1 00:00:00,690 --> 00:00:07,230 Now before diving into the course content I'd like to give you a quick overview of the content of the 2 00:00:07,230 --> 00:00:07,760 course. 3 00:00:08,280 --> 00:00:15,360 So as you know in this course we're going to be covering four main topics anonymity privacy the dark 4 00:00:15,360 --> 00:00:20,350 web and security so we'll start with anonymity. 5 00:00:20,430 --> 00:00:25,800 And we're going to introduce you to the tour network which is the anonymous rising network there that 6 00:00:25,800 --> 00:00:31,560 we're going to use throughout the whole course you're going to learn how it works and how to connect 7 00:00:31,560 --> 00:00:37,530 to it to improve our privacy and anonymity and to access the dark web. 8 00:00:37,560 --> 00:00:44,790 So we'll start with the basics of the Tor Browser how to properly install it on Linux Windows and OS 9 00:00:44,820 --> 00:00:53,190 X configure it for maximum security and anonymity and bypass censorship to connect to the terror network 10 00:00:53,400 --> 00:00:59,580 even if it's blocked once done with the basics will move to the next level where we're going to use 11 00:00:59,580 --> 00:01:05,650 an operating system that is designed to be more private and more anonymous. 12 00:01:05,850 --> 00:01:12,420 First I'm going to teach you how to properly configure it and install it on a USB stick so we can use 13 00:01:12,420 --> 00:01:20,850 this USB stick to use this operating system from any computer to anonymously access both the darknet 14 00:01:20,940 --> 00:01:24,360 and the clear net without affecting this computer. 15 00:01:24,360 --> 00:01:32,430 And without leaving any traces on it then the course is divided into a number of subsections or modules 16 00:01:32,700 --> 00:01:39,650 that'll teach you how to anonymously and privately use both the clear net and the darknet. 17 00:01:39,690 --> 00:01:46,140 You'll also learn how to carry out your normal online tasks in a more private and more anonymous manner 18 00:01:46,470 --> 00:01:52,290 so you'll learn how to search for content on both on the clear net and on the darknet how to communicate 19 00:01:52,290 --> 00:01:59,190 using emails using instant messages share files and handle files and how to use your whole file system 20 00:01:59,250 --> 00:02:05,080 and hold computer in a more private more secure and more anonymous manner. 21 00:02:05,070 --> 00:02:11,550 Then we're going to have a full section on encryption where you'll learn what we mean by asymmetric 22 00:02:11,550 --> 00:02:19,050 symmetric an end to end encryption how to properly and manually encrypt data whether it's simple text 23 00:02:19,290 --> 00:02:25,680 or files so that they are useless to anybody that intercepts this data. 24 00:02:25,680 --> 00:02:31,890 You'll also learn how to sign data so the receiver can verify that it was actually sent from you and 25 00:02:31,890 --> 00:02:36,370 how to verify the integrity of data that you receive. 26 00:02:36,390 --> 00:02:38,160 This is very very important. 27 00:02:38,190 --> 00:02:45,060 If you're serious about protecting your privacy and if you want to communicate with people on the darknet 28 00:02:45,390 --> 00:02:51,390 because some people will simply refuse to communicate with you unless you use encryption the way that 29 00:02:51,390 --> 00:02:58,650 I'm going to show you in the section there is also a full section on cryptocurrency because as we know 30 00:02:58,710 --> 00:03:04,590 the traditional payment methods that we know use in PayPal or using credit cards or other clear net 31 00:03:04,590 --> 00:03:08,490 payment methods are simply not private and not anonymous. 32 00:03:08,490 --> 00:03:14,130 So in the section you'll first learn how crypto currencies work and how to obtain crypto and handle 33 00:03:14,130 --> 00:03:21,030 it privately and anonymously throughout all of these sections we're going to use fully priced systems 34 00:03:21,360 --> 00:03:27,750 but in the last section of the course I'm going to teach you how to take your security to the next level 35 00:03:27,990 --> 00:03:33,880 by dividing your computer into a number of isolated security domains. 36 00:03:33,900 --> 00:03:40,350 So even if you get hacked or if you open malware it would be very difficult for the hacker or for the 37 00:03:40,350 --> 00:03:44,940 malware to compromise your default system and the anonymize you.