All language subtitles for 1. Introduction to Privacy, Anonymity _ Security

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,790 --> 00:00:02,710 Hello and welcome. 2 00:00:02,710 --> 00:00:03,530 My name is Zaid. 3 00:00:03,760 --> 00:00:08,290 I'm an ethical hacker a computer scientist and I'll be your instructor in this course. 4 00:00:14,840 --> 00:00:20,480 Now before diving into the course content let's talk about the main topics that we're going to cover 5 00:00:20,690 --> 00:00:21,530 in this course. 6 00:00:22,160 --> 00:00:28,540 So we're going to talk about privacy anonymity the dark web and security. 7 00:00:28,850 --> 00:00:35,990 I chose to cover all of these topics in one course because I think they are very related and sometimes 8 00:00:36,020 --> 00:00:41,180 on the Internet it's very difficult to achieve one of them without the others. 9 00:00:41,180 --> 00:00:46,860 So starting with the first one privacy means that no one knows what you do. 10 00:00:46,910 --> 00:00:53,240 For example when you go and enter your house people can see that you entered your house but they don't 11 00:00:53,240 --> 00:00:55,400 know what you do inside the house. 12 00:00:55,580 --> 00:01:03,630 Therefore your private anonymity on the other hand means that people can see what you're doing but they 13 00:01:03,630 --> 00:01:05,340 don't know who you are. 14 00:01:05,340 --> 00:01:10,830 For example let's say while you're inside your house you put a mask on and then you leave the house 15 00:01:10,980 --> 00:01:12,930 and start washing your car. 16 00:01:12,930 --> 00:01:17,590 Now people can see that there is somebody washing the car so they can see what you're doing. 17 00:01:17,610 --> 00:01:23,610 They can see the activity but they don't know who is that person washing the car because you have a 18 00:01:23,610 --> 00:01:27,060 mask therefore you're hiding your identity. 19 00:01:27,060 --> 00:01:32,580 So when your private people know who you are but they don't see what you do when you're anonymous. 20 00:01:32,580 --> 00:01:37,860 People see what you do but don't know who is that person doing that activity. 21 00:01:37,860 --> 00:01:40,470 So they don't know your identity. 22 00:01:40,560 --> 00:01:46,710 Now on the Internet usually we just want to be private so we don't want other parties to be able to 23 00:01:46,710 --> 00:01:50,550 see the messages or the e-mails or whatever we do on the Internet. 24 00:01:51,420 --> 00:01:58,140 Unfortunately though it is very difficult to be private on the Internet because in order to use the 25 00:01:58,140 --> 00:02:02,940 Internet you have to use resources that are not owned by you. 26 00:02:03,900 --> 00:02:06,620 So you have to use an internet service provider. 27 00:02:06,690 --> 00:02:12,030 And when your access in Web sites or use using services you're using servers owned by these services 28 00:02:12,120 --> 00:02:18,910 or by third parties therefore you can't really control how your data is being handled. 29 00:02:18,930 --> 00:02:22,330 For example let's say you try to go to Google dot com. 30 00:02:22,410 --> 00:02:26,980 This request will first of all pass through a number of stops or a number of routers. 31 00:02:27,080 --> 00:02:29,940 It will go to your Internet service provider again. 32 00:02:29,940 --> 00:02:35,370 It'll pass through a number of routers and a number of stops and eventually reaches Google's servers 33 00:02:35,400 --> 00:02:37,460 which again are not controlled by you. 34 00:02:37,560 --> 00:02:41,870 And then you get your response through a similar out. 35 00:02:41,940 --> 00:02:47,670 Therefore both your request and the response will pass through a number of stops that you don't own 36 00:02:47,730 --> 00:02:48,810 or don't control. 37 00:02:48,810 --> 00:02:54,350 So anybody operating or working on these taps will be able to see your traffic. 38 00:02:54,360 --> 00:02:56,280 You will be able to see your activity. 39 00:02:56,340 --> 00:03:03,510 Not only that but hackers and government agencies and other entities can possibly intercept these requests 40 00:03:03,570 --> 00:03:07,920 and responses at any point and therefore see what you're doing. 41 00:03:08,070 --> 00:03:15,930 Therefore your privacy is gone so we use encryption whenever possible in order to improve our privacy. 42 00:03:16,150 --> 00:03:22,750 But like I said there will be some points and some situations where it is just not possible to be private. 43 00:03:23,110 --> 00:03:28,390 Therefore the best solution is to try to become as anonymous as possible. 44 00:03:28,390 --> 00:03:37,050 So if anybody manages to intercept our data they won't be able to link it to ourselves or to our identity. 45 00:03:37,060 --> 00:03:42,100 Now there are some situations where people actually want to be just anonymous. 46 00:03:42,130 --> 00:03:48,880 For example journalists usually prefer to publish sensitive posts anonymously so that everybody can 47 00:03:48,880 --> 00:03:49,520 see the post. 48 00:03:49,520 --> 00:03:50,250 So it's not hidden. 49 00:03:50,250 --> 00:03:51,150 It's not private. 50 00:03:51,280 --> 00:03:56,380 But at the same time it can't be linked to their real identity. 51 00:03:56,380 --> 00:03:59,500 This way the posts will be linked to some kind of identity. 52 00:03:59,830 --> 00:04:04,650 So it will be linked to a fake name or simply just numbers or a ghost profile. 53 00:04:04,840 --> 00:04:07,600 But it is linked to some kind of identity. 54 00:04:07,660 --> 00:04:11,620 Therefore this is known as pseudo anonymity. 55 00:04:11,620 --> 00:04:17,140 Now in order to achieve the above two things to become more private and more anonymous we're going to 56 00:04:17,140 --> 00:04:18,550 need two things. 57 00:04:18,640 --> 00:04:24,610 First we're going to need an anonymous raising service that'll allow us to become more anonymous and 58 00:04:24,610 --> 00:04:31,900 to we're going to need to change our habits when it comes to using online services and use different 59 00:04:31,900 --> 00:04:37,930 services that are more private and more anonymous because the search engines that you're used to for 60 00:04:37,930 --> 00:04:43,660 example Google and being the e-mails that you're used to Gmail and the others and all of the other services 61 00:04:43,660 --> 00:04:47,830 that you're used to use are simply not private and not anonymous. 62 00:04:47,830 --> 00:04:48,910 They profile you. 63 00:04:48,970 --> 00:04:51,400 They collect data about you. 64 00:04:51,400 --> 00:04:56,280 And sometimes even sell it to third parties unfortunately. 65 00:04:56,420 --> 00:05:02,830 On the clear net there aren't a lot of useful online services that are private and anonymous. 66 00:05:02,840 --> 00:05:08,810 Luckily though the anonymous raising services that we're going to use from point one in order to become 67 00:05:08,810 --> 00:05:16,240 more anonymous also contain a number of services and Web sites that only exist within this anonymous 68 00:05:16,240 --> 00:05:18,400 rising service or network. 69 00:05:18,500 --> 00:05:23,580 Therefore these are referred to as DarkNet or dark web web sites or services. 70 00:05:23,600 --> 00:05:29,840 So I'm going to show you how to properly access the darknet and then use these services to carry out 71 00:05:29,900 --> 00:05:34,830 our day to day tasks in a more anonymous and more private manner. 72 00:05:34,850 --> 00:05:42,230 Last but not least I also wanted to cover security in this course because you cannot be private and 73 00:05:42,290 --> 00:05:47,360 anonymous if you're not secure even if you're using the best privacy methods. 74 00:05:47,360 --> 00:05:52,470 The best anonymity methods the best VPN ends at multiple proxies and so on. 75 00:05:52,610 --> 00:05:58,250 If somebody manages to hack into your computer then first of all they'll be able to see all of your 76 00:05:58,250 --> 00:05:59,780 files and see your activity. 77 00:05:59,900 --> 00:06:06,710 So you're not private and will also be able to bypass whatever methods you used to become anonymous 78 00:06:06,920 --> 00:06:08,880 and these anonymize you. 79 00:06:08,930 --> 00:06:14,960 That's why like I said you can't really be private and anonymous without being secure and by being private 80 00:06:14,960 --> 00:06:18,230 and anonymous you're going to have to use some darknet services. 81 00:06:18,230 --> 00:06:22,150 Therefore I'll have to teach you how to access the darknet and use it. 82 00:06:22,220 --> 00:06:25,240 So the four topics really click with each other. 83 00:06:25,310 --> 00:06:30,640 And when you learn these topics you'll be able to use them and apply them in different situations. 84 00:06:30,680 --> 00:06:36,650 You might be at a scenario that I can't think of that requires you to be a little bit private or anonymous. 85 00:06:36,650 --> 00:06:41,840 So you'll be able to learn whatever techniques I teach you in here in terms of anonymity or privacy 86 00:06:42,050 --> 00:06:45,250 and apply them to whatever situation that you're in. 9378

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.