Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,790 --> 00:00:02,710
Hello and welcome.
2
00:00:02,710 --> 00:00:03,530
My name is Zaid.
3
00:00:03,760 --> 00:00:08,290
I'm an ethical hacker a computer scientist and I'll be your instructor in this course.
4
00:00:14,840 --> 00:00:20,480
Now before diving into the course content let's talk about the main topics that we're going to cover
5
00:00:20,690 --> 00:00:21,530
in this course.
6
00:00:22,160 --> 00:00:28,540
So we're going to talk about privacy anonymity the dark web and security.
7
00:00:28,850 --> 00:00:35,990
I chose to cover all of these topics in one course because I think they are very related and sometimes
8
00:00:36,020 --> 00:00:41,180
on the Internet it's very difficult to achieve one of them without the others.
9
00:00:41,180 --> 00:00:46,860
So starting with the first one privacy means that no one knows what you do.
10
00:00:46,910 --> 00:00:53,240
For example when you go and enter your house people can see that you entered your house but they don't
11
00:00:53,240 --> 00:00:55,400
know what you do inside the house.
12
00:00:55,580 --> 00:01:03,630
Therefore your private anonymity on the other hand means that people can see what you're doing but they
13
00:01:03,630 --> 00:01:05,340
don't know who you are.
14
00:01:05,340 --> 00:01:10,830
For example let's say while you're inside your house you put a mask on and then you leave the house
15
00:01:10,980 --> 00:01:12,930
and start washing your car.
16
00:01:12,930 --> 00:01:17,590
Now people can see that there is somebody washing the car so they can see what you're doing.
17
00:01:17,610 --> 00:01:23,610
They can see the activity but they don't know who is that person washing the car because you have a
18
00:01:23,610 --> 00:01:27,060
mask therefore you're hiding your identity.
19
00:01:27,060 --> 00:01:32,580
So when your private people know who you are but they don't see what you do when you're anonymous.
20
00:01:32,580 --> 00:01:37,860
People see what you do but don't know who is that person doing that activity.
21
00:01:37,860 --> 00:01:40,470
So they don't know your identity.
22
00:01:40,560 --> 00:01:46,710
Now on the Internet usually we just want to be private so we don't want other parties to be able to
23
00:01:46,710 --> 00:01:50,550
see the messages or the e-mails or whatever we do on the Internet.
24
00:01:51,420 --> 00:01:58,140
Unfortunately though it is very difficult to be private on the Internet because in order to use the
25
00:01:58,140 --> 00:02:02,940
Internet you have to use resources that are not owned by you.
26
00:02:03,900 --> 00:02:06,620
So you have to use an internet service provider.
27
00:02:06,690 --> 00:02:12,030
And when your access in Web sites or use using services you're using servers owned by these services
28
00:02:12,120 --> 00:02:18,910
or by third parties therefore you can't really control how your data is being handled.
29
00:02:18,930 --> 00:02:22,330
For example let's say you try to go to Google dot com.
30
00:02:22,410 --> 00:02:26,980
This request will first of all pass through a number of stops or a number of routers.
31
00:02:27,080 --> 00:02:29,940
It will go to your Internet service provider again.
32
00:02:29,940 --> 00:02:35,370
It'll pass through a number of routers and a number of stops and eventually reaches Google's servers
33
00:02:35,400 --> 00:02:37,460
which again are not controlled by you.
34
00:02:37,560 --> 00:02:41,870
And then you get your response through a similar out.
35
00:02:41,940 --> 00:02:47,670
Therefore both your request and the response will pass through a number of stops that you don't own
36
00:02:47,730 --> 00:02:48,810
or don't control.
37
00:02:48,810 --> 00:02:54,350
So anybody operating or working on these taps will be able to see your traffic.
38
00:02:54,360 --> 00:02:56,280
You will be able to see your activity.
39
00:02:56,340 --> 00:03:03,510
Not only that but hackers and government agencies and other entities can possibly intercept these requests
40
00:03:03,570 --> 00:03:07,920
and responses at any point and therefore see what you're doing.
41
00:03:08,070 --> 00:03:15,930
Therefore your privacy is gone so we use encryption whenever possible in order to improve our privacy.
42
00:03:16,150 --> 00:03:22,750
But like I said there will be some points and some situations where it is just not possible to be private.
43
00:03:23,110 --> 00:03:28,390
Therefore the best solution is to try to become as anonymous as possible.
44
00:03:28,390 --> 00:03:37,050
So if anybody manages to intercept our data they won't be able to link it to ourselves or to our identity.
45
00:03:37,060 --> 00:03:42,100
Now there are some situations where people actually want to be just anonymous.
46
00:03:42,130 --> 00:03:48,880
For example journalists usually prefer to publish sensitive posts anonymously so that everybody can
47
00:03:48,880 --> 00:03:49,520
see the post.
48
00:03:49,520 --> 00:03:50,250
So it's not hidden.
49
00:03:50,250 --> 00:03:51,150
It's not private.
50
00:03:51,280 --> 00:03:56,380
But at the same time it can't be linked to their real identity.
51
00:03:56,380 --> 00:03:59,500
This way the posts will be linked to some kind of identity.
52
00:03:59,830 --> 00:04:04,650
So it will be linked to a fake name or simply just numbers or a ghost profile.
53
00:04:04,840 --> 00:04:07,600
But it is linked to some kind of identity.
54
00:04:07,660 --> 00:04:11,620
Therefore this is known as pseudo anonymity.
55
00:04:11,620 --> 00:04:17,140
Now in order to achieve the above two things to become more private and more anonymous we're going to
56
00:04:17,140 --> 00:04:18,550
need two things.
57
00:04:18,640 --> 00:04:24,610
First we're going to need an anonymous raising service that'll allow us to become more anonymous and
58
00:04:24,610 --> 00:04:31,900
to we're going to need to change our habits when it comes to using online services and use different
59
00:04:31,900 --> 00:04:37,930
services that are more private and more anonymous because the search engines that you're used to for
60
00:04:37,930 --> 00:04:43,660
example Google and being the e-mails that you're used to Gmail and the others and all of the other services
61
00:04:43,660 --> 00:04:47,830
that you're used to use are simply not private and not anonymous.
62
00:04:47,830 --> 00:04:48,910
They profile you.
63
00:04:48,970 --> 00:04:51,400
They collect data about you.
64
00:04:51,400 --> 00:04:56,280
And sometimes even sell it to third parties unfortunately.
65
00:04:56,420 --> 00:05:02,830
On the clear net there aren't a lot of useful online services that are private and anonymous.
66
00:05:02,840 --> 00:05:08,810
Luckily though the anonymous raising services that we're going to use from point one in order to become
67
00:05:08,810 --> 00:05:16,240
more anonymous also contain a number of services and Web sites that only exist within this anonymous
68
00:05:16,240 --> 00:05:18,400
rising service or network.
69
00:05:18,500 --> 00:05:23,580
Therefore these are referred to as DarkNet or dark web web sites or services.
70
00:05:23,600 --> 00:05:29,840
So I'm going to show you how to properly access the darknet and then use these services to carry out
71
00:05:29,900 --> 00:05:34,830
our day to day tasks in a more anonymous and more private manner.
72
00:05:34,850 --> 00:05:42,230
Last but not least I also wanted to cover security in this course because you cannot be private and
73
00:05:42,290 --> 00:05:47,360
anonymous if you're not secure even if you're using the best privacy methods.
74
00:05:47,360 --> 00:05:52,470
The best anonymity methods the best VPN ends at multiple proxies and so on.
75
00:05:52,610 --> 00:05:58,250
If somebody manages to hack into your computer then first of all they'll be able to see all of your
76
00:05:58,250 --> 00:05:59,780
files and see your activity.
77
00:05:59,900 --> 00:06:06,710
So you're not private and will also be able to bypass whatever methods you used to become anonymous
78
00:06:06,920 --> 00:06:08,880
and these anonymize you.
79
00:06:08,930 --> 00:06:14,960
That's why like I said you can't really be private and anonymous without being secure and by being private
80
00:06:14,960 --> 00:06:18,230
and anonymous you're going to have to use some darknet services.
81
00:06:18,230 --> 00:06:22,150
Therefore I'll have to teach you how to access the darknet and use it.
82
00:06:22,220 --> 00:06:25,240
So the four topics really click with each other.
83
00:06:25,310 --> 00:06:30,640
And when you learn these topics you'll be able to use them and apply them in different situations.
84
00:06:30,680 --> 00:06:36,650
You might be at a scenario that I can't think of that requires you to be a little bit private or anonymous.
85
00:06:36,650 --> 00:06:41,840
So you'll be able to learn whatever techniques I teach you in here in terms of anonymity or privacy
86
00:06:42,050 --> 00:06:45,250
and apply them to whatever situation that you're in.
9378
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.