1 00:00:00,360 --> 00:00:05,940 So the security concern here is that the intelligence and its spy services of the United States and 2 00:00:05,940 --> 00:00:13,800 other nations consider the tornado as a threat to national security, believing such an anonymous network 3 00:00:13,800 --> 00:00:18,610 enables foreign governments and terrorists to communicate with all being Vought. 4 00:00:19,260 --> 00:00:25,920 So as a result, number of robust, ambitious research projects are working to breed and normality often 5 00:00:26,910 --> 00:00:27,570 stalled. 6 00:00:27,570 --> 00:00:33,630 And 1990 has been broken before by these activities and will likely be broken again and again. 7 00:00:34,610 --> 00:00:41,960 So the NSC, as one instance, running its own Torontos, meaning that your traffic may be traversing 8 00:00:41,960 --> 00:00:44,420 the NSA, is louder when you use DOT. 9 00:00:45,140 --> 00:00:52,130 So if your traffic is existing and out, and that is even worse because the exit route always knows 10 00:00:52,130 --> 00:00:52,990 your destination. 11 00:00:53,720 --> 00:01:03,230 So the NSA also has a method known as traffic correlation, which involves looking for pattern and incoming 12 00:01:03,230 --> 00:01:07,010 and outgoing traffic that has been able to break doors. 13 00:01:07,010 --> 00:01:15,440 And Naimoli to these attempts to break door won't affect your effectiveness at obscuring your identify 14 00:01:15,470 --> 00:01:16,370 your identity. 15 00:01:16,370 --> 00:01:23,390 Actually, from commercial services such as Google, they may limit the brothers effectiveness in keeping 16 00:01:23,390 --> 00:01:26,280 you anonymous from spy agencies. 17 00:01:26,660 --> 00:01:31,250 So there's a third party rule is being totally excluded. 18 00:01:31,820 --> 00:01:35,320 So now let's talk about Vortis proxy servers. 19 00:01:35,840 --> 00:01:43,640 So and the strategy for achieving anonymity on the Internet is to use proxies which are intermediated 20 00:01:43,640 --> 00:01:46,810 system that act as a middleman for traffic. 21 00:01:47,390 --> 00:01:53,450 So the user connect to a proxy and the traffic is given the IP address of the proxy before it's passed 22 00:01:53,450 --> 00:01:53,640 on. 23 00:01:54,260 --> 00:01:59,330 So when the traffic returns from the destination, the proxy sends the traffic back to the source. 24 00:01:59,810 --> 00:02:04,280 So in this way, traffic appears to come from the proxy, not originating IP address. 25 00:02:05,980 --> 00:02:09,600 So as you can see that let's analyze this particular map here. 26 00:02:11,620 --> 00:02:13,130 So here is a user. 27 00:02:13,600 --> 00:02:18,060 OK, the user, so you don't want so you want to be anonymous. 28 00:02:18,100 --> 00:02:24,590 So what he will do, he will send his traffic to the proxy and then to the server. 29 00:02:24,850 --> 00:02:30,370 So suppose that is since you won't like Google dot com. 30 00:02:31,000 --> 00:02:31,990 So what he will do. 31 00:02:32,020 --> 00:02:32,870 What he will do. 32 00:02:32,920 --> 00:02:33,820 He will send. 33 00:02:34,690 --> 00:02:42,730 The IP address to the ISP, which is Internet service provider and ISP, will send the IP address to 34 00:02:42,730 --> 00:02:49,270 the proxy and the proxy will send the IP address to the Google, and then Google will return all we 35 00:02:49,270 --> 00:02:54,250 can see response to to their request and then the cycle goes on. 36 00:02:54,520 --> 00:02:55,600 So this is how it votes. 37 00:02:55,780 --> 00:03:02,260 But if you talk about the normal case like this, in these cases, if you search for something, that 38 00:03:02,260 --> 00:03:08,560 ISP will send direct request to the Google dot com like server and Google will. 39 00:03:09,860 --> 00:03:14,750 Definitely not IP, the subfields, because the traffic is coming back from your computer, but in case 40 00:03:14,750 --> 00:03:18,020 of proxy, we have this middleman, as you can see here. 41 00:03:18,420 --> 00:03:20,660 OK, so this is how proxy works. 42 00:03:21,140 --> 00:03:29,510 Suckley Linux has an excellent proxy tool called Proxy Chance so that you can set up to obscure your 43 00:03:29,720 --> 00:03:30,170 traffic. 44 00:03:30,210 --> 00:03:33,340 So now let's see how we can work with it.