1 00:00:01,040 --> 00:00:07,670 OK so now that we have a basic understanding on how Bitcoins work and how crypto currencies work in 2 00:00:07,670 --> 00:00:14,840 general and the next lectures I want to walk you through how to use crypto currencies and specifically 3 00:00:14,840 --> 00:00:19,620 bitcoins anonymously on the Internet and on the darknet. 4 00:00:19,970 --> 00:00:24,870 Now first before we can do anything we have to create a wallet. 5 00:00:25,100 --> 00:00:32,900 What we mean by wallet is it's software that's going to hold our money or our crypto currency then we 6 00:00:32,900 --> 00:00:38,240 can use this wallet to send payments receive payments and so on. 7 00:00:38,240 --> 00:00:43,100 So you can think of it similar to the bank account that you get when you sign up with a bank or the 8 00:00:43,100 --> 00:00:47,060 dashboard that you get when you sign up with PayPal. 9 00:00:47,060 --> 00:00:54,170 Now there are a lot of web based wallets where you can access your currency online using a web browser. 10 00:00:54,170 --> 00:00:56,510 There are apps that you can get on your phones. 11 00:00:56,510 --> 00:01:01,060 And there are programs that you can install on your desktop computers. 12 00:01:01,100 --> 00:01:07,550 Now since we're using tales we're going to be using a wallet called Electronic that comes pre installed 13 00:01:07,550 --> 00:01:08,350 entails. 14 00:01:08,360 --> 00:01:14,250 This is very important because as we know Thales is alive operating system it's amnesiac. 15 00:01:14,270 --> 00:01:20,900 So if you install external programs you'll have to install them every time you start tales unless persistence 16 00:01:20,930 --> 00:01:22,720 is enabled. 17 00:01:22,730 --> 00:01:26,090 Another cool thing about electrons is it's really fast. 18 00:01:26,090 --> 00:01:30,470 It doesn't need to download the whole block chain which is pretty big. 19 00:01:30,500 --> 00:01:32,520 It uses an index version of it. 20 00:01:32,540 --> 00:01:39,470 So you can use it as soon as you download or launched the program and the wallets that you create with 21 00:01:39,470 --> 00:01:42,380 electrons can be used from separate computers. 22 00:01:42,380 --> 00:01:49,190 So for example if you destroy your tells build you can just go to another tells and be able to restore 23 00:01:49,190 --> 00:01:53,660 your account and I'll show you how to do that later on in the course. 24 00:01:53,660 --> 00:01:59,510 Now let's go to Thales and all of this will become much easier to understand as we do this practically 25 00:02:00,780 --> 00:02:07,140 so the like I said electron comes to pre installed with tails so you don't need to install it and you 26 00:02:07,140 --> 00:02:15,760 can access it by going to applications Internet and click on electron Now recently a very dangerous 27 00:02:15,760 --> 00:02:23,660 vulnerability was discovered in a previous version of electron but this version was shipped with tails. 28 00:02:23,800 --> 00:02:30,670 And even though tails has been updated multiple times since that version electron did not get updated 29 00:02:30,880 --> 00:02:37,420 because the latest version of electrons still doesn't have a they've been built which is what tails 30 00:02:37,450 --> 00:02:39,270 is built on. 31 00:02:39,280 --> 00:02:45,340 So in this lecture I'm going to show you how to manually install the latest version of electron and 32 00:02:45,430 --> 00:02:49,790 in the next lecture we're actually going to use it now for you in your case. 33 00:02:49,810 --> 00:02:54,280 You can launch it from here and follow what I'm going to show you in the next lecture. 34 00:02:54,460 --> 00:03:00,760 If the program gets stuck then that means tells still doesn't include the latest version of electron 35 00:03:01,000 --> 00:03:06,100 and you'll have to come back to this lecture and install the latest version as I'm going to show you 36 00:03:06,100 --> 00:03:07,820 right now. 37 00:03:08,020 --> 00:03:13,210 Now to download the latest version of electrons you need to go to their Web site electron dot org. 38 00:03:13,210 --> 00:03:15,330 I'll include that in the resources. 39 00:03:15,370 --> 00:03:23,430 We're going to go to download and we're going to select the Linux image the app image right here one 40 00:03:23,440 --> 00:03:31,210 click and we're going to click on Save File and this will automatically be stored in our Tor Browser 41 00:03:31,240 --> 00:03:31,900 directory. 42 00:03:31,900 --> 00:03:32,830 That's fine. 43 00:03:32,990 --> 00:03:37,710 And I'm going to click on Save and this will start downloading it for me. 44 00:03:38,890 --> 00:03:41,770 I'm also going to download the signature right here. 45 00:03:41,770 --> 00:03:46,070 So I'm going to right click this and save link as. 46 00:03:46,120 --> 00:03:48,850 And again this is going to my Tor Browser directory. 47 00:03:48,880 --> 00:03:57,460 I'm going to click on Save and I'm going to scroll down and I'm going to download the developers public 48 00:03:57,460 --> 00:04:01,750 key by right clicking save link as. 49 00:04:01,750 --> 00:04:05,990 And again it's going to go into my downloads and I'm going to click on Save. 50 00:04:06,220 --> 00:04:12,820 The reason why I downloaded the signature for the installer and the public key of the developer Thomas 51 00:04:13,300 --> 00:04:19,030 is because like I explained earlier when you download something from the Internet it can be modified 52 00:04:19,210 --> 00:04:21,290 by a number of entities. 53 00:04:21,430 --> 00:04:27,490 Therefore were you we downloaded the signature and we downloaded the public key of the developer and 54 00:04:27,490 --> 00:04:33,490 we're going to use the public key of the developer and the signature to verify that the file has not 55 00:04:33,490 --> 00:04:36,160 been tampered with since we downloaded it. 56 00:04:36,190 --> 00:04:42,470 Since that developer signed it I've actually explained how this works in details in my encryption section. 57 00:04:42,520 --> 00:04:46,270 So go back and revise that if this sounds a little bit vague. 58 00:04:46,570 --> 00:04:52,870 But basically right now I'm pretty sure the downloads are over and if we go to my tour browser directory 59 00:04:53,710 --> 00:04:56,040 you'll see I have the program itself. 60 00:04:56,050 --> 00:05:01,900 This is electronic this is the executable and we also have the signature for this program that has the 61 00:05:01,900 --> 00:05:10,570 exact same name as the program with the DOT AFC extension and I have Thomas V that a c file which is 62 00:05:10,570 --> 00:05:14,380 the public key of the developer that made this program. 63 00:05:15,220 --> 00:05:21,360 So before I can do anything I have to import this key right here to my key chain. 64 00:05:21,700 --> 00:05:25,030 And I showed you how to do that before so I'm going to do it quickly. 65 00:05:25,030 --> 00:05:26,980 I'm going to go through my applications. 66 00:05:27,070 --> 00:05:37,100 I'm going to go to passwords and keys I'm gonna go to file import and I'm going to select the file which 67 00:05:37,100 --> 00:05:44,180 is in my Tor Browser and it's this file right here Thomas V that a C click on open. 68 00:05:44,180 --> 00:05:47,050 Verify the details click on import. 69 00:05:47,150 --> 00:05:54,530 And this will import is key for me and to verify that I can go here and just look for a thermos. 70 00:05:54,530 --> 00:05:58,750 And as we can see we have the developer key in here. 71 00:05:59,630 --> 00:06:07,020 So now now that we have the key added We can click on the signature right click it and open with verify 72 00:06:07,020 --> 00:06:07,900 signature. 73 00:06:07,970 --> 00:06:10,670 And this will give us a positive result. 74 00:06:10,790 --> 00:06:18,470 If this executable right here did not get modified since Thomas the guy with the key has created this 75 00:06:18,470 --> 00:06:19,770 executable. 76 00:06:20,000 --> 00:06:22,170 So we're going to click on verify. 77 00:06:23,120 --> 00:06:26,000 And as you can see it's telling us that this is valid. 78 00:06:26,000 --> 00:06:31,940 And like I explained before don't worry about the untrusted part as long as it says it's valid. 79 00:06:31,940 --> 00:06:36,990 This means that the file did not get modified since it got signed by Thelma's. 80 00:06:37,700 --> 00:06:43,730 So now we can go ahead and run this file and not worry about it because we know the file did not get 81 00:06:43,730 --> 00:06:45,890 modified since Thomas signed it. 82 00:06:45,890 --> 00:06:54,320 But before we do that I'm actually going to copy this and I'm gonna put it in my persistent directory. 83 00:06:54,470 --> 00:06:58,280 So I'm going to right click here and paste. 84 00:06:58,280 --> 00:07:03,820 And the reason why I'm doing this because like we know Thales is live it's amnesiac. 85 00:07:03,830 --> 00:07:12,160 So every time we restart all the files will be lost unless they are stored in the persistent directory. 86 00:07:12,170 --> 00:07:17,450 Now if you don't have the persistent directory that means persistence is not enabled for you. 87 00:07:17,450 --> 00:07:19,380 I covered this previously in the course. 88 00:07:19,400 --> 00:07:23,670 So please go back to that lecture and see how to enable this now. 89 00:07:23,690 --> 00:07:32,230 Also before using electron I'm going to go to applications and tales we're going to click on configure 90 00:07:32,230 --> 00:07:33,740 persistence. 91 00:07:33,760 --> 00:07:41,620 I did cover this before but I want you to make sure that personal data is enabled and if we scroll down 92 00:07:42,130 --> 00:07:45,160 Bitcoin client is enabled as well. 93 00:07:45,160 --> 00:07:47,200 And the reason why we need these settings. 94 00:07:47,260 --> 00:07:52,910 So when we create a wallet the wallet information will be stored on this computer. 95 00:07:52,960 --> 00:07:56,800 So when we restart we won't have to restore the wallet every time. 96 00:07:56,800 --> 00:07:59,160 We'll just have to put the password. 97 00:07:59,350 --> 00:08:03,790 So I'm going to close this because everything is configured properly for me. 98 00:08:03,850 --> 00:08:07,320 And one last step because I can run executable on tails. 99 00:08:07,330 --> 00:08:09,840 This is a security measure that comes with tails. 100 00:08:09,920 --> 00:08:17,860 You'll need to right click the file go to its properties go to permissions and you need to check this 101 00:08:17,860 --> 00:08:22,180 box that says allow executing file as program. 102 00:08:22,360 --> 00:08:24,010 We're going to close this. 103 00:08:24,010 --> 00:08:27,340 And now every time you want to run electronic. 104 00:08:27,550 --> 00:08:34,490 Don't go to applications Internet com to persistence and double click this executable. 105 00:08:34,630 --> 00:08:37,670 Now as you can see the program has started now. 106 00:08:37,690 --> 00:08:39,060 It doesn't have any wallets. 107 00:08:39,070 --> 00:08:42,010 That's why it's not asking us for a password or anything. 108 00:08:42,370 --> 00:08:44,780 But right now it's ready to be used. 109 00:08:44,920 --> 00:08:49,660 And in the next lecture I'm going to walk you through the basics of this program and we're going to 110 00:08:49,660 --> 00:08:52,240 create our first bitcoin wallet.