thank you for this information. I have been tempted to try TOR but I have been having serious doubts. Just watching the other people surf the web and watching for Sharks before I go in. This opened my eyes into thinking I am not that proficient at this computer stuff so I am going to stay on the beach thank you very much. I learned about TOR and I2P from House of Cards second season. So I asked my son who started using the computer when he was like 2 or 3 years old about it all and he just shook his head and told me "Mom, not a good idea you can find yourself in a lot of hot water." sweet of my son to tell me that and I found you on You Tube talking about it so here I am learning.
So its clear your not too fond of the TOR browser/network..........what would you say is the best for anonymity that is relatively easy to do please? Thanks
If I understand correct by using TOR network, you are opening your computer to be a node for TOR right? So what will happen if someone reaches a website through a path that your computer is last node?
I heard that you are VERY VERY emphatic on NOT using TOR. But at no point did you offer an alternative. It's easy to throw rocks at something - not so easy to propose a real working alternative, Eli. If you find something better than TOR I would like to hear what it is.
Funny thing about VPNs is that you're now putting them in charge of all that data and trusting them not to do anything malicious. Even if they're angels, their servers can also be hacked.
+Geozoide Or to play downloaded GIFs if you're too lazy to switch one of those to your default browser. Even then IE is cluttered and so ugly to look at that Microsoft's own developers must facepalm at the sight of it. My main reason for loving Firefox is that it has the most and best add-ons for blocking ads and downloading. Without those, I'd have almost no use for YT, or for that matter just about everything else on the Internet...though if I made money from advertising I'd probably not tip my viewers about it.
Remove all the NICs from your computer, anything containing a MAC address. Purchase a usb wifi adapter (with cash), purchase a VPN and Proxy service. Get something like a Raspberry-Pi or Raspberry-Pi zero, install some form of Linux OS like Kali, on micro-SD card, enable SELINUX. Connect using the wifi-adapter, connect to your VPN, connect your various programs (Browser, Bittorrent etc.) to the proxy, preferably a SOCKS5 Proxy, use Tor browser and network simultaneously, do what you gotta do, store any data you got on an external flash-drive, encrypt the flash-drive (don't use Microsoft bitlocker, use something like Vera Crypt) disconnect from VPN/Proxy/Tor & hotspot, smash USB wifi-adapter and throw in trash (microwave works too), smash micro-sd (microwave works better), and if you weren't able to solder off the Ethernet NIC or remove ethernet NIC from your Pi and you're feeling extra paranoid, smash and microwave your Raspberry Pi. Theyre like $25-$30 anyways.
Can your other browsers be accessed even if you haven't intentionally opened them during a tor session. In other words, do I need to be running an operating system that is completely without other browsers or client services installed?
6:00 a VPN will not encrypt the traffic between the webserver and the vpn itself.. and there is something like SSL in HTTPS which always encrypt the connection !
Eli, I've been subscribed to your channel for a while and really enjoy these series. I just wanted to give you a tip for these whiteboard sessions-- you'd get much better results if you invested around $100 in a Wacom tablet. I found one for $60. I think the basic model is called Bamboo and you can find them on Amazon. For a small investment I think this is a tool every computer savvy content creator should have in his/her arsenal. Keep up the good work!
Hey Eli, if you needed to or felt the need to mask your internet traffic how would you go about doing it?? You mentioned Tor with many additional layer on top, like what?
Talking about being vulnerable to be tracked with your IP, one day I was watching a TH-cam video and someone commented something like this, "I was able to look at the location that you posted this video from and the ISP that you use." Is that possible? Is possible for a TH-cam user to track the uploader?
No, because all videos are uploaded through TH-cam's server, so all they'd find is TH-cam's server. So basically they would have to hack TH-cam's server to be able to do that. So don't worry. :)
Eli should I use "VPN" all the time when I connect to the internet? I mean it will be safer or not if I use VPN instead of the normal IP address... Because here in my country we don't have a SINGLE IP address, every time I restart the modem the IP address change direct there is no way to get your IP back it's random...
***** to an extent.. no govt is perfect but that doesn't mean government is evil. if we had no government then that would be anarchy, which would lead to even more corruption and more destruction and possibly more death.
+Tony Abraham Certainly. And that of course is what libertarians who say the less government the better never grasp. It's almost like saying that the flimsier the ship-of-state, the smoother and safer sailing in it will go, or that a paper boat is better than a wood one. It's as if they refuse to believe that Somalia and Denmark exist, for real-life comparison between anarchy and good government, by anyone who bothers to look at them. All governments are one kind of social engineering or another, which is what the word statecraft comes from, and why government designs, better or worse, are always more readily imagined by recourse to practical analogies, or metaphors like ships or houses, of known examples of them, and comparison of what life is like in different regimes that have already been tried. Example: In The History Of Western Philosophy, Bertrand Russell notices that Plato, who invented totalitarianism and described it in The Republic (a spectacularly crazy document) basically imagines a variation on Sparta, and not a very original one. It is therefore a no-brainer that life in any state made like the one Plato describes wouldn't be enjoyable or accommodating to creative people, not even to philosophers with a Platonic bent, never mind anyone profound as Democritus, wise as Solomon, or hilarious as Aristophanes. It would be just another Sparta, only with better hygiene. As for whether Plato was being ironic, or making an elaborate joke about Sparta, all readers find it very difficult to tell, since in The Republic his style is exactly as deadpan as his assertions are dead wrong. Building on that rather simple observation about Plato's craft-of-state, Harold Bloom finds it a sad irony that Plato, who was also a poet, would have himself kicked out of the state of his own design, with all the other poets! Now that's pretty tragic. Plato's state is like a ship made of lead, heavy and weak, and which can't carry most of its passengers comfortably, or many without sinking. N Korea is about the closest thing to Plato's republic that has ever been put together, and quite predictably it's as much of a disaster as the paper boat Somalia is. As it is right now, the United States is far too much like the Titanic, and not nearly enough like the QE2. The old bucket needs a lot of work, better captains, a more fuel-efficient engine, much less separation between classes, and passengers and crew who know how to read the manual and blueprints well enough to revise them.
+Vinny Mac A lot of people visit these sites out of curiosity, nothing wrong with that, many people do not know that their activities are stored and can actually be tracked later, and hence they "research" on these sites for information and risk assessment: Ofc what they want to hear is, Tor / Tails etc. is 100% anonymous and I can look at whatever on the dark web. Reality, however is different, and I believe they deserve this information, so they can make up with themselves, if this is actually worth the risk for them. Knowledge is power, use this to your advantage. Stay safe guys
so if your computer was the last node in the relay that was used to do something illegal how do the authorities know whether or not it was you or just someone else on the tor network?
Sometimes I think you're pompous when you talk about how much money you make from YT, etc., but you're smart as hell and are a great instructor. Keep it up and don't change a thing. Plus you served the U.S. in the military and that's awesome.
When Tor was a novelty, I went on a hidden website there and downloaded some pron. The pictures had an executable file included with them in plain sight, and I ran it by accident. It was a cheap trick, but I fell for it because I was unsettled by the barrage of new software that I had just installed. It would have never happened if I had felt comfortable on my own system. That program didn't install any malware, but may have reported me to the government.
How is the last hop from the VPN to the website encrypted - Does the website not need to decrypt with the same software that encrypts it? it - I can understand 'site to site VPN where both ends are in control by the users, so can some one explain how the website can decrypt the data - thankyou
Hi Eli would you say using different OS helps with safety and security, well would it be safer to do banking using a banking app on an Android or IOS mobile over using a web browser to do banking on a windows computer, ps just deleted for from my mobile I don't see the point for it 👍😎🇦🇺
So if TOR is unreliable as an anonymity solution, what do ppl use to maintain anonymity and security on the internet..along with the additional privacy measures?
Eli, I love your show. Technologically speaking you are very enlightened indeed. Conversely, your perspective on the political landscape is that of a domesticated goldfish living in an artificial habitat that he believes to be his native climate. I understand, it's hard to be an expert at everything. I'll keep watching!
It's all quite complex. Is there any way to download stuff through torrenting without your ISP from seeing that you've downloaded a torrent, what torrent and where the torrent is from? If you open anything downloaded while using tor and you're connected to the internet will it compromise your computer, is that what he's saying or...?
Eli, I was using Google chrome while searching in the Tor browser. You stated that you shoudn't use chrome while using tor. I'm panda cloud antivurs which is good to keep viruses out. But, what should i do because i made that mistake. And I was login into my google account in chrome while using tor browser
Hi Eli, I love the way you explain things. Every time i go through your videos, i end up learning things. However, I have some questions that i will like you to address. 1) Who owns these TOR relay servers? 2) can you shed some light on the encryption process involved with the different relay nodes. I understand the SSL encryption between two nodes, is it like extending the same thing to pair of all these relay nodes and my computer and the other sites? 3) When someone is browsing to a .onion domain using TOR, can you explain how does the DNS resolution works there?
So if someone like myself was using for just for peace of mind, but someone else was using it for illegal things, and the government or whatever was trying to track him down, if my computer was the last uplink on the connection to some illegal website, would the government think that I was the one on the illegal website and come take action to my IP?
Framing comes to mind... I'm sure they will figure out you were a 'victim' but chances of taking your pic for 'examining' tho... All the pirated software 😳
That is the exit node things. If one guy connects to an exit node, goes to silk road, and buys weed, and then u connect to that exit node to go to cnn.com, you have a 50% chance of the FBI thinking it's you, depending upon how smart the guy is that's looking at it. But don't worry, they will never find out where u live because of the nature of the Tor network. Except they will track that exit node and the ip that connected to the exit node so if u end up getting the same exit/2nd node they will look at you again. But once again it's really useless because they can't figure out where you live. I've probably scared you too much, just encrypt anything after the exit node.
Hi friend. Recently i've seen personalized hostnames.onion and that sounds scary to me as i try to serve my own web page under tor and i do not want anyone to steel my dientity. What do you say about that?
something you didn't mention; Anyone can sit on the endpoint :=) I feel like this should be really valuable information to anyone who wants to use tor, and it's kind of sad you didn't mention it Eli. Anyone can create an endpoint for tor and let traffic pass through it so they can see what you are up to :=)
i did't knew how tor browser works. thanks. in the route you forget something :D from the exit node the connection goes to the final computer's isp and then trought some other servers to the final site's isp, then to the site. so there are extra nodes and an extra isp between the final exit node and the website. can you explain the vpn solution in other video ? the avast antivirus software offers free vpn solution. how much secured is that solution ? how it realy works ? thanks. new romanian fan
Is it possible to spoof entrance nodes, so even if your packets get mined, the router will lead to a garbage IP, or would that be pointless. I'm just asking. I already came up with a few problems with this; the fake node will probably have to be created from a proxy server anyway and that server would probably have all the information on exactly how it built that fake IP(which would probably have the randomizing algorithm and be easily brute force mined). Also that request would have to sent from the host, and even if the router sees the request, it's still up to the router to even do it. The request would also have to be decrypted by that router, but then even if the request is a separate packet from your data, and the key to process the request is just metadata, that could still be mined easily. But maybe if entrance node spoofing became a big thing, the information on how to build the fake IP could be stored on a specialized router instead of sent from the host. But then those proxies would be gold mines filled with keys, and if an intelligence agency opens one-OH GOD, I NEED TO STOP THINKING.
+Chris Meyer Not him but Avast Antivirus is good. Also, yes Tor is probably the to most effective way to protect your identity but the point is nothing is fully secure.
I realise it has been a few months since you asked but it's just good to spread knowledge. When it comes to things like AV performance, take a look at things like av-comparatives.org once in a while. They can give you an idea of how the various AVs stack up. Selecting an AV is a bit like choosing which country to live in when the world is at war with the aliens. One might be safer today but that can change.
can someone explain more of the first problem?i dont understand,if someone is in the middle of cnn and tor,and monitoring let's say me,and my password,the information then encrypts and goes back thru three computers to me,how do they know to who information goes,if it's going thru many computers?ok,they have my password etc,but how to they know it's me?my real IP?
Just wanted to say just started to watch your videos and your very smart and you explain things very well thank you for the video you earned yourself this subscriber :)
since the nsa is in the tor network-exit-gates in particular and tor is super slow this technik is not a good way to protect ur security and keep up the speed simultaneously
hey,sorry,i'm just kinda frustrated,everything's slow,and now i find somehow tor has been put on our computer,by unknown persons,and i know so little about it--has anyone ever heard of this,tor being installed on someone's computer without their knowledge? apparently it's not a regular program that can be easily 'uninstalled'-i wonder why,and how,or if it can ever be removed or at least fixed..i don't even feel qualified to ask proper questions-frustrating!
If I use TOR, clone MAC address of my neighbor and use his WiFi (without his knowledge - that is crack it), is there anyway they will track me? I asked this question to someone working for Interpol, cyber-crime division and he was not able to give me a definite answer.
Eli you forgot to point out that tor belongs to C.B.S. interactive and a scarry pants as myself would quickly link it the conglomerate co.who is VERY heavy in advertisement. needless to say it's just another google corp. so I think I'll go back to smoke signals when something important has to get thru.
This guy knows what he is talking about. I fell victim to the exact things that he is talking about. Thanks for telling me how they do it. Real security is to never have important information on a computer that's connected to the internet, don't give a shit about your internet communications, stay "prepared" for whatever they throw at you, surf and have fun. Now, can you lay out a strategy that works for classified communications over the internet?
A lot of these issues can be addressed by booting a specialized live OS such as tails from a dvd or usb drive on a laptop. On a live DVD nothing gets saved and nothing can be installed permanently since it is ROM and everything is gone when you reboot. It will also allow you to do things like spoof your MAC address and tunnel data through a VPN on commonly open ports such as TCP port 80 or port 443 so you can use it on public wifi hotspots that firewall certain ports. Just don't use tor from home and constantly switch to different hot spots. I don't use tor other than looking out of curiosity maybe reading the hidden wiki and browsing the silk road once (I don't use, buy or sell any illegal drugs). I just love computer networking and security.
I still kind of want to check out the deep web, but same as you, out of curiosity. I do plan to steer clear of the super bad stuff like kiddie porn and drugs. What if you use your home computer but a neighbor's wifi instead of your own? What would happen then?
William Pritchett It's not illegal to use tor from home if you're not doing anything bad. If you use a neighbor's wifi without permission it is technically illegal but finding who broke into his network would be hard unless you didn't spoof your MAC address and computer name which gets stored on the router. If you just want to browse I would just use the live dvd from home on your own network unless you are trying to bypass censorship laws etc.
William Pritchett Then it would trace back to your neighbor's network, but not necessarily any of his devices. If you did something bad enough, they would find you by your MAC address on your device.
What would be so bad if they got the mac address? Assuming that they are in a neighbor's house looking for my pc (which they wont find cuz its in my house), how can they find me?
They can see what mac addresses are associated with which ssid using something like airmon-ng IF they really wanted to find you. If they saw the targeted mac nearby even if connected to another network they could chase down the signal because your wifi adapter transmits as well as receives radio signals during regular use. Again it's very unlikely unless they REALLY wanted to find you.
Well Eli the (not sure or it is still the case as this is from 2013, now it is 2020) same will go up as soon you start to type on your keyboard keystrokes can be logged hence, key logger, because everything you type on your computer is pure text letter by letter then it will be encrypted (later) let's call this an input point. Then it will go to your ISP that is visible, not the encrypted data, but your connection from your home to your ISP so they know you are using TOR right? Once you are in the TOR network I say go from node to node stay encrypted but stay inside that network to go to some TOR website don't exit the TOR network then you are fine, why do I need TOR to go like this home---ISP---TOR Network---[Exit node] ---exit to CNN or Google? You don't you stay in the TOR network the last node will stay in the encrypted environment it are encrypted websites inside the TOR network, seems to me a lot better, you don't exit that would make TOR obsolete in that case you just use a normal browser, not TOR after all it is to mask your identity is that not correct? So Eli why would you use TOR at all if your target website is on the regular internet? It will force you to exit, to mask your IP (changed) you can use a VPN TOR can not protect you on a exit. node.
1. Why are you PM'ing me instead of replying in the video comments? 2. Why do you expect people to add you as a contact in order to PM you back? 3. Why did you randomly advertise NOD32?
The most beautiful "thing" about a person is their minds. Freedom of mind makes the human race evolve into something better. The internet can be such a amazing tool for a better world...but money hunry corporations corrupt it (jmho). Thanks for making people think ;)
Dear Eli, You're quite the guy I have a question for you? As anyone started trying figure out ways to encrypt text messaging on cell phones? or even encrypt voice conversations on cell phones?
Tor is quite reliable as an anonymity tool. You just have to make sure you don't give out any personal info whilst you are using Tor, because Tor only hides your ip address. You still have to make sure you don't give out any info that can reveal your true identity while using Tor.
If you're reading this from anywhere where there's repression. I salute you!. You're a hero.
so what would you use instead of Tor??
thank you for this information. I have been tempted to try TOR but I have been having serious doubts. Just watching the other people surf the web and watching for Sharks before I go in. This opened my eyes into thinking I am not that proficient at this computer stuff so I am going to stay on the beach thank you very much. I learned about TOR and I2P from House of Cards second season. So I asked my son who started using the computer when he was like 2 or 3 years old about it all and he just shook his head and told me "Mom, not a good idea you can find yourself in a lot of hot water." sweet of my son to tell me that and I found you on You Tube talking about it so here I am learning.
The only way to protect your information on your computer 100% is to take an axe to the copper or coax lines that lead to your house.
Thy have db with list which IP goes to which address 😐 so if you already used it- just discard of pc and run 😳
So its clear your not too fond of the TOR browser/network..........what would you say is the best for anonymity that is relatively easy to do please? Thanks
If I understand correct by using TOR network, you are opening your computer to be a node for TOR right? So what will happen if someone reaches a website through a path that your computer is last node?
so eli, what is your better solution in internet data security and what is the "better" way to your specification to configure socks?
I heard that you are VERY VERY emphatic on NOT using TOR. But at no point did you offer an alternative. It's easy to throw rocks at something - not so easy to propose a real working alternative, Eli. If you find something better than TOR I would like to hear what it is.
RixDobbs Yeah I'd definitely like to hear what Eli would use instead of TOR to conduct his anonymous browsing.
RixDobbs 5:56. Pay attention.
Funny thing about VPNs is that you're now putting them in charge of all that data and trusting them not to do anything malicious. Even if they're angels, their servers can also be hacked.
The alternative is to live in the amazon with chimps. They won't get you there, for now.
they caught my granddaddy in the amazon, he was living wih the silverbacks, but still they tracked him and laser'd him down via his nokia 3310
Pshhh, the only time anyone uses IE is to download Chrome/Firefox.
+Geozoide Or to play downloaded GIFs if you're too lazy to switch one of those to your default browser. Even then IE is cluttered and so ugly to look at that Microsoft's own developers must facepalm at the sight of it. My main reason for loving Firefox is that it has the most and best add-ons for blocking ads and downloading. Without those, I'd have almost no use for YT, or for that matter just about everything else on the Internet...though if I made money from advertising I'd probably not tip my viewers about it.
Facts!
Or when you are a web developer and you are required to test your website on IE as a matter of course in your job.
Well now it's called Microsoft Edge
RIGHT!
Switching to Linux and Firefox exclusively is probably the #1 thing a person can do to increase security.
What are the better solutions you where talking about?
Remove all the NICs from your computer, anything containing a MAC address. Purchase a usb wifi adapter (with cash), purchase a VPN and Proxy service. Get something like a Raspberry-Pi or Raspberry-Pi zero, install some form of Linux OS like Kali, on micro-SD card, enable SELINUX. Connect using the wifi-adapter, connect to your VPN, connect your various programs (Browser, Bittorrent etc.) to the proxy, preferably a SOCKS5 Proxy, use Tor browser and network simultaneously, do what you gotta do, store any data you got on an external flash-drive, encrypt the flash-drive (don't use Microsoft bitlocker, use something like Vera Crypt) disconnect from VPN/Proxy/Tor & hotspot, smash USB wifi-adapter and throw in trash (microwave works too), smash micro-sd (microwave works better), and if you weren't able to solder off the Ethernet NIC or remove ethernet NIC from your Pi and you're feeling extra paranoid, smash and microwave your Raspberry Pi. Theyre like $25-$30 anyways.
Nice lesson!About security,what antivirus software you use if at all?
Can your other browsers be accessed even if you haven't intentionally opened them during a tor session. In other words, do I need to be running an operating system that is completely without other browsers or client services installed?
just have shit closed, think of it like closing the windows and curtains of your bedroom so nobody sees you watching porn lmao
6:00 a VPN will not encrypt the traffic between the webserver and the vpn itself.. and there is something like SSL in HTTPS which always encrypt the connection !
does using hotspot sheild block the last connection that people can read?
Do you have any suggestions as to methods that might be better than Tor?
Eli, I've been subscribed to your channel for a while and really enjoy these series. I just wanted to give you a tip for these whiteboard sessions-- you'd get much better results if you invested around $100 in a Wacom tablet. I found one for $60. I think the basic model is called Bamboo and you can find them on Amazon. For a small investment I think this is a tool every computer savvy content creator should have in his/her arsenal. Keep up the good work!
if you had a reason to use something like this but wouldnt, what what you use instead?
Thank you for this information! I was wondering if you can make an update on everything you said, especially on the NSA. A 2016 update.
For pen testing and doing security what would you recommend to hide yourself then a vpn or tor for kali linux on a usb?
Hey Eli, if you needed to or felt the need to mask your internet traffic how would you go about doing it?? You mentioned Tor with many additional layer on top, like what?
what happens if you use the chrome and Tor same time? but i only browse legal sites?
Talking about being vulnerable to be tracked with your IP, one day I was watching a TH-cam video and someone commented something like this, "I was able to look at the location that you posted this video from and the ISP that you use." Is that possible? Is possible for a TH-cam user to track the uploader?
No, because all videos are uploaded through TH-cam's server, so all they'd find is TH-cam's server. So basically they would have to hack TH-cam's server to be able to do that. So don't worry. :)
Dave yes, it definitely is, if you're not using vpn
Can't they (individual monitoring) just trail the connection or triangulate where you are sending the traffic from?
Eli should I use "VPN" all the time when I connect to the internet?
I mean it will be safer or not if I use VPN instead of the normal IP address...
Because here in my country we don't have a SINGLE IP address, every time I restart the modem the IP address change direct there is no way to get your IP back it's random...
8:50 Generally speaking, it's actually the anti-government people who are the good guys.
***** to an extent..
no govt is perfect but that doesn't mean government is evil. if we had no government then that would be anarchy, which would lead to even more corruption and more destruction and possibly more death.
+Tony Abraham Certainly. And that of course is what libertarians who say the less government the better never grasp. It's almost like saying that the flimsier the ship-of-state, the smoother and safer sailing in it will go, or that a paper boat is better than a wood one. It's as if they refuse to believe that Somalia and Denmark exist, for real-life comparison between anarchy and good government, by anyone who bothers to look at them.
All governments are one kind of social engineering or another, which is what the word statecraft comes from, and why government designs, better or worse, are always more readily imagined by recourse to practical analogies, or metaphors like ships or houses, of known examples of them, and comparison of what life is like in different regimes that have already been tried.
Example: In The History Of Western Philosophy, Bertrand Russell notices that Plato, who invented totalitarianism and described it in The Republic (a spectacularly crazy document) basically imagines a variation on Sparta, and not a very original one. It is therefore a no-brainer that life in any state made like the one Plato describes wouldn't be enjoyable or accommodating to creative people, not even to philosophers with a Platonic bent, never mind anyone profound as Democritus, wise as Solomon, or hilarious as Aristophanes. It would be just another Sparta, only with better hygiene. As for whether Plato was being ironic, or making an elaborate joke about Sparta, all readers find it very difficult to tell, since in The Republic his style is exactly as deadpan as his assertions are dead wrong. Building on that rather simple observation about Plato's craft-of-state, Harold Bloom finds it a sad irony that Plato, who was also a poet, would have himself kicked out of the state of his own design, with all the other poets! Now that's pretty tragic. Plato's state is like a ship made of lead, heavy and weak, and which can't carry most of its passengers comfortably, or many without sinking. N Korea is about the closest thing to Plato's republic that has ever been put together, and quite predictably it's as much of a disaster as the paper boat Somalia is.
As it is right now, the United States is far too much like the Titanic, and not nearly enough like the QE2. The old bucket needs a lot of work, better captains, a more fuel-efficient engine, much less separation between classes, and passengers and crew who know how to read the manual and blueprints well enough to revise them.
+Tony Abraham not really. law is very often an impediment to remedy and or resolution. the corrupt would get snuffed out.
+Vinny Mac A lot of people visit these sites out of curiosity, nothing wrong with
that, many people do not know that their activities are stored and can
actually be tracked later, and hence they "research" on these sites for
information and risk assessment: Ofc what they want to hear is, Tor /
Tails etc. is 100% anonymous and I can look at whatever on the dark web.
Reality, however is different, and I believe they deserve this
information, so they can make up with themselves, if this is actually
worth the risk for them.
Knowledge is power, use this to your advantage. Stay safe guys
Dex4Sure
Don't get me wrong. Most of us aren't ready for anarchy, but it's by far the best option.
so if your computer was the last node in the relay that was used to do something illegal how do the authorities know whether or not it was you or just someone else on the tor network?
Sometimes I think you're pompous when you talk about how much money you make from YT, etc., but you're smart as hell and are a great instructor. Keep it up and don't change a thing. Plus you served the U.S. in the military and that's awesome.
I would suggest using Tor if you're being sketch, but use your regular browser for banking and for sites where you enter in your personal data.
So... is tor a specific network or type of network
so how i'll ask the question , how do we secure our identiy. what precautions should we be taking. can i create a vpn at home.
can i be a exit node by just using Tor ?
No, you have to set up a machine to be an exit node.
amhokies ok thx
When Tor was a novelty, I went on a hidden website there and downloaded some pron. The pictures had an executable file included with them in plain sight, and I ran it by accident. It was a cheap trick, but I fell for it because I was unsettled by the barrage of new software that I had just installed. It would have never happened if I had felt comfortable on my own system. That program didn't install any malware, but may have reported me to the government.
How is the last hop from the VPN to the website encrypted - Does the website not need to decrypt with the same software that encrypts it? it - I can understand 'site to site VPN where both ends are in control by the users, so can some one explain how the website can decrypt the data - thankyou
Hi Eli would you say using different OS helps with safety and security, well would it be safer to do banking using a banking app on an Android or IOS mobile over using a web browser to do banking on a windows computer, ps just deleted for from my mobile I don't see the point for it 👍😎🇦🇺
WHO NEEDS ITT WHEN YOU HAVE ELI THE COMPUTER GUY
I don't really use TOR for privacy more to just get around censorship which my country has started doing more of in recent years.
*YOU NEED MORE BACKGROUND LIGHTING*
So if TOR is unreliable as an anonymity solution, what do ppl use to maintain anonymity and security on the internet..along with the additional privacy measures?
remote viewing ;)
Eli, I love your show. Technologically speaking you are very enlightened indeed.
Conversely, your perspective on the political landscape is that of a domesticated goldfish living in an artificial habitat that he believes to be his native climate.
I understand, it's hard to be an expert at everything. I'll keep watching!
do those anonaboxes work? the have tor buit in?
If i have a VM running VPM is it still unsafe to run it (and browser stuff) alongside tor inside a different VM?
What mouse are you using in this video ??
How important can a short visit by one individual to the dark net be to the nsa 7 years from now?
It's all quite complex. Is there any way to download stuff through torrenting without your ISP from seeing that you've downloaded a torrent, what torrent and where the torrent is from? If you open anything downloaded while using tor and you're connected to the internet will it compromise your computer, is that what he's saying or...?
He said that someone can track info. from exit node to CNN , but what if my traffic is in TOR network , for example some .onion site ?
do you get paid by CNN
Anderson cooper is his cousin
Eli the Tan Computer Guy! I love your classics.
Eli, I was using Google chrome while searching in the Tor browser. You stated that you shoudn't use chrome while using tor. I'm panda cloud antivurs which is good to keep viruses out. But, what should i do because i made that mistake. And I was login into my google account in chrome while using tor browser
What do you use then?
So if I use TOR and I download a torrent will the person in Africa get in trouble and could my computer be used to do this
this guy is the guy that made b.m and quit but made alot of doe.. well done bro!!!
Can someone tell me the website Eli used to search using tor in "introduction to darknet" video?
Hi Eli,
I love the way you explain things. Every time i go through your videos, i end up learning things. However, I have some questions that i will like you to address.
1) Who owns these TOR relay servers?
2) can you shed some light on the encryption process involved with the different relay nodes.
I understand the SSL encryption between two nodes, is it like extending the same thing to pair of all these relay nodes and my computer and the other sites?
3) When someone is browsing to a .onion domain using TOR, can you explain how does the DNS resolution works there?
So are you saying that I can make my own piece of encryption and ask NSA to try to crack it ?
So if someone like myself was using for just for peace of mind, but someone else was using it for illegal things, and the government or whatever was trying to track him down, if my computer was the last uplink on the connection to some illegal website, would the government think that I was the one on the illegal website and come take action to my IP?
Framing comes to mind... I'm sure they will figure out you were a 'victim' but chances of taking your pic for 'examining' tho...
All the pirated software 😳
That is the exit node things. If one guy connects to an exit node, goes to silk road, and buys weed, and then u connect to that exit node to go to cnn.com, you have a 50% chance of the FBI thinking it's you, depending upon how smart the guy is that's looking at it. But don't worry, they will never find out where u live because of the nature of the Tor network. Except they will track that exit node and the ip that connected to the exit node so if u end up getting the same exit/2nd node they will look at you again. But once again it's really useless because they can't figure out where you live. I've probably scared you too much, just encrypt anything after the exit node.
Did you watch this video? Some agencies can find you no matter your measures. This is what NSA is for these days. Also check out panopticlick.eff.org.
I really would like to see a video about "freenet" and your opinion about anonymous/privacy. :)
Hi friend. Recently i've seen personalized hostnames.onion and that sounds scary to me as i try to serve my own web page under tor and i do not want anyone to steel my dientity. What do you say about that?
Please make a tutorial how to set up your own VPN, if possible, ...
what program is he using?
something you didn't mention; Anyone can sit on the endpoint :=) I feel like this should be really valuable information to anyone who wants to use tor, and it's kind of sad you didn't mention it Eli. Anyone can create an endpoint for tor and let traffic pass through it so they can see what you are up to :=)
i did't knew how tor browser works. thanks.
in the route you forget something :D from the exit node the connection goes to the final computer's isp and then trought some other servers to the final site's isp, then to the site.
so there are extra nodes and an extra isp between the final exit node and the website.
can you explain the vpn solution in other video ? the avast antivirus software offers free vpn solution. how much secured is that solution ? how it realy works ?
thanks. new romanian fan
Is it possible to spoof entrance nodes, so even if your packets get mined, the router will lead to a garbage IP, or would that be pointless.
I'm just asking. I already came up with a few problems with this; the fake node will probably have to be created from a proxy server anyway and that server would probably have all the information on exactly how it built that fake IP(which would probably have the randomizing algorithm and be easily brute force mined). Also that request would have to sent from the host, and even if the router sees the request, it's still up to the router to even do it. The request would also have to be decrypted by that router, but then even if the request is a separate packet from your data, and the key to process the request is just metadata, that could still be mined easily. But maybe if entrance node spoofing became a big thing, the information on how to build the fake IP could be stored on a specialized router instead of sent from the host. But then those proxies would be gold mines filled with keys, and if an intelligence agency opens one-OH GOD, I NEED TO STOP THINKING.
It is probably pointless, you can just use a vpn.
if we use VMware pc with tor is more save or not ?
Can you recommend a virus scanner/anti-virus? And isn't Tor better than nothing?
+Chris Meyer Not him but Avast Antivirus is good. Also, yes Tor is probably the to most effective way to protect your identity but the point is nothing is fully secure.
Malwarebytes
I realise it has been a few months since you asked but it's just good to spread knowledge. When it comes to things like AV performance, take a look at things like av-comparatives.org once in a while. They can give you an idea of how the various AVs stack up.
Selecting an AV is a bit like choosing which country to live in when the world is at war with the aliens. One might be safer today but that can change.
I accidentally used chrome and tor at the same time once now and im a little scared because I had my Facebook and email open, I'm pretty worried help!
I used chrome on the real web btw..
Ciera B idk if you still care, but your normal browser is prob more hackable than tor is, but not by a lot
Can tor be used in Ubuntu?
And if yes would the security risk still be there?
Yep I will......thanx for reply.
+Kartik Jain tails is better for complete anonymity
Informative & concise,Eli dude. Thanx 4 totally destroying MY opinion of TOR. Feel like such a noob. Believe I better subscribe, so teach on.
What about android from tablet and cell phone?
So, is VPN more reliable than TOR? Which do you recommend? The TOR browser I guess comes with the TOR download?
can someone explain more of the first problem?i dont understand,if someone is in the middle of cnn and tor,and monitoring let's say me,and my password,the information then encrypts and goes back thru three computers to me,how do they know to who information goes,if it's going thru many computers?ok,they have my password etc,but how to they know it's me?my real IP?
Just wanted to say just started to watch your videos and your very smart and you explain things very well thank you for the video you earned yourself this subscriber :)
Depends what you use tor for
since the nsa is in the tor network-exit-gates in particular and tor is super slow this technik is not a good way to protect ur security and keep up the speed simultaneously
hey,sorry,i'm just kinda frustrated,everything's slow,and now i find somehow tor has been put on our computer,by unknown persons,and i know so little about it--has anyone ever heard of this,tor being installed on someone's computer without their knowledge?
apparently it's not a regular program that can be easily 'uninstalled'-i wonder why,and how,or if it can ever be removed or at least fixed..i don't even feel qualified to ask proper questions-frustrating!
what should I download to go with tor?
+EpicHater 5801, Common Sense.
use bridges and linux, and youre good.
Well, one can always encrypt using the 'one time pad' if it's gotten that bad.
If you don't like TOR then what do you recommend that it more secure?
People using Norton..... LMAO
Thanks Eli. You're an awesome teacher.
SO WHAT'S THE BETTER SOLUTION!!!!!!!!!!!!!!!!!!!!! TO TOR!
And if we are on wifi?
If I use TOR, clone MAC address of my neighbor and use his WiFi (without his knowledge - that is crack it), is there anyway they will track me? I asked this question to someone working for Interpol, cyber-crime division and he was not able to give me a definite answer.
you (NIC) mac adress is where they got ya... TCP/IP sends your NIC in th e packets... every packet
Eli you forgot to point out that tor belongs to C.B.S. interactive and a scarry pants as myself would quickly link it the conglomerate co.who is VERY heavy in advertisement.
needless to say it's just another google corp. so I think I'll go back to smoke signals when something important has to get thru.
I am in South Africa :D Thanks for your Videos! Best Computer guy! :D
This guy knows what he is talking about.
I fell victim to the exact things that he is talking about.
Thanks for telling me how they do it.
Real security is to never have important information on a computer that's connected to the internet, don't give a shit about your internet communications, stay "prepared" for whatever they throw at you, surf and have fun.
Now, can you lay out a strategy that works for classified communications over the internet?
A lot of these issues can be addressed by booting a specialized live OS such as tails from a dvd or usb drive on a laptop. On a live DVD nothing gets saved and nothing can be installed permanently since it is ROM and everything is gone when you reboot. It will also allow you to do things like spoof your MAC address and tunnel data through a VPN on commonly open ports such as TCP port 80 or port 443 so you can use it on public wifi hotspots that firewall certain ports. Just don't use tor from home and constantly switch to different hot spots. I don't use tor other than looking out of curiosity maybe reading the hidden wiki and browsing the silk road once (I don't use, buy or sell any illegal drugs). I just love computer networking and security.
I still kind of want to check out the deep web, but same as you, out of curiosity. I do plan to steer clear of the super bad stuff like kiddie porn and drugs. What if you use your home computer but a neighbor's wifi instead of your own? What would happen then?
William Pritchett
It's not illegal to use tor from home if you're not doing anything bad. If you use a neighbor's wifi without permission it is technically illegal but finding who broke into his network would be hard unless you didn't spoof your MAC address and computer name which gets stored on the router. If you just want to browse I would just use the live dvd from home on your own network unless you are trying to bypass censorship laws etc.
William Pritchett Then it would trace back to your neighbor's network, but not necessarily any of his devices. If you did something bad enough, they would find you by your MAC address on your device.
What would be so bad if they got the mac address? Assuming that they are in a neighbor's house looking for my pc (which they wont find cuz its in my house), how can they find me?
They can see what mac addresses are associated with which ssid using something like airmon-ng IF they really wanted to find you. If they saw the targeted mac nearby even if connected to another network they could chase down the signal because your wifi adapter transmits as well as receives radio signals during regular use. Again it's very unlikely unless they REALLY wanted to find you.
I've heard Whonix is one of the best ways to access Tor
+pepe the frog The disinformation is real
Well Eli the (not sure or it is still the case as this is from 2013, now it is 2020) same will go up as soon you start to type on your keyboard keystrokes can be logged hence, key logger, because everything you type on your computer is pure text letter by letter then it will be encrypted (later) let's call this an input point. Then it will go to your ISP that is visible, not the encrypted data, but your connection from your home to your ISP so they know you are using TOR right? Once you are in the TOR network I say go from node to node stay encrypted but stay inside that network to go to some TOR website don't exit the TOR network then you are fine, why do I need TOR to go like this home---ISP---TOR Network---[Exit node] ---exit to CNN or Google? You don't you stay in the TOR network the last node will stay in the encrypted environment it are encrypted websites inside the TOR network, seems to me a lot better, you don't exit that would make TOR obsolete in that case you just use a normal browser, not TOR after all it is to mask your identity is that not correct? So Eli why would you use TOR at all if your target website is on the regular internet? It will force you to exit, to mask your IP (changed) you can use a VPN TOR can not protect you on a exit. node.
1. Why are you PM'ing me instead of replying in the video comments?
2. Why do you expect people to add you as a contact in order to PM you back?
3. Why did you randomly advertise NOD32?
If I was in charge of "securing" a county I would make my own internet cafes for people to go to.
If you want privacy, just use chrome and turn on the "Do not track" option, so your data will not be indexed on the site.
what are the better solutions then !!!!??????????????????
Now you need to make sure your hardware isn't corrupted by the manufacturer, as the NSA has put code in the firmware.
I agree with you, Eli. Tor scares the hell out of me. Talk about a behavior-based honey pot. . .
So, basically, if you're not a hacking god, do not even think about using Tor. Go back to Facebook, and forget everything you saw.
...or study and learn then proceed, option C.
YashumGod Pi no, basically if youre not a hacking god, stay away from the internet lol. Study and learn then proceed at your own risk.
No one is born a hacking god, are you wanting to appear ignorant? They all studied as I suggested.
Holy crap guys, it's a joke, chill out!
Where is Skankhunt42!? We need him!
The most beautiful "thing" about a person is their minds. Freedom of mind makes the human race evolve into something better. The internet can be such a amazing tool for a better world...but money hunry corporations corrupt it (jmho).
Thanks for making people think ;)
Can we use Tor to bypass China's firewall?
Dear Eli, You're quite the guy I have a question for you? As anyone started trying figure out ways to encrypt text messaging on cell phones? or even encrypt voice conversations on cell phones?
Chatsecure, RedPhone and Signal... download them lol
Kevin Horst Textsecure and red phone.
Tor is quite reliable as an anonymity tool. You just have to make sure you don't give out any personal info whilst you are using Tor, because Tor only hides your ip address. You still have to make sure you don't give out any info that can reveal your true identity while using Tor.