1 00:00:00,720 --> 00:00:07,350 In the previous lecture we learned what the third network is how it works and how it's supposed to protect 2 00:00:07,440 --> 00:00:10,290 our privacy and anonymity. 3 00:00:10,290 --> 00:00:15,240 We also learned how to connect to this network using the Tor browser. 4 00:00:15,450 --> 00:00:21,330 So we learned how to properly install it and configure it and then use it to connect to the network 5 00:00:21,630 --> 00:00:29,850 so that we can access Web sites privately and even access Tor hidden services or online services or 6 00:00:29,850 --> 00:00:33,710 what most people refer to as the darknet. 7 00:00:33,720 --> 00:00:39,750 Now this is a very easy and simple method and it's great if you just want to access a Web site quickly 8 00:00:39,750 --> 00:00:43,800 privately or if you just want to have a quick look over the darknet. 9 00:00:44,460 --> 00:00:47,280 But it's not the best method. 10 00:00:47,280 --> 00:00:55,110 The reason for this is because we installed deter Browser in a normal operating system such as Windows 11 00:00:55,140 --> 00:00:57,150 Linux or OS X. 12 00:00:57,270 --> 00:01:05,550 These operating systems regularly collect data about the user about you to improve user experience and 13 00:01:05,550 --> 00:01:13,850 who knows maybe for other reasons not only that but most of these operating systems have other programs 14 00:01:13,880 --> 00:01:21,530 installed on them which also collect data about you again to improve user experience and maybe for other 15 00:01:21,530 --> 00:01:23,210 reasons. 16 00:01:23,210 --> 00:01:29,630 Now all of this collected data can be used to D anonymize you and profile you. 17 00:01:29,630 --> 00:01:36,890 Not only that but all of these programs all of the programs outside the top browser itself access the 18 00:01:36,890 --> 00:01:38,300 Internet directly. 19 00:01:38,360 --> 00:01:40,550 They do not use data or network. 20 00:01:40,670 --> 00:01:44,990 The only program that is using the Tor network is deter browser. 21 00:01:44,990 --> 00:01:50,020 Therefore when these programs leak information about you they are leaking. 22 00:01:50,060 --> 00:01:58,850 Also your proper exact location not only that but we also have issues such as DNS leaks which also would 23 00:01:58,850 --> 00:02:05,750 leak information about you and not to mention that all of these programs and operating systems have 24 00:02:05,750 --> 00:02:11,990 a history of being vulnerable to code execution and buffer overflow vulnerabilities. 25 00:02:11,990 --> 00:02:18,890 Now these vulnerabilities can be used to gain full control over your computer and obviously once someone 26 00:02:18,890 --> 00:02:27,410 has control over your computer no one where you are getting information about you is very very simple. 27 00:02:27,410 --> 00:02:34,790 Therefore in this section I want to show you a much better method to protect our anonymity and privacy. 28 00:02:34,790 --> 00:02:40,430 This method is a little bit more complex and will require a little bit more work and a little bit more 29 00:02:40,430 --> 00:02:41,350 hardware. 30 00:02:41,510 --> 00:02:43,440 But don't worry about it. 31 00:02:43,520 --> 00:02:49,460 I'm going to break it into very simple lectures and I'm going to walk you through the steps one by one 32 00:02:49,760 --> 00:02:55,940 and you're going to learn exactly how it's going to work and why it's so much better than just installing 33 00:02:55,970 --> 00:02:59,180 the Tor browser on a normal operating system.