How Tor Works? (The Onion Router)

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 เม.ย. 2024
  • Tor or (The Onion Router) is a free and open source project for allowing anonymous communication.
    In this video I want to discuss this technology and explain how it works.
    * What can sniffers really see?
    * Why Tor? Why don’t we just use a VPN?
    * How Tor Works?
    * More about Tor
    So if you are interested stay tuned.
    TimeCodes:
    0:00 Intro
    1:30 Normal Request
    4:30 What sniffers see
    6:00 Why Tor and not VPN?
    8:50 How Tor Works
    21:00 More tor info
    Download slides here payhip.com/b/dLCk2 (members get all slides for all my videos free)
    🏭 Software Architecture Videos
    • Software Architecture
    💾 Database Engineering Videos
    • Database Engineering
    🛰 Network Engineering Videos
    • Network Engineering
    🏰 Load Balancing and Proxies Videos
    • Proxies
    🐘 Postgres Videos
    • PostgresSQL
    🧮 Programming Pattern Videos
    • Programming Patterns
    🛡 Web Security Videos
    • Web Security
    🦠 HTTP Videos
    • HTTP
    🐍 Python Videos
    • Python by Example
    🔆 Javascript Videos
    • Javascript by Example
    Support me on PayPal
    bit.ly/33ENps4
    Become a Patreon
    / hnasr
    Stay Awesome,
    Hussein
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 131

  • @hnasr
    @hnasr  3 ปีที่แล้ว +20

    Many asked how does the client obtain the 3 keys without showing its identity.. here us how it happens..
    The TLS handshake happens incrementally as follows
    C client, T-1,2,3 tor nodes, D destination
    C - T1 - T2 - T3 - D
    C establishes TLS with T1 and agree on key lets call their key Kct1
    C sends an encrypted message to T1 asking it to establish TLS with T2 the way it does this T1 acts like a forwarding agent. It forwards the tls client hello to T2 on behave of C so technically T1 is now MITM but it cant really derive the keys agreed between C and T2 and T2 doesn’t know it is talking to C because T1 is the mediator so now we get Kct2
    Now using the same trick, C tries to TLS to T3 but encrypts the TLS hello with kct2 then encrypts that with Kct1 then sends it to T1, T1 decrypt sees garbage forwards it to T2, T2 decrypt sees a tls hello from T1 to T3 sends it.. and the same thing happen which finally results in Kct3

  • @jacthemuss
    @jacthemuss 3 ปีที่แล้ว +46

    As a programmer for 10 plus years, you are the best channel i yet discovered. Great blend of deep technical info and graphics plus nice humour. Keep it up

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Welcome aboard! Thank you so much for your comment I appreciate you

  • @dmitrikonnov922
    @dmitrikonnov922 ปีที่แล้ว +1

    You're doing a great job: You always go into the nitty-gritty details of the subject matter which I've increasingly missed elsewhere.

  • @miguelalejandro7045
    @miguelalejandro7045 3 ปีที่แล้ว +33

    "They're from california thats why they talk like that" LMAO

  • @jongxina3595
    @jongxina3595 2 ปีที่แล้ว

    Amazing. Best actual description of how Tor works 👍

  • @Eljulitus
    @Eljulitus 3 ปีที่แล้ว +4

    This was a really entertaining way to learn about this. Educative and funny 😂 You`re good! Thanks a lot for your great explanation.

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Thank you! 😃

  • @scivolettomattiamaria9597
    @scivolettomattiamaria9597 ปีที่แล้ว

    I just liked the completeness of the explanation! Well done

  • @muiriosvanbrugh7146
    @muiriosvanbrugh7146 4 ปีที่แล้ว +6

    Great explanation. It would be great to see an updated video incorporating questions answered below and even a more in-depth of what each packet contains.

    • @hnasr
      @hnasr  4 ปีที่แล้ว +2

      Muirios Vanbrugh I agree! We learned so much ever since and great questions were asked. 👍

  • @aishwarya6123
    @aishwarya6123 3 ปีที่แล้ว +1

    Great video! Explained beautifully.

  • @jorgeolmedo3474
    @jorgeolmedo3474 3 ปีที่แล้ว +3

    Great explanation, thank you!

  • @WiLL-by5sw
    @WiLL-by5sw 2 ปีที่แล้ว

    Thank you so much Hussein! Awesome video!

  • @saad.83
    @saad.83 4 ปีที่แล้ว +10

    Amazing explanation, easy to comprehend, super Fun! Keep up👍🏼

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Saad Itani thank you Saad! Glad you enjoyed it .

  • @umeshb8210
    @umeshb8210 3 ปีที่แล้ว +1

    Greatly Explained

  • @brainoverflow98
    @brainoverflow98 2 ปีที่แล้ว

    Beautiful presentation!

  • @franksemmi435
    @franksemmi435 4 ปีที่แล้ว +2

    Love the content. ❤️

  • @TheExoHaza
    @TheExoHaza 3 ปีที่แล้ว

    Thanks that was easy to follow and fun

  • @IamMclov1n25
    @IamMclov1n25 4 ปีที่แล้ว

    ur channel is a gold mine

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Thanks ! Best comment I got, made my day 🌞

  • @devashishprasad1509
    @devashishprasad1509 3 ปีที่แล้ว

    BEST EXPLANATION!!

  • @jyotigajrani7031
    @jyotigajrani7031 2 ปีที่แล้ว +1

    very well explained

  • @wongsiutingbrian2552
    @wongsiutingbrian2552 4 ปีที่แล้ว +1

    great stuff!!

  • @itsmeafreak
    @itsmeafreak 3 ปีที่แล้ว

    Great talk!

  • @aaabbb-qv4ff
    @aaabbb-qv4ff 4 ปีที่แล้ว +1

    Very nice explanation, you should definitely do a movie about dark net.

  • @void_star_void
    @void_star_void 4 ปีที่แล้ว

    Superb explanation

  • @ajasmt9530
    @ajasmt9530 3 ปีที่แล้ว +1

    This guy is awesome 👌😍

  • @rohangaonkar8912
    @rohangaonkar8912 2 ปีที่แล้ว

    Nice explanation

  • @1992corvette1
    @1992corvette1 3 ปีที่แล้ว +1

    Thumbs up for making a topic as boring as this fun to listen to.

  • @yashdesai8372
    @yashdesai8372 3 ปีที่แล้ว +2

    Crystal clear :)

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Yash Desai 💎🙏

  • @shimronnetia
    @shimronnetia 3 ปีที่แล้ว

    nice homor.. very insight topic

  • @ayoubbetane5878
    @ayoubbetane5878 3 ปีที่แล้ว

    what a Great explanation i like it

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Thanks Ayoub

  • @tubbalcain
    @tubbalcain 3 ปีที่แล้ว +1

    Great explaination, you know your stuff.
    One question: How do you prevent being compromised, while negotiating the keys with the nodes?

    • @hnasr
      @hnasr  3 ปีที่แล้ว +2

      tubalcain thanks! I learn more as I make more videos and great question
      This is something I missed talking about in the video. The client (you) negotiate key with first node using DH. Then establishes a TLS connection the first node. It then uses the first node as a proxy to negotiate the key with second node. So second node only knows that first node is talking to it but the first node can’t even get the key that is negotiated with node 2 because of property of Diffien helman (DH) ( check out my TLS video to learn more)
      Once we have the second key, we do the same thing, connect to first node and proxy to second node which will connect us to third node which only sees node 2.
      We then negotiate 3rd key.
      Very smart and extremely hard to break.
      Hope that helps!
      (TLS 1.3 video th-cam.com/video/ntytZy3i-Jo/w-d-xo.html)
      The spec
      gitweb.torproject.org/torspec.git/tree/tor-spec.txt

    • @tubbalcain
      @tubbalcain 3 ปีที่แล้ว +1

      @@hnasr thanks 👍and sorry, I was scrolling down the comments and saw the same question already ask, haha. Shame on noob me 😂

    • @jacksonmcginnis1854
      @jacksonmcginnis1854 3 ปีที่แล้ว

      @@hnasr if that's the case how does the client know all the keys?

  • @rheinalbatros6669
    @rheinalbatros6669 3 ปีที่แล้ว

    Great!

  • @chimaugochukwu7705
    @chimaugochukwu7705 4 ปีที่แล้ว +8

    Great explanation. But wouldn't the identity of the client be compromised while creating the symmetric keys with the relay nodes?

    • @hnasr
      @hnasr  4 ปีที่แล้ว +9

      Thanks! This is a question that I have been trying to answer for a while.
      Edit:
      More info on this now that we know more (thanks everybody)
      This is something I missed talking about in the video. The client (you) negotiate key with first node using DH. Then establishes a TLS connection the first node. It then uses the first node as a proxy to negotiate the key with second node. So second node only knows that first node is talking to it but the first node can’t even get the key that is negotiated with node 2 because of property of Diffien helman (DH) ( check out my TLS video to learn more)
      Once we have the second key, we do the same thing, connect to first node and proxy to second node which will connect us to third node which only sees node 2.
      We then negotiate 3rd key.
      Very smart and extremely hard to break.
      Hope that helps!
      (TLS 1.3 video th-cam.com/video/ntytZy3i-Jo/w-d-xo.html)
      The spec
      gitweb.torproject.org/torspec.git/tree/tor-spec.txt

    • @chimaugochukwu7705
      @chimaugochukwu7705 4 ปีที่แล้ว

      Ok, thanks.

    • @hakkerb35
      @hakkerb35 4 ปีที่แล้ว +1

      The client establishes the symmetric keys with the other relays through the entry node (never directly talking to other relays) thanks to the magic of the "Diffie-Hellman" key exchange method that allows the client to establish a shared secret over an insecure channel.

    • @hakkerb35
      @hakkerb35 4 ปีที่แล้ว

      ​@@hnasr The Onion proxy runs on the client machine

    • @muiriosvanbrugh7146
      @muiriosvanbrugh7146 4 ปีที่แล้ว +2

      @@hakkerb35 So if I understand your statement correctly, using video clip at 14:35 as the example, T1 would be the entry node? If this is to be true then Client A would tell T1 it needs a guard key, middle key and exit key? If this is to be true then T1 would reach out to both T2 & T3 passing on the info back to Client A?

  • @tashirojima
    @tashirojima ปีที่แล้ว

    but the last node knows who initiate the request (it can relate the key with client during the first setup) and where the request goes to, is this a problem?

  • @eriknelson9282
    @eriknelson9282 3 ปีที่แล้ว

    ooooooo that's a NICE packet

  • @quicktutorials7662
    @quicktutorials7662 4 ปีที่แล้ว +1

    Great explanation! :)
    What software do you use for editing videos?

    • @hnasr
      @hnasr  4 ปีที่แล้ว +2

      Thanks!! I use iMovie and Canva

  • @TheSagitta969
    @TheSagitta969 3 ปีที่แล้ว

    There's one thing I don't quite understand. The last exit node knows it is the last node, because after decrypting it sees a meaningful request. The last node receives the encrypted request from the previous node, so it shouldn't know about the original requester, but what about the KEY exchange?? Since the last node knows it is the last one, shouldn't it figure it out that whomever it established the symmetric key with is the original requester? Diffie-Helmann is still tied to IP's, isn't it? Shouldn't the exit node have all the pieces of the puzzle? The IP of whoever established the key with them and the request itself?

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Good question, the TLS handshake happens incrementally as follows
      C client, T-1,2,3 tor nodes, D destination
      C - T1 - T2 - T3 - D
      C establishes TLS with T1 and agree on key lets call their key Kct1
      C sends an encrypted message to T1 asking it to establish TLS with T2 the way it does this T1 acts like a forwarding agent. It forwards the tls client hello to T2 on behave of C so technically T1 is now MITM but it cant really derive the keys agreed between C and T2 and T2 doesn’t know it is talking to C because T1 is the mediator so now we get Kct2
      Now using the same trick, C tries to TLS to T3 but encrypts the TLS hello with kct2 then encrypts that with Kct1 then sends it to T1, T1 decrypt sees garbage forwards it to T2, T2 decrypt sees a tls hello from T1 to T3 sends it.. and the same thing happen which finally results in Kct3

  • @usamatahseenulhaque9125
    @usamatahseenulhaque9125 3 ปีที่แล้ว

    Thnks for great explanation ....but How are t1 t2 and t3 desided are they desided form all the number of clients that are currently online on tor browser if i am using tor browser is someone elses network traffic going through my computer

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Usama Wizard those nodes are not normal clients, (tor browser) those must be an actual tor node. You download the software and agree to be a tor node so traffic goes through you.
      If you use the tor client you are a user..
      Hope that helps

  • @astronomer404
    @astronomer404 3 ปีที่แล้ว

    Could you please share the presentation Sir ??

  • @DeusVult1775
    @DeusVult1775 2 ปีที่แล้ว

    If TOR uses the nodes, and the nodes communicate with each other- wouldn’t you be able to be tracked via following the nodes back to the source? I don’t know much about computer stuff, I just got curious and looked this up.

    • @hnasr
      @hnasr  2 ปีที่แล้ว +1

      Each node only know the node before it and after it. So yes if you are running all the 3 nodes you will be able to track the request to its source. In reality its very hard to do.

  • @kellysmith7357
    @kellysmith7357 2 ปีที่แล้ว

    I love onions!

  • @hikariangel6520
    @hikariangel6520 2 ปีที่แล้ว

    The real question here is, is the first tor node reliable? Is a trust problem, exactly like the vpn one.

  • @psych4054
    @psych4054 2 ปีที่แล้ว

    I have a doubt. If someone in the circuit disconnect their tor browser, their node will no longer be in the circuit. What will happen at that time??
    1)
    If i give get request already and waiting for the response, and suddenly a node goes offline. What will happen?
    2)
    If i use tor, mine will also be a node, so i transfer data to some website for someone else. If they are doing something illegal, I'm the one who is going to be in trouble. Right?
    3)
    And am I using extra data?
    For example, I'm watching a video which is 5mb in size, if i am involved in tor circuit and someone else is watching other video of 100mb (in 10 mins, cuz after that circuit will change). So am i going to lose 105mb data?
    I am sorry if my questions are silly. I am new to these kind of topics. Please explain

  • @GM-wm8ex
    @GM-wm8ex 4 ปีที่แล้ว

    So, if the client sets up separate symmetric keys with all three relay nodes then won’t the relay nodes detect the client when the packet reaches the nodes? Because only the correct key can decrypt the packet and that key was generated with the client.

    • @GM-wm8ex
      @GM-wm8ex 4 ปีที่แล้ว

      Okay, that’s same question as Chima! But, it is widely accepted, so maybe you are missing something?

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      G M yes I missed to mention a very important point in the video. The client enters the Tor network using an Onion Proxy which negotiates the keys on behalf of the client with the 3 tor nodes. So the tor nodes don’t know the identity of the client. 👍
      Usually the onion proxy is also the first node or the entry node which already knows the client so it negotiates the keys on its behalf.

  • @palaniappanrm6277
    @palaniappanrm6277 3 ปีที่แล้ว

    The info that the exit node at max will know the ip A is connecting to and not the actual data right because the data will be encrypted between A and B?

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Palaniappan RM the exit node will see the data (except if its encrypted with TLS) but exit node doesn’t know the IP address of A

    • @palaniappanrm6277
      @palaniappanrm6277 3 ปีที่แล้ว

      @@hnasr TLS between A and B mostly will be there right?

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Mostly correct for all websites (HTTPS)

  • @derekeden1163
    @derekeden1163 4 ปีที่แล้ว +1

    interesting video...hypothetically speaking, if you were engaging in illegal activity - could the exit node not be held liable given that the destination IP will know who they are? isnt this just like shifting the onus onto the exit node?

    • @hnasr
      @hnasr  4 ปีที่แล้ว +2

      That is a good question, i dont really know the answer.
      Technically all nodes facilitied the illegal activity. But I don’t think they should be held accountable.
      Its like arresting the black smith that made a knife because his knife was used in murder scene? I don’t know 🤷‍♀️
      Interesting question though

    • @derekeden1163
      @derekeden1163 4 ปีที่แล้ว +1

      @@hnasr found this
      www.reddit.com/r/TOR/comments/b7rfb4/are_exit_node_operators_legally_responsible_if/

    • @derekeden1163
      @derekeden1163 4 ปีที่แล้ว

      @@hnasr technically your example is not a direct comparison because the black smith never stabbed anyone..in this case the exit is actually the one committing an illegal act, albeit unknowingly

    • @derekeden1163
      @derekeden1163 4 ปีที่แล้ว

      but thank you for this video

  • @jacksonmcginnis1854
    @jacksonmcginnis1854 3 ปีที่แล้ว

    So, if each transmission is only aware of the directly connected nodes, wouldn't it still be possible to track?
    Let's say I'm accessing illegal content and law enforcement were able to get a warrant, couldn't they simply monitor the next hops and follow it back? It might be hard to determine which packet belongs to which circuit but if few enough people were using it they might be able to link the nodes based on where they are sending packets and draw a path back to you

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Correct, if cia is running tor nodes and you happened to land on a circuit of 3 nodes run by the CIA they can know which sites you are visiting. However they still can’t see what content you are access if the website is secured (HTTPS) unless the actual website shares that info with them

  • @telisijohn2054
    @telisijohn2054 4 ปีที่แล้ว

    How does the ISP know to block a traffic for a TOR server? Do or can their Edge router decrypt and encrypt the packet to identify the circuit number before forwarding it to the next hop?

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Telisi John I was thinking the ISP can block the IP addresses of the most common TOR directories out there.. so clients cant even get to create a circuit.
      I don’t believe they can decrypt the traffic since they shouldn’t have the key.

    • @telisijohn2054
      @telisijohn2054 4 ปีที่แล้ว

      Thanks. I forgot about the ISPs can in fact blockhole traffic destined for TOR server if they see it fit. How about torrent servers designed for educational purpose, can you stream traffic from torrent servers using TOR?

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      Yes Of course you can stream over tor since tor operates at TCP layer (4ish). and torrent uses tcp

    • @muiriosvanbrugh7146
      @muiriosvanbrugh7146 4 ปีที่แล้ว

      Using Deep packet sniffer they can identify the traffic flow as Tor and block it that way. If they do block it based on traffic flow then you would need to use a pluggable transport; this makes tor traffic flow look like innocent-looking traffic.

  • @DarkEagle01
    @DarkEagle01 3 ปีที่แล้ว

    What about VPN over TOR?

  • @vim55k
    @vim55k 3 ปีที่แล้ว

    Would you do video about vpn? Technology I mean, not the if I should...

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      I actually do have a video comparing it to a proxy th-cam.com/video/npnqyRT77Zc/w-d-xo.html

  • @Michael89312
    @Michael89312 3 ปีที่แล้ว +1

    what happens when the data packet is decrypted at the exit node and sent to the server? is that data not unencrypted and exposed at that point? good video btw

    • @neotodsoltani5902
      @neotodsoltani5902 3 ปีที่แล้ว

      It depends on what any other privacy methods you use, for example, if you use HTTPS instead of HTTP, data between the exit node and the server (your actual data) won't be exposed to anyone.

    • @Michael89312
      @Michael89312 3 ปีที่แล้ว

      @@neotodsoltani5902 yea I was thinking this. would that show in TOR I guess in the usual place if TLS is being used?

  • @LukeSchenk
    @LukeSchenk 3 ปีที่แล้ว

    If you were a professor I would have actually graduated from college

  • @shimon1
    @shimon1 3 ปีที่แล้ว

    something I don't understand - if the encryption process starts at the exit node and works backwards, doesn't it mean that the exit node knows who i am as well? if it is not the request I am sending, which contains my IP address, that is being transmitted when the encryption starts, what exactly is being transmitted? and where is it coming from?

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Shimon Abitbol I explained that in the video, the request packets are being encapsulated and and changed to reflect the correct SOURCEIP address so that each nodes knows the nodes before it.
      On top of that each layer is encrypted with the node’s key.

  • @ripofs8441
    @ripofs8441 2 ปีที่แล้ว +1

    Can My Internet Admin View My Browsing History?

  • @robinacy8143
    @robinacy8143 2 ปีที่แล้ว

    how do i access it?

  • @glennrichards5945
    @glennrichards5945 3 ปีที่แล้ว

    So basically, through a series of nodes, we encrypting the data 3 times and sending it to the server right?

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Correct and the client knows how the decrypt all 3 layers

    • @glennrichards5945
      @glennrichards5945 3 ปีที่แล้ว

      @@hnasr thank you! You're video was very helpful. I'm gonna hit subscribe. I hope u keep posting good quality videos

  • @htech7840
    @htech7840 2 ปีที่แล้ว

    So our provider can see our traffic! Because the IP Source is in clear!

    • @hnasr
      @hnasr  2 ปีที่แล้ว +1

      Your provider will see that you are sending traffic to the first TOR node IP address. ISP will not see your final destination in TOR

    • @htech7840
      @htech7840 2 ปีที่แล้ว

      @@hnasr Then the traffic can be read!

  • @olehhrabovskyi5991
    @olehhrabovskyi5991 2 ปีที่แล้ว +1

    Man, you are crazy, but like for nice explanation.

  • @Ali_Alhajji
    @Ali_Alhajji 3 ปีที่แล้ว

    Does T1 know for sure that I'm the origin of all this process? Or it thinks that I'm just another relay for another TOR client behind me?

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Correct T1 knows that you are the origin and it knows your IP address (unless you used a Proxy to connect to T1) in this case T1 will know the Proxy's IP..
      T1 does not know where you are going just that you are using Tor
      T3 knows that someone is going to B but doesn't know who (It knows T2 wants to go there)
      There is something I missed in this video is key exchange . The client (you) negotiate key with first node using DH. Then establishes a TLS connection the first node. It then uses the first node as a proxy to negotiate the key with second node. So second node only knows that first node is talking to it but the first node can’t even get the key that is negotiated with node 2 because of property of Diffien helman (DH) ( check out my TLS video to learn more)
      Once we have the second key, we do the same thing, connect to first node and proxy to second node which will connect us to third node which only sees node 2.
      We then negotiate 3rd key.
      Very smart and extremely hard to break.
      Hope that helps!
      (TLS 1.3 video th-cam.com/video/ntytZy3i-Jo/w-d-xo.html)

    • @Ali_Alhajji
      @Ali_Alhajji 3 ปีที่แล้ว

      @@hnasr very clear. But I wonder if it's possible to build something similar to TOR, but with all nodes are unable to make sure if the received packet came from an origin or from a relay node? 🤔🤔 Food for thought

  • @sammywilliam8156
    @sammywilliam8156 2 ปีที่แล้ว

    Basically it is super fire fox

  • @frankbraker
    @frankbraker 2 ปีที่แล้ว

    Why should I trust any TOR directory?

  • @filipposilva8677
    @filipposilva8677 2 ปีที่แล้ว

    How could someone circumvent this process? Seems almost impossible

  • @efvanonalisa5124
    @efvanonalisa5124 3 ปีที่แล้ว

    The onion rounter can create visit to dark web
    The onion rounter can visit dark web

  • @erensrtky
    @erensrtky 4 ปีที่แล้ว

    İf we use tor, is that mean we are may become a exit node ?

    • @hnasr
      @hnasr  4 ปีที่แล้ว +1

      Eren Sertkaya no , you become a tor server node when you install the tor server node software. When you use tor as a client you only download the client tor software.. good question!

    • @grgr8238
      @grgr8238 4 ปีที่แล้ว +1

      No you become only spied by CIA running tor relays

    • @erensrtky
      @erensrtky 4 ปีที่แล้ว

      ​@@hnasr Thanks for your good explanation :)

  • @rogernevez5187
    @rogernevez5187 3 ปีที่แล้ว

    9:23 *Your client makes a request to a Tor Directory.*
    Is this a direct request ??? Does the Tor Directory server knows the IP of the client ????

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Yes the directory knows the client IP, but it doesn’t tell what websites the client is consuming. All it does is reveals that this client uses TOR

    • @rogernevez5187
      @rogernevez5187 3 ปีที่แล้ว

      @@hnasr This seems bad. It means that the directory servers know all IPs that uses Tor.

  • @a.a7907
    @a.a7907 4 ปีที่แล้ว

    Tor browser was made to track their clients.

    • @hnasr
      @hnasr  4 ปีที่แล้ว

      I wouldn’t be surprised. It has access to pretty much everything. Unless you can compile it from Source You can’t trust it.

  • @yas.mineah
    @yas.mineah 3 ปีที่แล้ว +1

    07:06 Raison I subscribed .
    You're cool .❤️❤️❤️

  • @aissetzaki9848
    @aissetzaki9848 3 ปีที่แล้ว

    left after 2min ....

  • @gamedevelopment552
    @gamedevelopment552 2 ปีที่แล้ว

    Your English is so different 🤣🤣

  • @oukhajouanas9852
    @oukhajouanas9852 3 ปีที่แล้ว

    انا عربي لم افهم ماتقوله يا اخي

  • @user-hq2jw1nq2y
    @user-hq2jw1nq2y 2 ปีที่แล้ว

    ط1

  • @hillelspivakov4848
    @hillelspivakov4848 3 ปีที่แล้ว

    Nice video. Thank you. Can you please do less jokes?

    • @Resedda
      @Resedda 3 ปีที่แล้ว

      There are tons of boring explanations about this topic out there. Get out of this funny one if it doesnt pleases you.

  • @medin.n
    @medin.n 4 ปีที่แล้ว +3

    The accent ...

    • @gomrecords2592
      @gomrecords2592 3 ปีที่แล้ว

      HAhAgAg aaaGAgAGaGaGAgGaGAgaAGGbaBaGAGGaGavBaB

  • @syedrizwan7722
    @syedrizwan7722 3 ปีที่แล้ว +2

    unnecessarily long

  • @1blalalalala
    @1blalalalala 3 ปีที่แล้ว

    Try to put your back into it, or at least prepare your presentation.