correctly you're going to 1051 00:42:40,920 --> 00:42:43,140 have two infrastructures one for like 1052 00:42:43,140 --> 00:42:45,359 normal and then one for 1053 00:42:45,359 --> 00:42:47,400 um Anonymous stuff so starlink or 1054 00:42:47,400 --> 00:42:49,020 whatever it is separate infrastructure 1055 00:42:49,020 --> 00:42:51,240 separate laptops separate phones Bono 1056 00:42:51,240 --> 00:42:52,800 phones you're gonna buy that with cash 1057 00:42:52,800 --> 00:42:55,859 if you can you're going to use 1058 00:42:55,859 --> 00:42:57,900 um proxy chains or you're going to use 1059 00:42:57,900 --> 00:42:59,819 tall or something like that is that 1060 00:42:59,819 --> 00:43:01,319 right anything else that I've missed no 1061 00:43:01,319 --> 00:43:03,060 I think that that pretty much covers 1062 00:43:03,060 --> 00:43:04,680 them I just want to make sure that when 1063 00:43:04,680 --> 00:43:06,599 you're using those two separate systems 1064 00:43:06,599 --> 00:43:09,420 that they do not intersect the the sites 1065 00:43:09,420 --> 00:43:11,579 that you visit the things that you do 1066 00:43:11,579 --> 00:43:14,099 the information that you provide do not 1067 00:43:14,099 --> 00:43:16,619 intersect because that intersection can 1068 00:43:16,619 --> 00:43:19,680 be detected by people who are trying to 1069 00:43:19,680 --> 00:43:21,480 determine your identity do I need 1070 00:43:21,480 --> 00:43:23,220 separate homes or separate locations 1071 00:43:23,220 --> 00:43:25,319 like like you said the phone I mean I'm 1072 00:43:25,319 --> 00:43:26,460 just trying to think like you said don't 1073 00:43:26,460 --> 00:43:28,740 and put the two phones together right so 1074 00:43:28,740 --> 00:43:30,119 I'm gonna have to put that don't put the 1075 00:43:30,119 --> 00:43:33,960 don't put two phones together ah okay I 1076 00:43:33,960 --> 00:43:35,880 mean you could put one of them in a 1077 00:43:35,880 --> 00:43:38,040 faraday cage okay just so that the 1078 00:43:38,040 --> 00:43:40,319 location doesn't show the geolocation 1079 00:43:40,319 --> 00:43:42,480 Services don't show them being in the 1080 00:43:42,480 --> 00:43:44,220 same location because once you've 1081 00:43:44,220 --> 00:43:46,260 revealed that so for instance if you 1082 00:43:46,260 --> 00:43:48,060 have an Apple phone and you've got a 1083 00:43:48,060 --> 00:43:49,619 burner phone and they're both sitting in 1084 00:43:49,619 --> 00:43:51,540 your office and they're both on right 1085 00:43:51,540 --> 00:43:53,819 they're both showing that they're in the 1086 00:43:53,819 --> 00:43:56,099 same location you've subtly given away 1087 00:43:56,099 --> 00:43:59,339 your identity as the person who owns the 1088 00:43:59,339 --> 00:44:02,040 iPhone right that burner phone has been 1089 00:44:02,040 --> 00:44:04,800 now been linked to that iPhone so you 1090 00:44:04,800 --> 00:44:06,660 put the burner phone in the Faraday cage 1091 00:44:06,660 --> 00:44:08,640 or you leave it somewhere else and you 1092 00:44:08,640 --> 00:44:10,740 don't bring it to your home where you do 1093 00:44:10,740 --> 00:44:12,300 your normal stuff or you just turn it 1094 00:44:12,300 --> 00:44:13,920 off what I really appreciate about 1095 00:44:13,920 --> 00:44:15,180 occupy the web for everyone who's 1096 00:44:15,180 --> 00:44:16,560 watching is he doesn't it's not 1097 00:44:16,560 --> 00:44:18,839 sensationalist nonsense he's giving you 1098 00:44:18,839 --> 00:44:21,240 the you know really good information so 1099 00:44:21,240 --> 00:44:23,040 okay by the web thanks for doing that of 1100 00:44:23,040 --> 00:44:25,500 course anytime David So occupy the web 1101 00:44:25,500 --> 00:44:26,400 another one we didn't touch on this 1102 00:44:26,400 --> 00:44:29,040 email do you have any email providers 1103 00:44:29,040 --> 00:44:30,780 that you could recommend for secure 1104 00:44:30,780 --> 00:44:32,160 email because email seems to be one of 1105 00:44:32,160 --> 00:44:33,599 those things that's it's easy to find 1106 00:44:33,599 --> 00:44:36,540 people yes email can easily be traced 1107 00:44:36,540 --> 00:44:39,180 and so one of the things that I like and 1108 00:44:39,180 --> 00:44:41,760 those people who have worked with me and 1109 00:44:41,760 --> 00:44:43,980 been my students or in some way 1110 00:44:43,980 --> 00:44:46,319 Associated know that I use protonmail 1111 00:44:46,319 --> 00:44:49,260 protonmail is the only one that I feel 1112 00:44:49,260 --> 00:44:51,420 comfortable with they are based out of 1113 00:44:51,420 --> 00:44:53,940 Switzerland it's end-to-end encryption 1114 00:44:53,940 --> 00:44:55,859 you might ask yourself well what 1115 00:44:55,859 --> 00:44:57,240 difference does it make that they're in 1116 00:44:57,240 --> 00:44:59,579 Switzerland well Swiss the Swiss have 1117 00:44:59,579 --> 00:45:03,180 particular laws that protect people's 1118 00:45:03,180 --> 00:45:07,319 privacy more than even the EU does or 1119 00:45:07,319 --> 00:45:08,940 certainly the US does because the US 1120 00:45:08,940 --> 00:45:10,680 doesn't really have any good privacy 1121 00:45:10,680 --> 00:45:13,319 laws at all Switzerland has long had the 1122 00:45:13,319 --> 00:45:15,599 history that's why there are these Swiss 1123 00:45:15,599 --> 00:45:17,220 bank accounts right because the Swiss 1124 00:45:17,220 --> 00:45:19,440 have special laws of protecting people's 1125 00:45:19,440 --> 00:45:21,839 privacy even if you have end-to-end 1126 00:45:21,839 --> 00:45:24,240 encryption and the encryption in a 1127 00:45:24,240 --> 00:45:27,660 service then if the servers get 1128 00:45:27,660 --> 00:45:30,660 compromised or law enforcement shows up 1129 00:45:30,660 --> 00:45:32,040 that's often what happens law 1130 00:45:32,040 --> 00:45:33,839 enforcement shows up and says we think 1131 00:45:33,839 --> 00:45:36,119 that you know we need to have the data 1132 00:45:36,119 --> 00:45:38,040 from your servers that's how can that's 1133 00:45:38,040 --> 00:45:41,099 less likely to happen in Switzerland 1134 00:45:41,099 --> 00:45:42,780 than it is in other countries it's 1135 00:45:42,780 --> 00:45:44,760 happened in the U.S it's happened in 1136 00:45:44,760 --> 00:45:46,859 Germany it's happened in Australia where 1137 00:45:46,859 --> 00:45:49,500 law enforcement shows up and wants the 1138 00:45:49,500 --> 00:45:52,079 once the records Canada where law 1139 00:45:52,079 --> 00:45:53,640 enforcement shows we want the records 1140 00:45:53,640 --> 00:45:56,579 and therefore that all of your email and 1141 00:45:56,579 --> 00:45:58,980 all of your communication is then 1142 00:45:58,980 --> 00:46:02,460 compromised Switzerland has laws that 1143 00:46:02,460 --> 00:46:04,980 protect privacy that's more strict than 1144 00:46:04,980 --> 00:46:08,099 other nations do and proton male I've 1145 00:46:08,099 --> 00:46:09,900 been using them for I don't know almost 1146 00:46:09,900 --> 00:46:11,880 I actually got one of the beta Accounts 1147 00:46:11,880 --> 00:46:14,220 at protonmail when they first opened up 1148 00:46:14,220 --> 00:46:16,980 you had to actually ask for an account 1149 00:46:16,980 --> 00:46:18,660 um and you had to wait like three or 1150 00:46:18,660 --> 00:46:20,579 four months to get an account so I've 1151 00:46:20,579 --> 00:46:22,619 been with them a long time and I have a 1152 00:46:22,619 --> 00:46:24,780 lot of confidence that that they're 1153 00:46:24,780 --> 00:46:26,400 going they're going to do as good a job 1154 00:46:26,400 --> 00:46:29,700 as possible to protect my information uh 1155 00:46:29,700 --> 00:46:31,200 there's a number of others that are out 1156 00:46:31,200 --> 00:46:32,819 there as well including male fans 1157 00:46:32,819 --> 00:46:35,400 private mail a non-atti Google mail 1158 00:46:35,400 --> 00:46:37,920 secure mail what have you uh those are 1159 00:46:37,920 --> 00:46:40,619 all out there as well as far as secure 1160 00:46:40,619 --> 00:46:43,140 operating systems some of the hardened 1161 00:46:43,140 --> 00:46:46,380 operating systems and cubes sub graph 1162 00:46:46,380 --> 00:46:50,400 hardened BSD are all good choices you 1163 00:46:50,400 --> 00:46:52,560 want to hardened and safe and secure 1164 00:46:52,560 --> 00:46:54,599 operating system one of the things I do 1165 00:46:54,599 --> 00:46:57,060 want to mention before we finish here 1166 00:46:57,060 --> 00:46:59,339 and that is that a lot of people believe 1167 00:46:59,339 --> 00:47:01,500 that making trans transactions in 1168 00:47:01,500 --> 00:47:05,099 Bitcoin is untraceable and that's not 1169 00:47:05,099 --> 00:47:07,319 true all right as a matter of fact I 1170 00:47:07,319 --> 00:47:09,359 have a class coming up I think it's in 1171 00:47:09,359 --> 00:47:12,060 December on how to trace Bitcoin if 1172 00:47:12,060 --> 00:47:14,280 you're trying to remain anonymous and 1173 00:47:14,280 --> 00:47:17,040 you're using Bitcoin Bitcoin is 1174 00:47:17,040 --> 00:47:19,319 traceable it's not easy to trace but it 1175 00:47:19,319 --> 00:47:21,300 can be traced so it's not going to 1176 00:47:21,300 --> 00:47:23,220 maintain your anonymity but also 1177 00:47:23,220 --> 00:47:26,220 remember that maintaining anonymity is a 1178 00:47:26,220 --> 00:47:27,839 matter of throwing up a lot of 1179 00:47:27,839 --> 00:47:30,000 roadblocks to the people trying to trace 1180 00:47:30,000 --> 00:47:31,980 you so the more roadblocks that you can 1181 00:47:31,980 --> 00:47:34,260 put up then the harder it is situation 1182 00:47:34,260 --> 00:47:37,560 but Bitcoin a lot of people believe that 1183 00:47:37,560 --> 00:47:38,880 they can simply purchase them with 1184 00:47:38,880 --> 00:47:41,760 Bitcoin and be safe now some of the 1185 00:47:41,760 --> 00:47:42,619 other 1186 00:47:42,619 --> 00:47:45,180 cryptocurrencies have better anonymity 1187 00:47:45,180 --> 00:47:47,579 that Bitcoin does so and that's one of 1188 00:47:47,579 --> 00:47:48,540 the things that I think we're going to 1189 00:47:48,540 --> 00:47:50,220 talk about in the future that'd be great 1190 00:47:50,220 --> 00:47:52,500 I could do a video on that and everyone 1191 00:47:52,500 --> 00:47:53,640 is watching please put in the comments 1192 00:47:53,640 --> 00:47:55,440 below would you like to see a video on 1193 00:47:55,440 --> 00:47:57,660 occupy the web showing us how to trace 1194 00:47:57,660 --> 00:47:59,700 Bitcoin transactions one other thing we 1195 00:47:59,700 --> 00:48:02,579 want to talk about is anti-forensics I 1196 00:48:02,579 --> 00:48:04,380 have a class coming up this summer on 1197 00:48:04,380 --> 00:48:06,420 anti-forensics first of all I recommend 1198 00:48:06,420 --> 00:48:08,040 that you want to remain anonymous that 1199 00:48:08,040 --> 00:48:10,920 you study forensics and Os in but after 1200 00:48:10,920 --> 00:48:13,619 you've studied it then you have to focus 1201 00:48:13,619 --> 00:48:17,220 on how can I keep the information off my 1202 00:48:17,220 --> 00:48:19,800 machine this includes cleaning off any 1203 00:48:19,800 --> 00:48:22,800 files off your system as we know that if 1204 00:48:22,800 --> 00:48:25,319 you delete a file out of your system it 1205 00:48:25,319 --> 00:48:28,020 still is there so you have to overwrite 1206 00:48:28,020 --> 00:48:30,839 files on your system and then of course 1207 00:48:30,839 --> 00:48:32,880 you want to clean your bash history or 1208 00:48:32,880 --> 00:48:34,859 wherever you're entering your commands 1209 00:48:34,859 --> 00:48:36,960 what would you say to people who say 1210 00:48:36,960 --> 00:48:39,060 that the only way to do operating 1211 00:48:39,060 --> 00:48:41,640 systems is to run it in Ram so you boot 1212 00:48:41,640 --> 00:48:43,920 off a USB or something and it's all in 1213 00:48:43,920 --> 00:48:45,960 Ram and then when you finish you pull 1214 00:48:45,960 --> 00:48:47,640 that out and it's all gone well I think 1215 00:48:47,640 --> 00:48:49,980 that's a really good idea that's that's 1216 00:48:49,980 --> 00:48:52,020 certainly an option is to Simply run 1217 00:48:52,020 --> 00:48:54,119 your operating system all in Ram say off 1218 00:48:54,119 --> 00:48:57,000 a flash drive and then once you've taken 1219 00:48:57,000 --> 00:48:59,880 the flash drive off it means is gone I 1220 00:48:59,880 --> 00:49:03,359 mean it is still possible but if you 1221 00:49:03,359 --> 00:49:05,760 reboot the system everything is gone and 1222 00:49:05,760 --> 00:49:07,859 nearly everything's gone from Ram okay 1223 00:49:07,859 --> 00:49:10,920 there's still forensic investigators can 1224 00:49:10,920 --> 00:49:12,300 still pull 1225 00:49:12,300 --> 00:49:15,480 some information from Ram even after 1226 00:49:15,480 --> 00:49:17,700 you've rebooted the system remember also 1227 00:49:17,700 --> 00:49:21,359 that operating systems when the ram is 1228 00:49:21,359 --> 00:49:23,579 full it begins to write to the hard 1229 00:49:23,579 --> 00:49:26,880 drive right there's swap files so the 1230 00:49:26,880 --> 00:49:29,099 strategy is good one but it's not a 1231 00:49:29,099 --> 00:49:31,800 hundred percent that's my point none of 1232 00:49:31,800 --> 00:49:34,020 these strategies is 100 but if you put 1233 00:49:34,020 --> 00:49:36,359 up enough of these on anonymity 1234 00:49:36,359 --> 00:49:38,700 strategies the safer you're going to be 1235 00:49:38,700 --> 00:49:40,619 we spoke about like buying a separate 1236 00:49:40,619 --> 00:49:42,599 laptop or something for running Linux on 1237 00:49:42,599 --> 00:49:45,119 but you could perhaps boot into RAM on 1238 00:49:45,119 --> 00:49:46,980 that laptop if you just want to you go 1239 00:49:46,980 --> 00:49:48,240 to the next level so it's just like 1240 00:49:48,240 --> 00:49:50,099 layers and layers and layers of right 1241 00:49:50,099 --> 00:49:52,740 anonymity right yeah the more layers you 1242 00:49:52,740 --> 00:49:56,160 put in okay the safer you are my thing 1243 00:49:56,160 --> 00:49:58,500 that I emphasize to nearly everybody is 1244 00:49:58,500 --> 00:50:01,619 that if somebody with enough skills and 1245 00:50:01,619 --> 00:50:03,900 enough knowledge and enough resources 1246 00:50:03,900 --> 00:50:06,359 wants to find you they can't but it's 1247 00:50:06,359 --> 00:50:08,760 that's key enough resources enough time 1248 00:50:08,760 --> 00:50:11,640 and enough skills they can find you but 1249 00:50:11,640 --> 00:50:14,339 most people don't have unlimited 1250 00:50:14,339 --> 00:50:16,560 resources unlimited time and unlimited 1251 00:50:16,560 --> 00:50:19,020 skills what you want to do is to make it 1252 00:50:19,020 --> 00:50:21,359 as difficult as possible but if you 1253 00:50:21,359 --> 00:50:24,420 really need to remain anonymous from say 1254 00:50:24,420 --> 00:50:26,460 the intelligence agencies that's a 1255 00:50:26,460 --> 00:50:28,560 really really difficult job if you want 1256 00:50:28,560 --> 00:50:30,900 to remain anonymous from the commercial 1257 00:50:30,900 --> 00:50:33,599 interests or your next door neighbor 1258 00:50:33,599 --> 00:50:36,000 that's a little bit easier to do than it 1259 00:50:36,000 --> 00:50:38,099 is from the intelligence agency they 1260 00:50:38,099 --> 00:50:40,319 have a huge amount of resources and high 1261 00:50:40,319 --> 00:50:41,819 level skill okay by the way we have 1262 00:50:41,819 --> 00:50:43,260 another one that comes up a lot search 1263 00:50:43,260 --> 00:50:44,400 engines 1264 00:50:44,400 --> 00:50:46,920 um Google's tracking you like crazy 1265 00:50:46,920 --> 00:50:48,480 um what about DuckDuckGo some people say 1266 00:50:48,480 --> 00:50:49,740 bad things about them do you have any 1267 00:50:49,740 --> 00:50:52,559 favorite um search engines what I what I 1268 00:50:52,559 --> 00:50:57,359 would prefer okay is to use Dr go in 1269 00:50:57,359 --> 00:51:00,059 Brave all right the brave browser Google 1270 00:51:00,059 --> 00:51:03,059 is probably the worst in terms of 1271 00:51:03,059 --> 00:51:05,700 tracking your information uh so the 1272 00:51:05,700 --> 00:51:07,319 Google Chrome is a great browser I love 1273 00:51:07,319 --> 00:51:09,359 Google Chrome but they trace they track 1274 00:51:09,359 --> 00:51:11,460 everything that you're doing so I would 1275 00:51:11,460 --> 00:51:15,660 recommend using DuckDuckGo in Brave uh 1276 00:51:15,660 --> 00:51:18,300 to remain safest to have least amount of 1277 00:51:18,300 --> 00:51:20,220 information that's but once again 1278 00:51:20,220 --> 00:51:22,740 remember that even then you want to be 1279 00:51:22,740 --> 00:51:25,440 able to have two separate identities so 1280 00:51:25,440 --> 00:51:28,020 that what you're searching for induct.go 1281 00:51:28,020 --> 00:51:29,760 is different than what you're searching 1282 00:51:29,760 --> 00:51:32,940 for in Google or other places so the two 1283 00:51:32,940 --> 00:51:34,800 cannot be connected I love what you said 1284 00:51:34,800 --> 00:51:37,140 here because in this interview you kind 1285 00:51:37,140 --> 00:51:39,000 of like make taking putting emphasis on 1286 00:51:39,000 --> 00:51:40,740 have different identities like have 1287 00:51:40,740 --> 00:51:42,900 everything separated a lot of people I 1288 00:51:42,900 --> 00:51:44,579 think make the mistake that they use the 1289 00:51:44,579 --> 00:51:47,579 same devices or go to the same websites 1290 00:51:47,579 --> 00:51:49,440 when when they're trying to be anonymous 1291 00:51:49,440 --> 00:51:50,700 and when they're just normally surfing 1292 00:51:50,700 --> 00:51:52,140 and I'm glad that you've really 1293 00:51:52,140 --> 00:51:54,119 highlighted that so a technical solution 1294 00:51:54,119 --> 00:51:56,339 isn't the the answer to everything it's 1295 00:51:56,339 --> 00:51:58,740 like make sure that you separate your 1296 00:51:58,740 --> 00:52:01,680 your behavior if you like exactly and 1297 00:52:01,680 --> 00:52:04,440 and also one of the things that I do is 1298 00:52:04,440 --> 00:52:08,160 put out false information so I I leave 1299 00:52:08,160 --> 00:52:10,619 behind false information that will take 1300 00:52:10,619 --> 00:52:12,420 people to will take people to other 1301 00:52:12,420 --> 00:52:14,460 identities so that when they're trying 1302 00:52:14,460 --> 00:52:16,800 to trace me they all of them are not 1303 00:52:16,800 --> 00:52:18,900 leading to the same identity they're 1304 00:52:18,900 --> 00:52:21,540 leading to multiple identities and and 1305 00:52:21,540 --> 00:52:24,480 that can at least obscure and make it 1306 00:52:24,480 --> 00:52:26,819 more difficult to find you okay by the 1307 00:52:26,819 --> 00:52:28,140 way as always I really want to thank you 1308 00:52:28,140 --> 00:52:29,400 for sharing your knowledge and 1309 00:52:29,400 --> 00:52:30,660 experience with all of us you know 1310 00:52:30,660 --> 00:52:32,099 you've got many many years of experience 1311 00:52:32,099 --> 00:52:34,980 and you have are anonymous online even 1312 00:52:34,980 --> 00:52:37,020 though you've write books you share so 1313 00:52:37,020 --> 00:52:37,800 much information 1314 00:52:37,800 --> 00:52:39,960 so thanks for sharing um your warnings 1315 00:52:39,960 --> 00:52:41,160 and your tips with all of us I really 1316 00:52:41,160 --> 00:52:42,780 appreciate it you're welcome David I 1317 00:52:42,780 --> 00:52:45,059 always enjoy being on your show and look 1318 00:52:45,059 --> 00:52:46,980 forward to doing more of these with you 1319 00:52:46,980 --> 00:52:48,300 on in the future so just for everyone 1320 00:52:48,300 --> 00:52:50,339 who's watching ideas that we've got let 1321 00:52:50,339 --> 00:52:51,780 us know in the comments ideas would 1322 00:52:51,780 --> 00:52:53,220 include Pegasus 1323 00:52:53,220 --> 00:52:55,140 um talking about that uh what other ones 1324 00:52:55,140 --> 00:52:57,119 do we think about with Bitcoin right how 1325 00:52:57,119 --> 00:52:59,400 did trade Bitcoin forensics yeah what 1326 00:52:59,400 --> 00:53:01,020 about like wi-fi hacking that would be a 1327 00:53:01,020 --> 00:53:02,579 good one Bluetooth I think is another 1328 00:53:02,579 --> 00:53:04,380 good one and we definitely want to have 1329 00:53:04,380 --> 00:53:06,420 Mr Robot right and we'll do more with Mr 1330 00:53:06,420 --> 00:53:08,400 Robot as well so for everyone watching 1331 00:53:08,400 --> 00:53:09,900 please put your comments below things 1332 00:53:09,900 --> 00:53:11,220 that you'd like to see occupy by the way 1333 00:53:11,220 --> 00:53:13,200 but thanks so much thanks David see you 1334 00:53:13,200 --> 00:53:15,319 soon 1335 00:53:15,359 --> 00:53:17,480 thank you97308

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.