1 00:00:01,060 --> 00:00:07,810 In the previous lecture we learned that tour is on an amazing network that we can use in order to protect 2 00:00:07,900 --> 00:00:10,300 our anonymity and privacy. 3 00:00:10,300 --> 00:00:17,170 We learned that it works because it has a number of computers or nodes connected to the network. 4 00:00:17,260 --> 00:00:25,090 And then when we send data through the network it will bounce over a minimum of three nodes before it 5 00:00:25,090 --> 00:00:28,710 goes to the destination. 6 00:00:28,740 --> 00:00:37,500 Now I also mentioned in the previous lecture that Tor allows connected devices to host or to offer services. 7 00:00:37,500 --> 00:00:45,510 Now these services can be a simple Web site and because these Web sites are connected to tour they will 8 00:00:45,510 --> 00:00:54,000 benefit from the anonymity that Tor offers and therefore they're usually referred to as Tawhid in services 9 00:00:54,330 --> 00:00:57,320 or online services. 10 00:00:57,430 --> 00:01:03,580 So this diagram right here would usually look more like this in real life. 11 00:01:03,750 --> 00:01:09,720 So you'd have some nodes or relays which you can use in order to go to a certain destination on the 12 00:01:09,720 --> 00:01:10,450 Internet. 13 00:01:10,770 --> 00:01:17,160 But at the same time some of the connected nodes or some of the connected devices are actually acting 14 00:01:17,460 --> 00:01:18,990 as online services. 15 00:01:18,990 --> 00:01:26,370 So these are similar to normal Web sites that you see on the Internet but they exist within the Tor 16 00:01:26,370 --> 00:01:27,870 network. 17 00:01:27,990 --> 00:01:36,740 They also use a really smart Protocol developed by Tor which is designed to hide the identity of this 18 00:01:36,740 --> 00:01:43,200 server offering the service and the client trying to access the service. 19 00:01:43,290 --> 00:01:52,410 So whenever you try to access a tor service at any point of time both the client and the server offering 20 00:01:52,440 --> 00:01:59,130 the service do not know where or who the other party is. 21 00:01:59,350 --> 00:02:06,970 So let's say instead of trying to go to Google dot com you try to go to this online service right here. 22 00:02:06,970 --> 00:02:11,530 What's going to happen is you're going to connect to the TOR network again connection right here is 23 00:02:11,530 --> 00:02:19,720 not encrypted by tor but the ISP like I said the Internet service provider or any other entity trying 24 00:02:19,720 --> 00:02:21,430 to censor your connection. 25 00:02:21,430 --> 00:02:25,770 They want to be able to see that you're trying to access an online service. 26 00:02:25,870 --> 00:02:30,620 They'll only be able to see that you're connecting to the terror network. 27 00:02:30,610 --> 00:02:35,990 Then once you're in the network you're going to bounce your request over a random node you're going 28 00:02:35,990 --> 00:02:38,100 to go to a second random node. 29 00:02:38,230 --> 00:02:45,870 And finally instead of go into a third node then out to the Internet to another Web site on the Internet. 30 00:02:45,880 --> 00:02:51,910 On the surface web you're going to stay within the Tor network and you're literally just going to go 31 00:02:51,910 --> 00:02:54,280 to your online service. 32 00:02:54,520 --> 00:03:01,210 Now whenever you try to communicate or connect to an online service the process is actually much more 33 00:03:01,210 --> 00:03:04,660 complex than what's shown in this diagram. 34 00:03:04,750 --> 00:03:13,420 It is done over a really smart protocol that is developed by tor so that when you connect to an online 35 00:03:13,420 --> 00:03:21,550 service you want to be able to see or get information about the server offering this service at the 36 00:03:21,550 --> 00:03:29,050 same time the server offering the online service or the hidden service will not be able to get information 37 00:03:29,080 --> 00:03:35,270 about you regarding your location or anything that can identify you. 38 00:03:35,590 --> 00:03:42,940 Again all of this done in order to protect the privacy and anonymity of both the server offering the 39 00:03:42,940 --> 00:03:45,920 service and the user. 40 00:03:46,030 --> 00:03:52,150 Now in the next lecture I'm going to show you how to connect to Tor how to access a hidden service and 41 00:03:52,150 --> 00:03:54,460 you'll be able to understand this better.