How TOR Works

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ม.ค. 2025

ความคิดเห็น • 103

  • @mikekrow
    @mikekrow 4 ปีที่แล้ว +72

    At first glance I thought this was “How The Onion Works”

  • @AgentFortySeven47
    @AgentFortySeven47 3 ปีที่แล้ว +49

    7:00 "If there was ever a situation where a group of bad actors controlled all three nodes in a Tor communication" KAX17 has entered the chat

    • @Jozo.42
      @Jozo.42 9 วันที่ผ่านมา

      imagine all the NSFW furry stuff that they got bombarded with

  • @awabqureshi814
    @awabqureshi814 4 ปีที่แล้ว +219

    The real question is how do get such clear audio?

    • @hydra4713
      @hydra4713 4 ปีที่แล้ว +22

      Yes, please explain!

    • @jimmythenoob3321
      @jimmythenoob3321 4 ปีที่แล้ว +45

      thats the power of gentoo

    • @esotericboomerism63
      @esotericboomerism63 4 ปีที่แล้ว +34

      install gentoo

    • @Ultra289
      @Ultra289 3 ปีที่แล้ว +7

      Good mic

    • @TrizziEhgan
      @TrizziEhgan 3 ปีที่แล้ว +6

      With the power of noise reduction with funny yeti snowball microphone.

  • @s9209122222
    @s9209122222 4 ปีที่แล้ว +95

    Tor was the most useful tool that I could browse Japanese porn website safely, which banned the IP address of where I'm living.

    • @folksurvival
      @folksurvival 4 ปีที่แล้ว +33

      Degenerate.

    • @horushours9443
      @horushours9443 4 ปีที่แล้ว +49

      @@folksurvival cultured

    • @twl148
      @twl148 4 ปีที่แล้ว +39

      @@horushours9443 t. coomer

    • @BurgerKingNationalist
      @BurgerKingNationalist 4 ปีที่แล้ว +23

      @@twl148 t. based

    • @gspapp
      @gspapp 4 ปีที่แล้ว +11

      link?

  • @tubbalcain
    @tubbalcain 4 ปีที่แล้ว +87

    Great explaination, you know your stuff.
    One question: how do you prevent being exposed, while negotiating/ creating the keys with the relay nodes?

    • @tubbalcain
      @tubbalcain 4 ปีที่แล้ว +3

      @Dio Brando thanks 👍

    • @Bruh-hd4rj
      @Bruh-hd4rj 2 ปีที่แล้ว +7

      @@tubbalcain what was he’s response ?

    • @nigeltheoutlaw
      @nigeltheoutlaw 2 ปีที่แล้ว +25

      @@Bruh-hd4rj This is like going on a tech forum and someone DMed the explanation...

    • @HTWwpzIuqaObMt
      @HTWwpzIuqaObMt 5 หลายเดือนก่อน

      Lookup hidden service directory and introduction points

    • @Akac3sh
      @Akac3sh หลายเดือนก่อน

      @@Bruh-hd4rj what a dickhead bro dropped a gem and picked it back up

  • @pakonicoco
    @pakonicoco 3 ปีที่แล้ว +6

    TH-cam automatically unsubed from your channel bro. Keep up w the good work!

  • @Max_Iceman_Butler
    @Max_Iceman_Butler ปีที่แล้ว +4

    Watching this video on TOR feels like trying to explain a magic trick to a magician!

  • @NoEgg4u
    @NoEgg4u 4 ปีที่แล้ว +29

    @7:00
    "...if there were ever a situation where a group of bad actors controlled all three nodes..."
    I thought that Tor nodes are designed to detect when their counterparts have been compromised, and such compromised nodes are flagged to be taken out of the available pool of nodes?
    When the Tor browser starts, and chooses an entry guard, does your Tor browser perform some type of check to ensure that the connection to the guard has not been comprimised?
    Does the Tor browser or other Tor nodes check for modified code on other nodes before trusting the other node?
    Even if one person controlled all three of the nodes you happen to be using, everything is encrypted.
    And each node is getting data from multiple sources. So how would they see what you are doing?

    • @eds7406
      @eds7406 3 ปีที่แล้ว +9

      > I thought that Tor nodes are designed to detect when their counterparts have been compromised,
      Not to my knowledge
      > and such compromised nodes are flagged to be taken out of the available pool of nodes?
      There are other things done to check for bad nodes, and yes they are removed. blog.torproject.org/how-report-bad-relays
      > does your Tor browser perform some type of check to ensure that the connection to the guard has not been comprimised?
      I'm not sure what could be done. If the node has been compromised, there isn't anything to do, but hope that it get's caught. If someone can break the encryption, well, you got bigger problems.
      > Does the Tor browser or other Tor nodes check for modified code on other nodes before trusting the other node?
      That is also a rather hard thing to do. How should it be done? You can't exactly ask "hey are you good", and if the source code functions perfectly as any other, you can't use that either. You would also loose any other implementation of tor, probably none right now, but you never know, maybe there is a good rust implementation coming along in the future.
      > Even if one person controlled all three of the nodes you happen to be using, everything is encrypted.
      Yes, but you would know that (this is not a real world example) at 00:00:01 entry node X got Y bytes from Z and at 00:00:02 exit node A got B bytes that was sent to C. And probably more information that could be used to link it up.

  • @yowassup9801
    @yowassup9801 2 ปีที่แล้ว +3

    This deserves way more views.

  • @awabqureshi814
    @awabqureshi814 4 ปีที่แล้ว +50

    Always wondered this

  • @bioemiliano
    @bioemiliano 3 ปีที่แล้ว +14

    This video is not as popular as the other ones you have... does TH-cam censor Tor related content?

  • @av5334
    @av5334 4 ปีที่แล้ว +22

    thank you for the easy to understand presentation

  • @Fredministrator
    @Fredministrator 4 ปีที่แล้ว +8

    This might be a stupid question, but is it okay to use Tor for things like yt videos (without an active account) and such things or is it just a huge waste of traffic for the servers?

    • @uwuifyingransomware
      @uwuifyingransomware 4 ปีที่แล้ว +11

      You could do that, but streaming through tor is incredibly slow so it would be a pretty bad experience

    • @Fredministrator
      @Fredministrator 4 ปีที่แล้ว +3

      @@uwuifyingransomware thank you. That is a good point.

    • @eds7406
      @eds7406 3 ปีที่แล้ว +1

      I'd guess. Though there are always down sides, yes, Tor is not always the fastest and sometimes youtube will block you. But otherwise you should be free to use it. There is quite a bit of traffic not used, and Tor needs normal users doing normal thing to work. metrics.torproject.org/bandwidth-flags.html

  • @grippysockgf
    @grippysockgf 4 ปีที่แล้ว +7

    Live your work!

  • @JeffBourke
    @JeffBourke 3 ปีที่แล้ว +11

    Okay so there is an attack based on packet size BUT couldn’t that be defended by padding with a random amount of redundant data?

    • @JeffBourke
      @JeffBourke 3 ปีที่แล้ว +5

      And then sending some packets that are just self terminating at one of the proxies?

    • @ImperiumLibertas
      @ImperiumLibertas 2 ปีที่แล้ว +4

      It would be better to have a set of standard packet sizes that incrementally increase in size. 1kb 10kb 1mb 10mb etc. All traffic would have to pad the packets to match one of the sizes whatever is closest to make it more difficult to track.
      Adding random data doesn't make it any safer since it is still a distinct size from other traffic. It's all about anonymization.

    • @JeffBourke
      @JeffBourke 2 ปีที่แล้ว

      @@ImperiumLibertas this is a good idea.

  • @rickybhattacharya6
    @rickybhattacharya6 3 ปีที่แล้ว +6

    When the onion website server responds to the request sent by the client, does the response traverse via same relays or different?

    • @alpora7777
      @alpora7777 2 ปีที่แล้ว

      this video explains clearnet servers, not onion servers. in terms of what was explained in the video, the response is bassed back using the same relays

  • @Sugbaable
    @Sugbaable 4 ปีที่แล้ว +8

    idk exactly much about this, but what about server side javascript? Would that be safe?

    • @sergiovicente6868
      @sergiovicente6868 2 หลายเดือนก่อน

      As far as I know, the problem with javascript isn't that it's javascript. Rather that it's used within the webpage that is mounted on your browser (ie. on your machine), as such scripts have direct access to run within it. Anything server-side that uses javascript doesn't have this problem.

  • @jamalyarfoor5798
    @jamalyarfoor5798 2 ปีที่แล้ว +2

    How does the middle relay and exit relay get their keys?

  • @ArtOfHealth
    @ArtOfHealth 4 ปีที่แล้ว +7

    I have not gotten the process of stripping some machines down and installing a Linux based system. Microsoft owns a lot of my stuff. Google has lots and lots of my stuff on their servers. Apple too! I know all three of these system pretty well. Ever since the nineties anyway. TOR has limitations. It even denied that certain websites I visit existed. How do you live your life on the internet? What machines and Operating Systems and Browsers do you use frequently? Thank you!

    • @Jorge-xf9gs
      @Jorge-xf9gs 4 ปีที่แล้ว +1

      OS: Any FOSS OS is fine. I don't know much about non-Linux OSs, but the best Linux distro about this I know that doesn't use TOR for everything is Qubes OS. However, it's quite a pain to install and isn't available for many hardware.
      Browser: If you don't want TOR I personally think the best is Ungoogled Chromium. If you prefer Firefox, you can use it with the tips Mental Outlaw has in its channel, but Mozilla has had some “mistakes” in the past and it isn't the best out of the box. There're also privacy forks of Firefox, but I don't know them very well. Many people now talk about Brave, but it's a very new browser and it already has had a privacy related polemic. And Brave doesn't block cookies by default, tough they always say that they follow the philosophy of “Everything already configured around privacy, so you don't have to worry”.

    • @ArtOfHealth
      @ArtOfHealth 4 ปีที่แล้ว +2

      @@Jorge-xf9gs Thank you Jorge. As you might know, TOR was just discovered to have security issues by CISA of the U.S. I have had Brave at several points of seeking privacy. It is a pesty browser in that he tries to get people to engage and participate in giving companies rewards for being respectful to the online community. Just too much work. The results are not the best either. DDG comes up with terrible results. Webcrawler offers some good results sometimes. I had Authentic8, a protecting gateway of a sort. There is an annual feel. Not a problem with a feel. It just a bit more work than TOR. So I had Ubuntu preloaded on a machine I bought from a pawn shop. There were password issues because I did not know all the pre-setup information. I am tempted to try Linux Mint just to get familiar with the tools in Linux based equipment. My bigger problem is that all the guys that have been using Linux for years leaves my head spinning when I try to follow directions. Are you aware of anyone that has the ability to slow it down and make the installation very simple to understand? Thanks, if you have time Jorge!

    • @Jorge-xf9gs
      @Jorge-xf9gs 4 ปีที่แล้ว +1

      @@ArtOfHealth I don't know the perfect one, but I think the Chris Titus Tech's Switching to Linux Mint from Windows TH-cam series could help.

    • @zyan983
      @zyan983 4 ปีที่แล้ว +5

      You also want to setup Libreboot or Coreboot or your own firmware, as firmware can be backdoored. Eg. Intel ME & amd PSP.

  • @thebackofdoctormanhattanshead
    @thebackofdoctormanhattanshead 4 ปีที่แล้ว +9

    How does the reply from the destination server correctly reach the client? As in, how do the relays know the route back to the client from the destination, given the exit and middle relays know nothing of the clients IP?

    • @travistarp7466
      @travistarp7466 4 ปีที่แล้ว +6

      They're all acting like one layer proxies id assume. They don't know the clients IP, but they know the last locations IP, so it just goes in reverse id assume. All the nodes work like proxies.

    • @stonksmcmeme
      @stonksmcmeme 3 ปีที่แล้ว +2

      @@travistarp7466 That makes sense. Thanks for the explanation.

    • @DsiakMondala
      @DsiakMondala ปีที่แล้ว

      You glowie you glow you are glowing you are a glowie

  • @stonksmcmeme
    @stonksmcmeme 3 ปีที่แล้ว +1

    Commenting for the algorithm.

  • @vocaloidsrock6987
    @vocaloidsrock6987 9 หลายเดือนก่อน

    Use full disk encryption on your computer's operating system (OS) just to be extremely safe, if you happen to use Tor.

  • @kennethjallington
    @kennethjallington 2 ปีที่แล้ว +1

    4:20. Over 9,000 connections!

  • @sub-harmonik
    @sub-harmonik ปีที่แล้ว

    How would the tor browser send the server the user's IP using javascript? I've been trying to look it up and it seems like that isn't possible. Couldn't the tor browser just unset the relevant http headers?

  • @Gigachad-mc5qz
    @Gigachad-mc5qz 3 ปีที่แล้ว +6

    This is confusing to me. How do you get the keys to decrypt all 3 layers? And if you generate the key locally how do you send it to the relays without anyone finding out what the key is? Unless you decrypt the key too but then you have another key that needs to be encrypted going to infinity

    • @ImperiumLibertas
      @ImperiumLibertas 2 ปีที่แล้ว +3

      Your client encrypts the traffic with all three public keys (I'm not sure how the client gets all three keys). And the traffic is decrypted at each step using the nodes private key. The exit node has the original traffic but does not have enough information to know where the source of the traffic comes from.

  • @Mtg2
    @Mtg2 4 ปีที่แล้ว +11

    But if you are smart like me you use a Extra proxy your basically invisible to the tor proxys as well

    • @kynanverwimp847
      @kynanverwimp847 3 ปีที่แล้ว +6

      And how does that make you anymore anonymous? lol

    • @Luckyluckyluc
      @Luckyluckyluc ปีที่แล้ว +1

      @@kynanverwimp847 In the extremely unlikely case that all three relays are compromised (although this has never happened as far as I know)

    • @leopardsbasketball
      @leopardsbasketball ปีที่แล้ว

      He explains this in the video, no? This is the bridge.

    • @digimation6862
      @digimation6862 ปีที่แล้ว

      VPN?

    • @Blob-qo5iq
      @Blob-qo5iq 6 หลายเดือนก่อน

      Kinda yes. But a random proxy does not exactly work like a tor bridge

  • @peauxwet
    @peauxwet 3 ปีที่แล้ว +2

    commenting for the alg

  • @vocaloidsrock6987
    @vocaloidsrock6987 9 หลายเดือนก่อน +4

    I wonder what you guys are using Tor for?

    • @YoungCoward
      @YoungCoward 6 หลายเดือนก่อน +3

      Talking with your mom

    • @NotLtrex
      @NotLtrex 6 หลายเดือนก่อน

      People use it to access news, uncensored news, and freedom of speech and some bad guys use it for bad activities

  • @shiro836_
    @shiro836_ 3 ปีที่แล้ว +3

    1k likes against 6 dislikes. Now you know ratio.

  • @wasdismygoto9479
    @wasdismygoto9479 2 ปีที่แล้ว +1

    Dude i was using it today and I didn’t know how it works, and I didn’t know they could see that, so i think im uninstalling it. If anyone else has feedback please do reply, i need to know more about how networking works on tor

  • @ArtOfHealth
    @ArtOfHealth 4 ปีที่แล้ว +3

    At one point I had an app that TOR Project recommended I get to help confuse the tracking. Is that what you are getting at? Could they have hundreds of these relays. TOR uses DDG. I like them better than Brave, Firefox and Vivaldi. Thank you.

  • @disco.jellyfish
    @disco.jellyfish 3 ปีที่แล้ว +7

    So you can hide some of the info leaked through Java script by running Tor through a virtual machine. This should then hide the true type of device you're using, the true OS you are actually using and the true peripherals you use. As of browser it should say something like: "some weird old firefox with some weird plugins called 'no script'". IP should be hidable if you use tor on a VM running on a VPS, which is getting remote controlled through your VM, which is connecting to your neighbors WiFi or so. Make sure to not use Tor in full screen so you dont leak your true resolution (or disable JS in the first place).

    • @sub-harmonik
      @sub-harmonik ปีที่แล้ว

      how would ip be able to be leaked with javascript in the 1st place? I've been looking into it and haven't found anything.

  • @AntiWanted
    @AntiWanted 4 ปีที่แล้ว +1

    Nice

  • @DemarusLancour
    @DemarusLancour 4 หลายเดือนก่อน

    🔥

  • @AbdulHannanAbdulMatheen
    @AbdulHannanAbdulMatheen 3 ปีที่แล้ว +3

    👏 🙂

  • @stonksmcmeme
    @stonksmcmeme 3 ปีที่แล้ว +1

    Very little views on this. Kinda sus if you ask me.

  • @gilfoylekhan
    @gilfoylekhan 2 ปีที่แล้ว +1

    It's actually **Tor

    • @pervasivedoubt150
      @pervasivedoubt150 ปีที่แล้ว +1

      What you’re referring to as Tor is actually GNU/Tor or as I have taken to calling it GNU+Tor

  • @bruhmomenthdr7575
    @bruhmomenthdr7575 4 ปีที่แล้ว +7

    4:20 😏

  • @gspapp
    @gspapp 4 ปีที่แล้ว +8

    Tor not TOR. Evidence you did not read the Tor FAQ even once!

    • @Eric.-.
      @Eric.-. 3 ปีที่แล้ว +1

      lol

  • @vocaloidsrock6987
    @vocaloidsrock6987 9 หลายเดือนก่อน

    I can already suspect what alot of dumbasses are using Tor for. I think they should expect a visit from you-know-whom.

    • @anjanieko702
      @anjanieko702 23 วันที่ผ่านมา

      LOL good luck with that, I’m very armed