1 00:00:00,920 --> 00:00:09,260 So what is store tour is short for the onion router and it's basically a network of computers or servers 2 00:00:09,530 --> 00:00:13,850 designed to improve anonymity and privacy. 3 00:00:13,910 --> 00:00:21,290 It's the most common and an amazing network with the most amount of users and it also allows connected 4 00:00:21,290 --> 00:00:25,970 users to offer hidden services or online services. 5 00:00:25,970 --> 00:00:32,900 So these are basically deep net or darknet Web sites and that's what most people refer to when they're 6 00:00:32,900 --> 00:00:36,410 talking about darknet or the deep net Web sites. 7 00:00:36,500 --> 00:00:44,390 Even though it could mean many other anon amazing networks and hidden services networks I should also 8 00:00:44,390 --> 00:00:48,740 note that Tor relies on online routing. 9 00:00:48,740 --> 00:00:56,990 This is a technique that was designed by the US Army in order to protect their intelligence communications. 10 00:00:56,990 --> 00:01:01,310 You might want to use Tor even if you don't want to access the deep net. 11 00:01:01,340 --> 00:01:07,930 You can literally just use it if you want to protect your privacy and anonymity. 12 00:01:08,210 --> 00:01:14,680 So while you might want to do that well let's see what happens when you connect to our Web site. 13 00:01:14,780 --> 00:01:20,540 So let's say for example you open your browser and you navigate to Google dot com or Facebook dot com 14 00:01:21,020 --> 00:01:24,550 by default without really doing or trying anything. 15 00:01:24,620 --> 00:01:31,250 These Web sites will be able to see your location your browser version your operating system and much 16 00:01:31,250 --> 00:01:32,760 more information. 17 00:01:32,990 --> 00:01:39,090 And it doesn't stop there for example because you use google to search for a lot of things. 18 00:01:39,140 --> 00:01:46,140 Google can see everything you search right now and even everything that you searched before. 19 00:01:46,220 --> 00:01:50,740 Not only that but again big Web sites such as Google and Facebook. 20 00:01:50,870 --> 00:01:58,070 They can even potentially access your activity outside of these Web sites. 21 00:01:58,160 --> 00:02:02,610 They use this relying on the features they offer to other Web sites. 22 00:02:02,720 --> 00:02:08,210 For example any Web site that would have a Google or a Facebook share button would have a piece of code 23 00:02:08,210 --> 00:02:11,800 from Google or from Facebook running on their Web site. 24 00:02:11,810 --> 00:02:17,160 And again Google and Facebook use this code in order to see which websites you visit. 25 00:02:17,330 --> 00:02:23,270 And obviously they use that in order to serve you ads related to you we all know that you search for 26 00:02:23,270 --> 00:02:27,650 something and you start seeing it everywhere else but it doesn't stop there. 27 00:02:27,650 --> 00:02:34,220 We've all read the Cambridge analytics scandal and how they were able to access private information 28 00:02:34,280 --> 00:02:36,140 about Facebook users. 29 00:02:36,140 --> 00:02:38,880 And it doesn't even stop at this. 30 00:02:38,930 --> 00:02:46,430 There are several reports reporting that Web sites such as Facebook creates ghost profiles so profiles 31 00:02:46,430 --> 00:02:50,600 for people that don't even have a Facebook account. 32 00:02:50,660 --> 00:02:53,890 So you might think OK I don't have a Facebook account. 33 00:02:53,900 --> 00:02:55,490 They can't really track me. 34 00:02:55,490 --> 00:03:02,480 No they still probably have a profile about you because like I said any Web site that you visit that 35 00:03:02,480 --> 00:03:09,130 has a Facebook like button or a Facebook share button will collect data about you. 36 00:03:09,200 --> 00:03:11,420 And Facebook is not going to stop there. 37 00:03:11,420 --> 00:03:13,130 They will create a profile. 38 00:03:13,130 --> 00:03:19,400 They'll add some name to it or some identity to it and they'll have all the things related to you what 39 00:03:19,400 --> 00:03:21,890 you like what websites you visit. 40 00:03:21,920 --> 00:03:24,050 What did you purchase recently. 41 00:03:24,100 --> 00:03:32,010 And one this is only what's been reported so you can only imagine what's happening without getting caught. 42 00:03:32,030 --> 00:03:37,380 And without being reported so what's the solution. 43 00:03:37,380 --> 00:03:41,010 Well Toure is actually a pretty good solution to prevent this. 44 00:03:41,490 --> 00:03:50,370 So when you connect to Tor you can imagine Toure being this really big network and it has a large number 45 00:03:50,400 --> 00:03:57,190 of servers so each circle in here is literally server and detour network. 46 00:03:57,660 --> 00:04:02,820 So you'll connect to tour and let's say you want to go to Google dot com. 47 00:04:02,820 --> 00:04:09,270 What's going to happen is your request is going to bounce over three different servers or three different 48 00:04:09,330 --> 00:04:13,590 nodes before it goes to Google. 49 00:04:13,590 --> 00:04:21,990 So Google can only see the last node or the last server or the last computer that the request was sent 50 00:04:21,990 --> 00:04:22,830 from. 51 00:04:22,890 --> 00:04:27,230 It can't see you or the original user. 52 00:04:27,240 --> 00:04:30,180 Keep in mind that these servers are shared. 53 00:04:30,180 --> 00:04:36,120 So at any point of time there would be millions of users using data or network. 54 00:04:36,120 --> 00:04:40,320 So there would be lots of requests going in and out of each node. 55 00:04:40,320 --> 00:04:45,780 So when you're going into this node you're not the only user access in this node so there are lots of 56 00:04:45,780 --> 00:04:48,260 requests coming in and out of here. 57 00:04:48,300 --> 00:04:51,370 Same in here and same in here. 58 00:04:51,390 --> 00:04:58,380 So this node could potentially be sending thousands of requests out to a number of Web sites. 59 00:04:58,380 --> 00:05:06,390 Therefore wherever Web site these requests are going to it is very hard for it to profile that request 60 00:05:06,450 --> 00:05:10,000 or to know where that request came from. 61 00:05:10,110 --> 00:05:18,290 Also that sent within the Tor network is always encrypted so you can see the green arrows in here. 62 00:05:18,360 --> 00:05:26,580 These represent encrypted data and the only two times where your data is sent unencrypted is the Red 63 00:05:26,580 --> 00:05:27,270 Arrows. 64 00:05:27,300 --> 00:05:34,530 So it's when you try to send something to the terror network and it's when data leave the Tor network 65 00:05:35,750 --> 00:05:43,870 this arrow right here is not very important because if the Target's website uses hash TTP as or if you're 66 00:05:43,890 --> 00:05:51,480 using a browser plugin that forces a TTP as then this data right here will be encrypted by hasty CPS 67 00:05:51,510 --> 00:05:52,500 by SSL. 68 00:05:53,100 --> 00:06:00,820 So the only point where your data is sent unencrypted is when you're sending data to tour. 69 00:06:00,980 --> 00:06:08,780 Also keep in mind whenever you're sending data to Tor even to your Internet service provider they can 70 00:06:08,780 --> 00:06:14,390 see that you're trying to access tor but they want to be able to see the Web sites you're trying to 71 00:06:14,390 --> 00:06:15,150 access. 72 00:06:15,200 --> 00:06:20,750 So all they'll be able to see is this person right here is trying to access tor but they won't really 73 00:06:20,750 --> 00:06:24,740 be able to see that you're trying to go to Google dot com. 74 00:06:24,740 --> 00:06:30,380 So even if there was a hacker or even if there was censorship in place then you really want to be able 75 00:06:30,380 --> 00:06:32,580 to see which websites you're going to. 76 00:06:32,690 --> 00:06:36,740 They'll only be able to see that your access in detail network.