Plaintext Packets
Plaintext Packets
  • 44
  • 516 944
How VPNs Protect You Online
In this video I explain how VPNs work, and how in many cases they protect your privacy. I also explain how some users use VPNs to browse geo-restricted content, and finally end with some limitations of VPN and what isn't protected.
Support the channel:
buymeacoffee.com/plaintextpm
Discord:
discord.gg/CV5DzzaYF5
มุมมอง: 874

วีดีโอ

How Companies Track You Inside Their Stores
มุมมอง 1.1K2 หลายเดือนก่อน
In this video I cover how large companies use Bluetooth beacons to track your activities in their stores. This data is used to understand your habits, but can also be sold to third parties. Useful links: en.wikipedia.org/wiki/Proximity_marketing Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
3 Ways to Secure Your Surfing Online - VPNs, DNS Security and Ad Blockers
มุมมอง 2.3K2 หลายเดือนก่อน
In this video I show you some options to help safeguard your privacy online, and demonstrate how they work. We cover virtual private networks (VPNs), secured DNS and finally ad blocking technologies. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
How Tor Works - Surfing Privately with Tor
มุมมอง 9752 หลายเดือนก่อน
In this video I cover one method of keeping your activities private online - Tor. Tor is a tool that is used widely to allow users to surf websites anonymously. I cover how exactly Tor works, what is protects and doesn't, and some trade offs in performance due to enhanced privacy. Useful Links: Tor - www.torproject.org/ Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5Dz...
10 Ways Companies Track You Online
มุมมอง 1.3K3 หลายเดือนก่อน
In this video I quickly run through 10 ways large companies are able to track your activities and build a profile on you as you use their services. This includes concepts such as ad networks, cookies, voice assistants, physical tracking in stores and more. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
How Governments Watch the Web - Why Absolutely Privacy Online Doesn't Exist
มุมมอง 6K3 หลายเดือนก่อน
In this second instalment of my privacy series, I cover how governments and big tech aggregate data to effectively monitor all users on the internet. We cover how data is captured using network taps, how popular websites provide data feeds, and the tools used to analyze it all. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
What Can Your ISP See? - What Your ISP Knows About Your Internet Activities
มุมมอง 17K3 หลายเดือนก่อน
In this video I show you just what information your internet provider (ISP) can determine from analyzing your traffic. This includes what websites you visit, and in some cases just what you're doing on this websites. I also cover what benefits VPNs have to safeguard your traffic, while explaining that absolute privacy on the internet doesn't really exist. Useful links: Support the channel: buym...
Learn TCP with Shell Shockers and Wireshark!
มุมมอง 1.3K3 หลายเดือนก่อน
In this video I do a deep dive into the TCP protocol by analyzing traffic from the game Shell Shockers! I cover: - Finding the IP of a specific web connection using Developer tools and conversation views - TCP theory and comparisons to UDP - The three-way handshake in detail - IP vs TCP conversations - Sequence / acknowledgement analysis - Live Shell Shockers action! :) Useful links: Support th...
How NMAP Works and How to Detect Port Scans in Wireshark
มุมมอง 3.4K3 หลายเดือนก่อน
In this video I demonstrate how port scanning works using the popular tool NMAP. I dig into some theory on how NMAP can detect a port is open, show you how to detect a port scan in a Wireshark capture, then cover some ways to deter and obfuscate your services from scanning. Useful links: Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Hacking WiFi: Sniffing Traffic from Open Networks
มุมมอง 4.1K3 หลายเดือนก่อน
In this highly requested video I will be showing you how to sniff traffic from open wifi networks and analyze in Wireshark. I also cover why open wifi is so dangerous and why VPNs can protect you when you have no choice but to connect. Useful links: How to Make a Bootable Kali Linux USB: www.kali.org/docs/usb/live-usb-install-with-windows/ For wifi adapters that support monitor mode, Google 'wi...
Troubleshoot Docker Network Issues Using Wireshark
มุมมอง 6803 หลายเดือนก่อน
In this video I troubleshoot some network performance issues in Docker using tcpdump and Wireshark. I show you how to build a custom image containing tcpdump, how to capture the data, and dive into some advanced Wireshark analysis to figure out the network issue. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Learn How the Address Resolution Protocol (ARP) Works in 10 Minutes
มุมมอง 1.5K4 หลายเดือนก่อน
In this video I do a quick overview of the address resolution protocol, commonly known as ARP. I explain why MAC addresses are needed when communicating on a local network and how ARP helps populate mac address tables on networked-devices. Support the channel: buymeacoffee.com/plaintextpm Discord: discord.gg/CV5DzzaYF5
Free ISP Tracking in 5 Minutes - Netprobe Quick Tutorial
มุมมอง 2.7K4 หลายเดือนก่อน
In this quick tutorial, I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. Total install time is about 5 minutes. For a full tutorial see the link below. To get started with Netprobe: 1. Download the repo here: github.com/plaintextpackets/netprobe_lite 2. Install docker: docs.docker.com/engine/install/ 3. From the comma...
Track Your Internet Quality for Free - Netprobe Full Tutorial
มุมมอง 66K4 หลายเดือนก่อน
In this continuation video to 'Speed Overkill - How ISPs Sell You Bandwidth You Don't Need', I show you how to install and use the free open-sourced tool Netprobe to monitor the quality of your ISP connection over time. We cover a little theory on how Netprobe works, how to get the app launched in docker, and finally how to read the data from each metric. To get started with Netprobe: 1. Downlo...
How to Filter Conversations in Wireshark
มุมมอง 1.4K4 หลายเดือนก่อน
How to Filter Conversations in Wireshark
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance (+ Bonus Free ISP Monitor Tool)
มุมมอง 20K4 หลายเดือนก่อน
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance ( Bonus Free ISP Monitor Tool)
Wireshark Freestyle #2 - Finding Secrets in Open Wifi Networks
มุมมอง 1.9K4 หลายเดือนก่อน
Wireshark Freestyle #2 - Finding Secrets in Open Wifi Networks
Learn How Speedtest.net Works Using Wireshark
มุมมอง 3.7K5 หลายเดือนก่อน
Learn How Speedtest.net Works Using Wireshark
How to Measure YouTube Bandwidth Using Wireshark
มุมมอง 2.2K5 หลายเดือนก่อน
How to Measure TH-cam Bandwidth Using Wireshark
How to Smuggle Data with Ping Part 2 - Windows Version
มุมมอง 3.5K5 หลายเดือนก่อน
How to Smuggle Data with Ping Part 2 - Windows Version
How to Smuggle Data out of the Network with Ping
มุมมอง 118K5 หลายเดือนก่อน
How to Smuggle Data out of the Network with Ping
Extract TLS Certificates using Wireshark
มุมมอง 6K5 หลายเดือนก่อน
Extract TLS Certificates using Wireshark
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
มุมมอง 2.8K5 หลายเดือนก่อน
Wireshark for Cable Technicians - How to Prove that Internet Access is Healthy
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
มุมมอง 2.1K5 หลายเดือนก่อน
Wireshark for Helpdesk Analysts - Troubleshooting a User's Website Issue
Why Should You Learn Wireshark?
มุมมอง 2.4K6 หลายเดือนก่อน
Why Should You Learn Wireshark?
How to Capture Traffic in Wireshark
มุมมอง 4.6K6 หลายเดือนก่อน
How to Capture Traffic in Wireshark
How to Take Down a Wifi Network from Within
มุมมอง 2.7K6 หลายเดือนก่อน
How to Take Down a Wifi Network from Within
How to DoS Your Network with this One Command
มุมมอง 9K6 หลายเดือนก่อน
How to DoS Your Network with this One Command
Extract Passwords from Telnet using Wireshark
มุมมอง 2.1K6 หลายเดือนก่อน
Extract Passwords from Telnet using Wireshark
Community Captures #1 Troubleshooting SMTP with Wireshark
มุมมอง 8317 หลายเดือนก่อน
Community Captures #1 Troubleshooting SMTP with Wireshark

ความคิดเห็น

  • @smityment674
    @smityment674 2 วันที่ผ่านมา

    Good video. It is very useful to understand how to check the packet loss. good work keep it up !!!! 👏👏👏🙏

  •  3 วันที่ผ่านมา

  • @GpconnectInfohotspot
    @GpconnectInfohotspot 4 วันที่ผ่านมา

    great work ! how the data processed by netprobe is send to prometheus to be displayed on grafana ? would love to run several netprobe to one grafana

    • @plaintextpackets
      @plaintextpackets 4 วันที่ผ่านมา

      Prometheus is just a data source co figured in grafana- you can add more data sources

  • @mohammadchavoshi5568
    @mohammadchavoshi5568 4 วันที่ผ่านมา

    Awesome explanation and simulation

  • @ATC-aviation
    @ATC-aviation 5 วันที่ผ่านมา

    Hi, I have got netprobe up and running using docker compose. I have accessed the directories and files but dont seem to be able to find the .env dile, any ideas?????

    • @plaintextpackets
      @plaintextpackets 5 วันที่ผ่านมา

      Are you running it in Linux? It may be hidden if so, try “ls -l” to see it

    • @ATC-aviation
      @ATC-aviation 5 วันที่ผ่านมา

      @@plaintextpackets .env file doesnt seem ot be present after using the docker compose up but I do have data but unconfigured and no speedtest

    • @plaintextpackets
      @plaintextpackets 5 วันที่ผ่านมา

      The .env file will be in the folder with the rest of the source code. If you look at GitHub you’ll see it. And the fact that the tool runs means it’s there

  • @NaiveExplainer
    @NaiveExplainer 8 วันที่ผ่านมา

    is it possible for me to see the flood happening through wireshark? like would I be able to see the source and the destination of the attacker ?

    • @plaintextpackets
      @plaintextpackets 8 วันที่ผ่านมา

      You would need to capture the traffic at your isp router or your firewall (if you have a separate one). Then you could see it in Wireshark. Problem is most consumer devices don’t offer capture capabilities, you need something more advanced like hosting your own router on a vm or an enterprise router / fw

    • @NaiveExplainer
      @NaiveExplainer 8 วันที่ผ่านมา

      @@plaintextpackets oh I see! I tried to capture the traffic while performing the attack from another computer but not for more than thrice did I see the ip of that computer. I was so confused. Thanks!

    • @plaintextpackets
      @plaintextpackets 8 วันที่ผ่านมา

      No problem!

    • @NaiveExplainer
      @NaiveExplainer 8 วันที่ผ่านมา

      @@plaintextpackets I have another query, as I am flooding the upload pipe , is the enormous traffic going to affect the isp in anyway?

  • @srivathsa1
    @srivathsa1 8 วันที่ผ่านมา

    Lovely tool, thank you , is there a way we can change the website address or dns after installation .

    • @plaintextpackets
      @plaintextpackets 8 วันที่ผ่านมา

      Yes you can edit the configuration file to change those

  • @techlearner4806
    @techlearner4806 9 วันที่ผ่านมา

    Hello. Can we extract certificate from the TLSv1.3??

  • @killshxxxt5147
    @killshxxxt5147 10 วันที่ผ่านมา

    love your work man!

  • @endritlleshi2000
    @endritlleshi2000 12 วันที่ผ่านมา

    Your channel is a hidden gem my man. Can you also explain using tor with vpn and if that adds a layer of security or not!

  • @horrified01
    @horrified01 14 วันที่ผ่านมา

    hey man came across your content and loving it its filling in some blanks that I have…….quick question are there any work arounds when ISP uses CGNAT…….I hate not having my own public ip……but understand ISP business incentive and IPv4 issues they face

    • @plaintextpackets
      @plaintextpackets 14 วันที่ผ่านมา

      Hi there! Do you mean you want a public IP of your own instead of using the cgnat?

    • @horrified01
      @horrified01 10 วันที่ผ่านมา

      @@plaintextpackets because im only just self learning about CGNAT even though I see its been around for a while ive only just realised mainly in my online gaming…..some games ping atrocious and the odd game its like ive never seem before…..I was just wondering if there is a work around but ive read enough to know there isnt unless paying for it

  • @Nill-xx9mv
    @Nill-xx9mv 17 วันที่ผ่านมา

    good explanation easy to understand for newbies

  • @DamonDawson
    @DamonDawson 20 วันที่ผ่านมา

    I cannot get Docker Desktop to work on a either a Server 2022 or Windows 11 system that is running as a VM on VMware ESX. I get an error about WSL that reads, "WSL2 is not supported with your current machine configuration." Does anyone know if Docker won't run an a VM? I read somewhere that it requires the Enterprise version of Docker (not the free version). Is there any option to run this without Docker?

    • @plaintextpackets
      @plaintextpackets 20 วันที่ผ่านมา

      You can but it’s a lot more difficult as you have to install some components manually from source (grafana, Prometheus). Can you spin up a Linux VM?

    • @DamonDawson
      @DamonDawson 20 ชั่วโมงที่ผ่านมา

      @@plaintextpackets Thanks for the reply. Sure, I'll give Linux a try. My preference is to use Windows (since that's what I know best) but if it's easier for Docker I can get a flavor of Linux running. What flavor of Linux do you think would work best for this. I'm thinking Ubuntu. Is that a good choice?

    • @plaintextpackets
      @plaintextpackets 14 ชั่วโมงที่ผ่านมา

      @DamonDawson Ubuntu would work well

    • @DamonDawson
      @DamonDawson 11 ชั่วโมงที่ผ่านมา

      @@plaintextpackets Thank you for all the help.

  • @krishnasharma8195
    @krishnasharma8195 25 วันที่ผ่านมา

    Learnt something new today, thank you ❤

  • @extrenzkey3841
    @extrenzkey3841 28 วันที่ผ่านมา

    так а где TCP SYN Flood то

  • @xDelmore
    @xDelmore 29 วันที่ผ่านมา

    Do you have to be on the same network to listen?

    • @plaintextpackets
      @plaintextpackets 28 วันที่ผ่านมา

      You need to take a capture of the traffic, there are methods to do this like ARP poisoning which do require you to be on the same network

    • @xDelmore
      @xDelmore 28 วันที่ผ่านมา

      @@plaintextpackets can you also make a video on how to capture otp messages with Wireshark?

  • @TradersTradingEdge
    @TradersTradingEdge หลายเดือนก่อน

    Hi. I hope you don't stop with the videos. Great information and learning material. Keep it going! 👍

    • @plaintextpackets
      @plaintextpackets หลายเดือนก่อน

      Thanks! Taking the summer off but will be back soon

  • @Zeroduckies
    @Zeroduckies หลายเดือนก่อน

    i used to transfer small lua games thru ping at school ^^

  • @keaco73
    @keaco73 หลายเดือนก่อน

    Hi, I just installed your software in a Windows docker container. Few questions, is there a copy of the live source code within Docker or are the LIVE files within the same folder I unzipped the original download? So for instance, I downloaded the code to "Downloads" folder I have to enter my DNS IP in the env file within that folder or is a live copy within Docker that I should modify instead? Also, under the DNS category of the Dashboard I dont see the DNS IP I entered reflected anywhere. Lastly, is there a way to modify my DNS IP from the Dashboard too? thanks for your help!

    • @plaintextpackets
      @plaintextpackets หลายเดือนก่อน

      Hi there, yes you need to modify the file in the source code folder and docker will pick it up when launching. Docker will take that file and load it into the container. If you don’t see the DNS IP under “My DNS Server” ensure you set the ip prior to launching docker. Unfortunately no way of editing the vars from the gui Good luck!

  • @roadmonitoroz
    @roadmonitoroz หลายเดือนก่อน

    It would be interesting to know if that happens here and whether it would be needed. The shopping centre I visit (groceries) has a rewards card (pretty common). They even push it (cashier *if you can find one* asks you if you have a [insert rewards card name] card. They offer you discounts by the points you collect. i.e. Spend $10, get 10 points. 2000 points = $10 The thing is... By scanning that card (registered with your name and a unique identifier) , they now know who you are, every item you buy. I know this for a fact, because even when I shop online (usually done in person) , my previous purchased (whether online or in person) are in my history and get suggested to me (to make shopping easier *to make me spend more money*) The reason I initially signed up was that a petrol (gas) station gave rewards for fuel . I drove a company vehicle and would go through $40 - $70 / day. That meant I would (just by scanning it) , get free money (at least $10) / month for nothing. I've managed to score over $1000 in rewards (free cash for groceries / free fuel Everything is logged and watched these days. The checkout (self checkout) even has a build in camera to identify what type of thing you are weighing. It can tell if it is a tomato, granny smith apple / banana and brings up that option on the screen when you press "fruit and veg" button. Of course it weighs your bags (to stop shop lifting) and there are probably AI hooked to those cameras above you watching for suspicious activity.

  • @arcataslacker
    @arcataslacker หลายเดือนก่อน

    Rookie question but how do I reset my Grafana password? I've tried deleting the containers and volumes for netprobe but for some reason the Grafana password persists

    • @plaintextpackets
      @plaintextpackets หลายเดือนก่อน

      When you delete do “docker compose down -v” and that will delete all volumes as well, which store the persistent configs

  • @8rupees718
    @8rupees718 หลายเดือนก่อน

    Thankyou Sir, you explain the concepts very well!

  • @zeeventuresph
    @zeeventuresph หลายเดือนก่อน

    is this possible to monitor 2 isp's at the same time?

    • @plaintextpackets
      @plaintextpackets หลายเดือนก่อน

      Not with the current version no. You’d need to install it on two different machines or VMs and hone each one to a different ISP

  • @Hackdaplanet-lp1ex
    @Hackdaplanet-lp1ex หลายเดือนก่อน

    Oh wow u just tap el chapo personal phone...damnnnn 😂

  • @juancampos352
    @juancampos352 2 หลายเดือนก่อน

    I love your videos, bro. You're helping me a lot of understanding this kind of concepts like VPN.

  • @kv4atv
    @kv4atv 2 หลายเดือนก่อน

    I always turn Bluetooth OFF as soon as I get near the parking lot. Except for the cameras, your signal basically vanishes. Other than that would be to turn off your phone or leave it locked in the car turned off until you return. Electronic stalking should be Illegal. Stalking is stalking no matter how it's done.

  • @juanmondragon
    @juanmondragon 2 หลายเดือนก่อน

    Keep up the great work. Your videos are assisting me in my IT career

  • @TonoNamnum
    @TonoNamnum 2 หลายเดือนก่อน

    In the past that used to happen a lot. But today most modern phones will randomize that. Even your phone randomizes it's Mac address because of this. It's called Bluetooth address randomization.

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      It has gotten better as many vendors have employed Bluetooth and wireless Mac randomization, but still not consistently employed. I’m also curious whether they are able to fingerprint devices using other identifiers within the beacon frames

  • @priyajagyasi3561
    @priyajagyasi3561 2 หลายเดือนก่อน

    hey, How to capture traffic for a particular URL. Lets say I am pinging any application's IP or running it on my browser. How to capture and get packet loss for that application?

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      Get the IP of the URL first (in a terminal do “nslookup google.com” as an example) Then apply the capture filter “host x.x.x.x” where x.x.x.x is the IP you found for the website

  • @0xhamody
    @0xhamody 2 หลายเดือนก่อน

    The question is, why do you use Windows still?!

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      I use windows and Linux interchangeably. For recording videos Windows is much more user friendly

  • @majiddehbi9186
    @majiddehbi9186 2 หลายเดือนก่อน

    ok where id wshark role here and how can we see clearly what going on

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      There are Bluetooth radios you can get for your laptop to sniff Bluetooth packets.

  • @khayla_matthews
    @khayla_matthews 2 หลายเดือนก่อน

    This was so interesting! Thanks for posting

  • @petergaudiomonte1080
    @petergaudiomonte1080 2 หลายเดือนก่อน

    Soo I know this might sound crazy and relatively on topic but I am developing a network of a handful of Pi's running Kismet and other beacon monitoring software to create a monitoring perimeter around my property. Of course, granted that would be trespassers are carrying devices trasnmitting beacons. Building upon an idea I saw from Kody on Nullbyte. Could also be used for stalkers..etc. another great video from you! Thank you for the work you put into your content!

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      I’ve thought about the same for monitoring the devices that come in and out of my home perimeter (and whether I know them or not) - good luck on the project!

    • @LennyMiller739
      @LennyMiller739 2 หลายเดือนก่อน

      I thought the same thing based on 1 of those esp32 videos on nullbyte. Like square the property off with the boards and have them monitoring constantly, and then any mac that isn't whitelisted that has a stronger signal strength on the main unit inside then it does from the perimeter activates the sprinklers/turrets

    • @roadmonitoroz
      @roadmonitoroz หลายเดือนก่อน

      @@LennyMiller739 You could hook that to a laser perimeter ... i.e. lasers shoot to a LDR which the controller (pi / arduino . If the beam is broken, it sends a signal with laser number broken . You could even combine this with your project to find if it is a known / unknown device with the person.

  • @asipalacios8701
    @asipalacios8701 2 หลายเดือนก่อน

    bro i just fround my teamate ip on pubg , you are amazing i never thought about searching the RTPs

  • @nycrsny3406
    @nycrsny3406 2 หลายเดือนก่อน

    Great video, easy to understand with the simple animation. I don't quite understand how the Ad Network there knows who you are despite have connected through VPN, how did it do that?

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      By looking at your cookies, which will be the same regardless of whether you’re using a VPN or not. So having an adblocker helps stop cookies and prevent this

  • @Mbro-dq2do
    @Mbro-dq2do 2 หลายเดือนก่อน

    thank you so much

  • @Mbro-dq2do
    @Mbro-dq2do 2 หลายเดือนก่อน

    Amazing video dude! I love the simple straightforward explanations.

  • @fancywaifu9821
    @fancywaifu9821 2 หลายเดือนก่อน

    My router supports wireshirk and I have a pi-hole recursive DNS on my local network. It’s been great

  • @qani613
    @qani613 2 หลายเดือนก่อน

    Running your own VPN server is much better and relatively easy to set up.

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      Easy to setup but needs to be maintained and patched regularly, otherwise good

  • @nigelholland24
    @nigelholland24 2 หลายเดือนก่อน

    Thank you for doing this after I asked

  • @Dr_Larken
    @Dr_Larken 2 หลายเดือนก่อน

    I’m curious, does anyone use air VPN? It allows you to purchase whatever plan anonymously “yes I’m aware of identifiers” with Monroe Crypto. But I honestly honestly haven’t met anyone or found anyone else else that uses it! I’m honestly curious! TY

  • @Dr_Larken
    @Dr_Larken 2 หลายเดือนก่อน

    As someone who’s paranoid about their data it feels like a never-ending battle! I can’t believe people are so careless on what data is collected. It’s almost active privacy is fading! Sadly, the people that need to watch this won’t!

  • @dtime247
    @dtime247 2 หลายเดือนก่อน

    The U.S. Military Created the Internet. That should tell you a lot

  • @johnczech7074
    @johnczech7074 2 หลายเดือนก่อน

    This was really fascinating and well presented. Thanks!

  • @louisshade8624
    @louisshade8624 2 หลายเดือนก่อน

    DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million

  • @JohnRobertPotter
    @JohnRobertPotter 2 หลายเดือนก่อน

    Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage

    • @louisshade8624
      @louisshade8624 2 หลายเดือนก่อน

      question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering

    • @JohnRobertPotter
      @JohnRobertPotter 2 หลายเดือนก่อน

      @@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection

    • @louisshade8624
      @louisshade8624 2 หลายเดือนก่อน

      @@JohnRobertPotter thank u that actualy makes alot of sense

  • @ShriSumitJi
    @ShriSumitJi 2 หลายเดือนก่อน

    from where u learn these

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      Do you mean how did I learn all this?

    • @BunnyKhatri-pd8zm
      @BunnyKhatri-pd8zm 2 หลายเดือนก่อน

      ​@@plaintextpackets yes

    • @omaisbrabo9732
      @omaisbrabo9732 5 วันที่ผ่านมา

      @@plaintextpacketsyea, u recommend any books?

  • @shaunrowley7230
    @shaunrowley7230 2 หลายเดือนก่อน

    Another excellent video and think for true anonymity using TOR use Tails tails.net/

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      Great suggestion, nice to have it on a USB in your kit

  • @mikemaldanado6015
    @mikemaldanado6015 2 หลายเดือนก่อน

    Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.

  • @fcgiova
    @fcgiova 2 หลายเดือนก่อน

    Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?

    • @plaintextpackets
      @plaintextpackets 2 หลายเดือนก่อน

      Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.

    • @fcgiova
      @fcgiova 2 หลายเดือนก่อน

      @@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!