Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,720 --> 00:00:07,350
In the previous lecture we learned what the third network is how it works and how it's supposed to protect
2
00:00:07,440 --> 00:00:10,290
our privacy and anonymity.
3
00:00:10,290 --> 00:00:15,240
We also learned how to connect to this network using the Tor browser.
4
00:00:15,450 --> 00:00:21,330
So we learned how to properly install it and configure it and then use it to connect to the network
5
00:00:21,630 --> 00:00:29,850
so that we can access Web sites privately and even access Tor hidden services or online services or
6
00:00:29,850 --> 00:00:33,710
what most people refer to as the darknet.
7
00:00:33,720 --> 00:00:39,750
Now this is a very easy and simple method and it's great if you just want to access a Web site quickly
8
00:00:39,750 --> 00:00:43,800
privately or if you just want to have a quick look over the darknet.
9
00:00:44,460 --> 00:00:47,280
But it's not the best method.
10
00:00:47,280 --> 00:00:55,110
The reason for this is because we installed deter Browser in a normal operating system such as Windows
11
00:00:55,140 --> 00:00:57,150
Linux or OS X.
12
00:00:57,270 --> 00:01:05,550
These operating systems regularly collect data about the user about you to improve user experience and
13
00:01:05,550 --> 00:01:13,850
who knows maybe for other reasons not only that but most of these operating systems have other programs
14
00:01:13,880 --> 00:01:21,530
installed on them which also collect data about you again to improve user experience and maybe for other
15
00:01:21,530 --> 00:01:23,210
reasons.
16
00:01:23,210 --> 00:01:29,630
Now all of this collected data can be used to D anonymize you and profile you.
17
00:01:29,630 --> 00:01:36,890
Not only that but all of these programs all of the programs outside the top browser itself access the
18
00:01:36,890 --> 00:01:38,300
Internet directly.
19
00:01:38,360 --> 00:01:40,550
They do not use data or network.
20
00:01:40,670 --> 00:01:44,990
The only program that is using the Tor network is deter browser.
21
00:01:44,990 --> 00:01:50,020
Therefore when these programs leak information about you they are leaking.
22
00:01:50,060 --> 00:01:58,850
Also your proper exact location not only that but we also have issues such as DNS leaks which also would
23
00:01:58,850 --> 00:02:05,750
leak information about you and not to mention that all of these programs and operating systems have
24
00:02:05,750 --> 00:02:11,990
a history of being vulnerable to code execution and buffer overflow vulnerabilities.
25
00:02:11,990 --> 00:02:18,890
Now these vulnerabilities can be used to gain full control over your computer and obviously once someone
26
00:02:18,890 --> 00:02:27,410
has control over your computer no one where you are getting information about you is very very simple.
27
00:02:27,410 --> 00:02:34,790
Therefore in this section I want to show you a much better method to protect our anonymity and privacy.
28
00:02:34,790 --> 00:02:40,430
This method is a little bit more complex and will require a little bit more work and a little bit more
29
00:02:40,430 --> 00:02:41,350
hardware.
30
00:02:41,510 --> 00:02:43,440
But don't worry about it.
31
00:02:43,520 --> 00:02:49,460
I'm going to break it into very simple lectures and I'm going to walk you through the steps one by one
32
00:02:49,760 --> 00:02:55,940
and you're going to learn exactly how it's going to work and why it's so much better than just installing
33
00:02:55,970 --> 00:02:59,180
the Tor browser on a normal operating system.
3699
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.