1 00:00:00,760 --> 00:00:08,230 In this lecture I'm going to show you how to verify and install the teller browser on a Linux computer. 2 00:00:08,270 --> 00:00:15,770 If you have a Windows or an Apple OS X system then please go back to the previous lectures where I show 3 00:00:15,770 --> 00:00:21,740 how to do this in details for these operating systems only watch this lecture. 4 00:00:21,740 --> 00:00:29,450 If you want to learn how to install the Tor browser on Linux otherwise skip it and you won't lose any 5 00:00:29,450 --> 00:00:30,410 information. 6 00:00:30,410 --> 00:00:36,620 You can continue from the next lecture where I'm gonna show you how to use detailed browser. 7 00:00:36,980 --> 00:00:44,480 So the instructions that I'm gonna show you right now will work on most Linux this throws like fedora. 8 00:00:44,570 --> 00:00:53,320 Debian and KDE but I'm going to do it from your wound too because this is the most popular one so the 9 00:00:53,320 --> 00:00:59,500 first thing that you want to do is go to the tour browser download page that I have right here and I'm 10 00:00:59,500 --> 00:01:03,560 going to include its links in the resources of this lecture. 11 00:01:03,790 --> 00:01:10,150 You want to scroll down to where you have the downloads for all the operating systems and this time 12 00:01:10,210 --> 00:01:16,810 we want to install it on Linux so I'm gonna go here to the right where it says Linux and I'm gonna download 13 00:01:16,810 --> 00:01:21,900 the first one because this is the English version. 14 00:01:22,060 --> 00:01:29,140 Now I have the 64 bit computer so I'm going to click on the 64 bits and this will allow me to download 15 00:01:29,140 --> 00:01:35,640 the third version for Linux for 64 bit computers I've already downloaded this right here. 16 00:01:35,650 --> 00:01:42,570 As you can see in my downloads so I'm going to cancel this and once you have downloaded all you have 17 00:01:42,570 --> 00:01:48,520 to do is really extracted and run the binary that will run the browser for you. 18 00:01:49,680 --> 00:01:56,610 But before doing this it's a really good idea to verify that the file that we just downloaded right 19 00:01:56,610 --> 00:02:02,040 here has not been modified as it was being downloaded. 20 00:02:02,520 --> 00:02:08,520 Because when you download something from the internet it passes through a number of nodes and it can 21 00:02:08,520 --> 00:02:17,040 actually be modified by your Internet service provider by your network admin or even by hackers. 22 00:02:17,040 --> 00:02:20,090 If they manage to intercept the connection. 23 00:02:20,400 --> 00:02:28,530 So what I want to do right now is verify that the file that I just downloaded did not get modify as 24 00:02:28,620 --> 00:02:33,240 it was being downloaded from the tower Web site to do this. 25 00:02:33,240 --> 00:02:38,740 We're going to use a signature file provided by toward developers. 26 00:02:39,090 --> 00:02:47,010 So as you can see on this page each download has a sig this sig stands for signature. 27 00:02:47,130 --> 00:02:53,190 And this is a file that is unique to this download to the installer. 28 00:02:53,340 --> 00:03:01,260 It was generated by the developers when they packaged the installer and it can be used to verify that 29 00:03:01,260 --> 00:03:07,850 the installer did not get modified since it was packaged by the developers. 30 00:03:08,190 --> 00:03:14,150 So to verify the installer the first step is to download its signature. 31 00:03:14,190 --> 00:03:18,510 So like I said as you can see each file has its own signature. 32 00:03:18,510 --> 00:03:24,480 I downloaded this file right here so I'm going to download this signature and here I'm going to right 33 00:03:24,480 --> 00:03:28,370 click the signature save link us to save it. 34 00:03:29,600 --> 00:03:35,060 And I'm going to choose where I want to download it and I'm going to keep it in my downloads so I'm 35 00:03:35,060 --> 00:03:44,380 going to click on Save and as you can see I have it right here that has a dot a C extension. 36 00:03:44,440 --> 00:03:52,510 Now before we can use this file to verify the installer we need to import the key of the Tor developers. 37 00:03:53,560 --> 00:04:01,600 So yeah we're gonna go to the TOR verify page and this is the key of the third developers right here. 38 00:04:02,170 --> 00:04:07,730 So what we're going to do is we're going to import this key using the GPL command. 39 00:04:07,840 --> 00:04:12,060 We're saying that we want to import a key from this server. 40 00:04:13,230 --> 00:04:16,320 And we're giving it the server that we want to get the key from. 41 00:04:16,770 --> 00:04:22,440 And then we're using the receive key argument to receive this particular key. 42 00:04:23,640 --> 00:04:28,690 So I'm literally going to copy this command and paste it here. 43 00:04:30,760 --> 00:04:36,520 And when you run this command give it some time and might actually take up to a minute or two and it 44 00:04:36,520 --> 00:04:38,650 might fail once or twice. 45 00:04:38,650 --> 00:04:41,120 So keep trying it until it works. 46 00:04:41,140 --> 00:04:47,500 The reason why it might fail is because maybe at the time of you trying this command these servers would 47 00:04:47,500 --> 00:04:54,970 be under a lot of pressure but as you can see it works for me in a relatively short period of time and 48 00:04:55,000 --> 00:04:56,920 I managed to import the key. 49 00:04:57,010 --> 00:04:59,490 As you can see in here. 50 00:04:59,680 --> 00:05:07,810 So now we can actually go ahead and verify the installer but before I do this I want them double check 51 00:05:07,900 --> 00:05:15,400 and make sure that I imported the correct key so to do this I'm going to use the G.P.S. command again 52 00:05:16,570 --> 00:05:19,780 and I'm going to say I want to get the fingerprint 53 00:05:22,590 --> 00:05:24,930 of the key that I just imported. 54 00:05:24,960 --> 00:05:29,400 So the fingerprint of this key right here again I'm gonna copy it. 55 00:05:31,490 --> 00:05:32,650 Paste it here. 56 00:05:34,050 --> 00:05:37,540 This command will give me the fingerprint of the key. 57 00:05:38,240 --> 00:05:46,150 And we're going to compare this to the fingerprints that we have in here and as you can see they're 58 00:05:46,150 --> 00:05:47,270 identical. 59 00:05:47,380 --> 00:05:49,080 And because they are identical. 60 00:05:49,090 --> 00:05:52,900 This means that we have imported the correct key. 61 00:05:53,440 --> 00:06:00,220 So the last step now is to use the signature file that we downloaded right here to verify and make sure 62 00:06:00,430 --> 00:06:08,530 that this installer did not get modified so before we can do that we'll need to first navigate to where 63 00:06:08,530 --> 00:06:11,710 the installer and the key file are stored. 64 00:06:11,710 --> 00:06:15,420 And as you can see they're stored in my downloads directory. 65 00:06:15,490 --> 00:06:24,360 So right now if I do Pete WD on my terminal you'll see I'm in Holmes Zaid so I'll need to go to downloads. 66 00:06:24,400 --> 00:06:33,330 So I'm going to do C.D. downloads and now if I do Pete WD to get my working directory you can see I'm 67 00:06:33,360 --> 00:06:40,890 in home Z downloads and if I do l s to list all of the files and directories in the current working 68 00:06:40,890 --> 00:06:47,650 directory you'll see I have these two files right here which are the same files that I have in here. 69 00:06:47,670 --> 00:06:51,870 So right now I'm basically in the downloads using my terminal. 70 00:06:53,130 --> 00:06:56,790 So all I have to do right now is verify this signature. 71 00:06:57,060 --> 00:07:02,910 So we're going to say gee PGE again the same command that we've been running and we're going to say 72 00:07:02,910 --> 00:07:10,260 I want to verify and give it the name of my signature file which is this file right here 73 00:07:13,040 --> 00:07:21,280 I'm going to hit enter on perfect as you can see it's telling us that this is a good signature from 74 00:07:21,310 --> 00:07:23,710 the Torah browser developers. 75 00:07:23,710 --> 00:07:32,230 So basically what this means is it means that this signature right here the Torah browser package that 76 00:07:32,230 --> 00:07:37,570 we just downloaded right here has not been modified ever since. 77 00:07:37,570 --> 00:07:44,390 This signature was made and we know that this signature is valid because we got the signature from the 78 00:07:44,390 --> 00:07:52,210 third download page and we also validated the toward developer key is using the instructions from here 79 00:07:53,440 --> 00:07:55,440 so we can ignore the warning here. 80 00:07:55,450 --> 00:08:03,550 The warning here literally just saying that G is not able to validate the signature creator so it wasn't 81 00:08:03,550 --> 00:08:11,170 able to validate the creators of tau but we know that these signatures are valid because we verified 82 00:08:11,170 --> 00:08:18,100 their key with the instructions that we saw in here and we validated the signature that we got from 83 00:08:18,100 --> 00:08:20,690 their web page. 84 00:08:20,930 --> 00:08:27,700 So now that we are happy that this package has not been modified ever since it was packaged by the third 85 00:08:27,700 --> 00:08:31,280 developers we can go ahead and uncompressed it. 86 00:08:31,340 --> 00:08:41,990 So I'm gonna right click it extract here and we have the package content right here and if we navigate 87 00:08:42,050 --> 00:08:51,640 inside this we have the browser and this is the binary that you want to run in order to run the browser. 88 00:08:51,770 --> 00:08:55,550 So I'm going to go back to my terminal right here. 89 00:08:55,640 --> 00:09:05,120 I'm going to clear the screen and keep in mind in my terminal if I do P.W. deep already in my downloads 90 00:09:05,210 --> 00:09:06,370 directory. 91 00:09:06,530 --> 00:09:13,910 So if I do Elyse you'll see the directory that was just created when we uncompressed the package so 92 00:09:13,910 --> 00:09:22,250 we can navigate into this by doing C D Tor Browser Linux the whole thing you can actually use the top 93 00:09:22,250 --> 00:09:28,940 two autocomplete I'm going to hit enter and I'm inside this directory right here. 94 00:09:28,940 --> 00:09:32,840 The next thing I need to do is to go inside this directory. 95 00:09:32,840 --> 00:09:38,510 So again if I do less you'll see we have one directory in here. 96 00:09:38,510 --> 00:09:44,560 So we're going to do see the Tor Browser E and U S again. 97 00:09:44,600 --> 00:09:51,980 If I do allows it to list all the files and directories and similar to what you see in here we have 98 00:09:51,980 --> 00:09:57,480 the browser on the start tor browser the desktop. 99 00:09:57,870 --> 00:10:01,680 Note that this right here is in green. 100 00:10:01,680 --> 00:10:10,380 This means that this is an executable so we can run any executable in Linux by doing that forward slash 101 00:10:10,980 --> 00:10:18,330 followed by the executable name which is start tor browser the desktop. 102 00:10:18,330 --> 00:10:25,800 I'm going to hit enter to run this executable and this will launch the Utah browser for me as you can 103 00:10:25,800 --> 00:10:26,530 see. 104 00:10:26,670 --> 00:10:33,390 And in order to connect to the tour network all I have to do is just click on Connect here this will 105 00:10:33,390 --> 00:10:35,180 connect to the tour network. 106 00:10:35,260 --> 00:10:41,630 It will configure the browser to send all data through the Tor network. 107 00:10:41,760 --> 00:10:47,660 And as you can see I'll get a Firefox window browser similar to Firefox. 108 00:10:47,850 --> 00:10:56,490 But like I said any Web site that you'll go to through this browser will be loaded over detour network 109 00:10:58,420 --> 00:11:00,720 so that's it for this lecture right now. 110 00:11:00,760 --> 00:11:09,220 We managed to install the Tor browser on linux using a clean and unmodified package. 111 00:11:09,280 --> 00:11:13,450 Don't worry about how to use it or browser and about its settings. 112 00:11:13,480 --> 00:11:16,270 We will talk about that in the next lectures.