1 00:00:01,130 --> 00:00:02,040 Welcome back, guys. 2 00:00:02,090 --> 00:00:06,200 So in this lecture, we are going to learn about the tar balls of what is taught. 3 00:00:06,680 --> 00:00:10,220 So as we know, Google is one of the Web browser used for accessing this office. 4 00:00:10,490 --> 00:00:14,030 Similarly, the browser is used to access a document. 5 00:00:15,140 --> 00:00:18,050 Then why can't we use Google to expose the dark web? 6 00:00:18,290 --> 00:00:25,130 Because the total browser anonymized is the Web traffic using the tornado, making it super safe and 7 00:00:25,130 --> 00:00:27,110 easy to protect your identity online. 8 00:00:28,100 --> 00:00:32,950 Actually, as you can see on the screen, the look of Tor browser is an onion, right? 9 00:00:33,290 --> 00:00:39,530 Well, it's because the onion symbolizes the multilayer protection which is provided by Tor or completely 10 00:00:39,530 --> 00:00:45,020 hides your identity, your IP address, as well as the location from where you're accessing the document 11 00:00:45,740 --> 00:00:47,750 that is due to this multilayer protection. 12 00:00:47,750 --> 00:00:54,290 Browsing the deep dark web through Tor may be slower as compared to accessing this office web or the 13 00:00:54,290 --> 00:00:56,720 Clearnet using various other browsers. 14 00:00:57,500 --> 00:01:04,220 Tor is also illegal in several countries that want to prevent its citizens from reading, publishing 15 00:01:04,460 --> 00:01:06,080 or communicating anonymously. 16 00:01:06,500 --> 00:01:13,310 Journalist around the world have made a hub for several types of news, which the government does not 17 00:01:13,310 --> 00:01:14,310 want to be disclosed. 18 00:01:14,900 --> 00:01:21,110 Several news related to corruption and sensitive topics can also be found on the browser, which the 19 00:01:21,110 --> 00:01:27,350 governments are working to break the Tor anonymity properties, while, on the other hand, researchers 20 00:01:27,350 --> 00:01:34,130 are on hard work improving it or rather is also available for Android and iOS and Android. 21 00:01:34,130 --> 00:01:39,770 You can find it as Aubut or Box or Buick's easily from Plaistow. 22 00:01:39,800 --> 00:01:44,040 And in the case of iOS, you can find an in browser from the App Store. 23 00:01:45,110 --> 00:01:50,750 So how exactly Tarbox Tor keeps its users anonymous using the block chain. 24 00:01:50,750 --> 00:01:56,930 Technology blogs in technology is also used in transfer of digital currencies like bitcoins to make 25 00:01:56,930 --> 00:01:58,290 transactions untraceable. 26 00:01:59,090 --> 00:02:02,920 So as you can see in the diagram, let's say Alice is trying to open the door browser. 27 00:02:03,380 --> 00:02:10,130 So first of all, little device gets the dictionary or directory of all the available download from 28 00:02:10,130 --> 00:02:10,610 a server. 29 00:02:10,890 --> 00:02:11,290 Right? 30 00:02:11,660 --> 00:02:18,050 So Total officially has no devices or servers, but several volunteers all around the world have provided 31 00:02:18,050 --> 00:02:25,130 their device as Tor servers, which helped store create more protection walls as it improves the browsing 32 00:02:25,130 --> 00:02:25,440 speed. 33 00:02:25,940 --> 00:02:32,480 So after elsewise gets the list of all available downloads, the dotted line picks a random path to 34 00:02:32,480 --> 00:02:38,290 the design server and added that each node at the end of each node, the signal is encrypted. 35 00:02:38,300 --> 00:02:43,940 As you can see in the diagram, the green lines are then encrypted lines wherever the red lines are 36 00:02:43,940 --> 00:02:44,720 not encrypted. 37 00:02:45,320 --> 00:02:53,150 So the client of Alice picks a random path through Thornwood, encrypt each signal at the junction and 38 00:02:53,150 --> 00:02:55,010 finally reaches the desired server. 39 00:02:55,070 --> 00:02:56,210 That is in this case. 40 00:02:56,210 --> 00:03:03,560 But again, when Alice visits another site or request any kind of service, that our client will again 41 00:03:03,560 --> 00:03:10,130 pick a random path through the door, not encrypted signal at each node, and then reaches the desired 42 00:03:10,130 --> 00:03:11,970 server, which is in this case, Gene. 43 00:03:12,660 --> 00:03:18,440 You see, there are many phases of encryption between the client and the server, which makes the hacker 44 00:03:18,440 --> 00:03:21,950 or any third person party nearly impossible to trace. 45 00:03:22,900 --> 00:03:23,390 Thank you. 46 00:03:24,240 --> 00:03:25,330 That's it for this lecture. 47 00:03:25,780 --> 00:03:29,540 Hope you learned about how the door brother works in the next lecture. 48 00:03:29,560 --> 00:03:33,730 We are going to learn about deals, another security to protect our privacy. 49 00:03:34,210 --> 00:03:35,020 Thank you very much. 50 00:03:35,050 --> 00:03:35,670 See you there.