1 00:00:00,760 --> 00:00:07,450 So in this section I'm going to show you a better method to improve our anonymity and privacy and to 2 00:00:07,450 --> 00:00:09,670 access the darknet. 3 00:00:09,940 --> 00:00:16,020 We're going to use an operating system designed to protect our anonymity and privacy. 4 00:00:16,030 --> 00:00:17,980 You probably already heard of this. 5 00:00:18,100 --> 00:00:25,630 It's called tails and it stands for the incognito amnesiac live operating system. 6 00:00:25,690 --> 00:00:28,240 It's a Linux based operating system. 7 00:00:28,240 --> 00:00:34,870 And what they mean by life is that you install it on a USB stick or on a DVD. 8 00:00:35,170 --> 00:00:37,270 And then you can start it. 9 00:00:37,300 --> 00:00:45,010 You can put it in any computer you want regardless of what operating system installed on that computer. 10 00:00:45,010 --> 00:00:49,340 So it doesn't matter if that computer runs Windows Linux OS X. 11 00:00:49,420 --> 00:00:52,840 All you need is your USB stick with tales on it. 12 00:00:52,840 --> 00:01:00,890 You stick it in you boot from it and you can use tools from their the really cool thing about Thales 13 00:01:00,920 --> 00:01:08,840 which is where the incognito comes from is the fact that all traffic sent from it will go through the 14 00:01:08,840 --> 00:01:09,970 Tor network. 15 00:01:09,980 --> 00:01:14,010 So not only browsing traffic not only messaging traffic. 16 00:01:14,150 --> 00:01:22,390 Anything you do on that system or any program you even install on that system will have to you is detour 17 00:01:22,400 --> 00:01:24,270 network for its traffic. 18 00:01:24,380 --> 00:01:33,590 Therefore it eliminates the fear or the risks of other programs leaking data tells also never touches 19 00:01:33,590 --> 00:01:36,850 the storage of your computer other than the ram. 20 00:01:37,040 --> 00:01:43,920 So it completely runs using the ram which gets cleared wants to restart or shut down your computer. 21 00:01:43,970 --> 00:01:48,260 Therefore it leaves no traces on the used computer. 22 00:01:48,260 --> 00:01:51,530 And this is where the word amnesia comes from. 23 00:01:51,560 --> 00:01:58,970 This means that you can use any computer to use tools and once done there will be no traces of what 24 00:01:58,970 --> 00:02:01,760 you did on that computer. 25 00:02:01,760 --> 00:02:07,880 So let's say for argument's sake you use tails which are already routs or traffic through the Tor network 26 00:02:08,180 --> 00:02:15,020 but somehow someone managed to identify where you are and the anonymize you and they come and they use 27 00:02:15,020 --> 00:02:19,760 your computer and they inspect that computer to see what you did on it. 28 00:02:19,760 --> 00:02:25,940 If you turn off that computer there will be no traces of what you did on that computer. 29 00:02:25,940 --> 00:02:31,340 Not only that but there will even be no traces of tails on that computer. 30 00:02:31,340 --> 00:02:38,980 So it will seem as if you did not even run tails on that computer so that's why tails is really really 31 00:02:38,980 --> 00:02:39,300 cool. 32 00:02:39,310 --> 00:02:41,190 Because first of all it's life. 33 00:02:41,230 --> 00:02:47,650 Once we have it installed on a USB stick or on a DVD we can use it from any computer we want. 34 00:02:47,650 --> 00:02:55,150 Second it's incognito so all traffic sent from tails will always go through detour network. 35 00:02:55,240 --> 00:02:57,090 Second it's incognito. 36 00:02:57,100 --> 00:02:58,000 It's private. 37 00:02:58,000 --> 00:03:05,780 So anything we do on a tail system using any program will always go through the Tor network. 38 00:03:05,860 --> 00:03:08,500 And finally it leaves no traces. 39 00:03:08,500 --> 00:03:14,920 So once we turn off that computer if the computer gets inspected there will be no traces of what we 40 00:03:14,920 --> 00:03:15,410 did. 41 00:03:15,460 --> 00:03:23,330 And there will even be no traces that tells was even used on that computer so throughout the section 42 00:03:23,420 --> 00:03:30,380 we're going to learn how to properly configure tails install it and use it to access Web sites privately 43 00:03:30,380 --> 00:03:33,500 and anonymously and access the darknet.