In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.
+ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets. posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!
An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address. This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear. The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.
if the exit node knew the address of the destination doesnt that blow my cover? im just confused i know this comment is 5 years old but im still curious.
Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.
They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday
I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.
I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.
Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.
11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...
+PyroChimp75 This is actually incorrect. The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up. Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.
Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.
It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.
It's not a "fake" IP, it's the IP of the TOR exit node you leave the TOR network with, big difference... You can still be caught from traffic analysis if the exit node you come out of is logging all the traffic and the authorities get a hold of it (they could own the exit node). It is hard and unlikely you will get caught, but it is definitely possible. Traffic to and from .onion websites/services run completely inside the TOR network and are much more secure, you are right about that!
Using tor and anonymous proxies has always been said to keep you anonymous on the internet. But if you don't know who is hosting the server that you are routing everything through you could be putting your self into the middle of a man in the middle attack. What I would recommend doing is buy a prepaid visa credit card (with cash) and use it to buy a server out in the cloud. This way there is no name tied to it. Then run a squid proxy or ssh tunnel safely, assuming the VPS host isnt big brother.
"Those who trade liberty for safety deserve neither." - Ben Franklin They keep taking our liberty little by little but everybody is too comfortable with their lives to risk all they own to fight for liberty. By the time we realize what they've taken it will be too late.
Very true that encryption might raise suspicion, e.g., using Tor or VPN. However, the more people that use encryption, the less of an outlier you become ("anonymity loves company"). Unless you are involved in cracking, exfiltrating state secrets, etc., you can probably ignore steganography for more practical alternatives.
The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.
If you want to use a coffee shop's internet connection for anonymity, there's no reason to actually go into the shop. Just stay outside in your car and use a directional high gain antenna pointed at the shop. Should work fine through your window glass as long as your windows aren't coated with any metalized film.
Freenet is not a connection based network. It's more like a HUGE harddrive where people can insert and retrieve files anonymously while unpopular files get slowly deleted. You can't route connections through Freenet. At least not in the current protocol implementation.
Awesome thumbnail! I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.
You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination. It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)
Freenets security is two fold. Firtly, when you request a resource from a neighboring node there is no way for them or an easedropper to tell if you are requesting the src for yourself or merely forwarding along the request for someone else. Conneting to strangers does nothing to comprimise this part of the security. The other part only works in F2F mode, and that is that F2F traffic is indistinguishable from VPN traffic.
Need more uploads :D LinusTechTips check, LinusCatTips check, Thechquickie check, razethew0rld check, ashens check. Dam I need more uploads from you guys :D
How can I possibly say? I don't know how you use your computer xD In terms of games though at 1080p, it should be great for most source games, half-life/tf2 etc, minecraft will be fine, most console ports should do well too. But don't expect to be maxing out crysis or metro. I would also suggest that you purchase an decent (synchronous flash) ssd for your OS if you can afford to. I did so, and it makes an enormous difference to overall responsiveness.
What are you trying to say about UDP and TCP? Both are just ways of sending things from one IP to another. You can see the IP address that each came from no matter what protocol it is sent through, as it still goes through the internet, and each packet contains the source information and destination. As far as the VPN, it really just depends on the provider. Some don't keep logs, some do. If they do, you can still be screwed.
tor is one of the best programs ive examined. however nothing will truly keep u in the clear, were not the govt and we dont have their resources. things like timing ataks and window mapping, combined with the right surveillance at each end of the network can be enuf to find and link you with your activity inside. just keep it in mind when ur pushing/pulling data anywhere outside your own network.
Do one on Retroshare and Jitsi (but wait for version 2.0, which should be out soon). Also the Retroshare guys I think are preparing some big stuff for February, so might want to wait a bit until you do one on both.
Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?
that is actually a good idea. Freenet reminds me of what kim.com was trying to do where megaupload is on many servers not just one or a couple. Actually freenet seems a lot like megaupload's new plan. hmmm...
Some interesting infos guys. Your voice is a LOT louder than your buddy in the room. Get him a mic or use an expander on the audio track por favor. I like your windscreen.
Well... logan should say one thing... what is the usage of tor and what of freenet. Freenet has nothing to do with commercial surface internet. Tor if used correctly can improve your privacy on this "surface net browsing" (amongst others of course). I would appreciate if Logan linked a few videos with jacob appelbaum saying things about tor more deeply than here in tek.
As for Tor, Tor is not nearly as secure as Freenet, for one Directory Requests are (as of the last I checked) sent in the clear (albeit signed) and hence can identify you as a tor user to an easedropper. Otherwise using Tor to surf the open web definately isn't stupid proof, it is safer engaging in the exact same behavior either through a single-hop proxy/VPN or through your ISP. Connecting to a offshore VPN through Tor and paid for with BTC is pretty close to bullet proof.
Just connect to any open Wifi in your neighborhood (although this might be considered illegal in some countries). There really is no other way. I did this years back for few weeks when I moved and my ISP took unreasonably long to connect me up, if you are going to do it be nice about it and don't torrent illegal stuff or otherwise abuse their connection.
My friend from Norway said America is fucked up because in his country the government isn't allowed to break your door down for booting a site offline for 10 minutes.
most of the weaknesses of for tor claimed in this video are not shortcomings of tor. in many ways tor is in fact superior than freenet in that it allows for websites to have more traditional websites behind a so called "hidden service". a hidden service is a special tor website or service only accessible inside the tor network, therefor there is no exit node required. overall, a fairly half assed video that i am surprised they uploaded.
The other issue that was brought up are data leaks that might deanonymize you. If you don't know what you're doing, stick to the TorBrowser. BitTorrent downloads utilize UDP (Tor is TCP only), so of course you will be deanonymized right away. If you want total privacy and are in the states, use a good VPN provider (e.g., AirVPN). Once connected, run Tor and now your traffic is private, encrypted, and anonymized. Search TH-cam for "nsa whistleblower tells all" to find out more on the subject!
Can't believe this video is a decade old. Still looks as fresh as this year. And possibly is still relevant.
In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.
ZXcross Finaly, someone gets it!
+ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets.
posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!
ZXcross bingo! Can't stand the whole nanny state phenomenon, like in ca or my.
That's just it. You are not as free as you think. A safe nation IS the ONLY free one.
underated comment
I've learned more about computers and networking from this channel than I have from my two year course in computing.
An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address.
This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear.
The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.
if the exit node knew the address of the destination doesnt that blow my cover?
im just confused i know this comment is 5 years old but im still curious.
I thought that the exit node only knew one of the IP addresses either your or the website you want to visit and the beginning node knows the other
Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.
They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday
Well… private agencies collect data without the consent of users.
I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.
You guyz earned a customer with this one. Gonna buy some gear to help the show and rep the Syndicate!
I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.
Nice video but what about I2P? Would be great if you'd cover it too.
Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.
Great info on Tor and the freenet...tks.
11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...
+PyroChimp75
This is actually incorrect.
The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up.
Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.
Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.
I totally agree Logan Please do a talk segment about Shodan.
I learn something new every time I watch your videos.
really great video. We need more people to see this. They should not touch our privacy. Mass have to show some resistance.
you can use google like normal, tor uses the interface of firefox, it just routes your traffic through a bunch of proxies.
It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.
Great video, explained from all angles like you said.
It's not a "fake" IP, it's the IP of the TOR exit node you leave the TOR network with, big difference... You can still be caught from traffic analysis if the exit node you come out of is logging all the traffic and the authorities get a hold of it (they could own the exit node). It is hard and unlikely you will get caught, but it is definitely possible.
Traffic to and from .onion websites/services run completely inside the TOR network and are much more secure, you are right about that!
I had to pause and just laugh off the horrible 'torrable' joke, well done done Logan
Using tor and anonymous proxies has always been said to keep you anonymous on the internet. But if you don't know who is hosting the server that you are routing everything through you could be putting your self into the middle of a man in the middle attack. What I would recommend doing is buy a prepaid visa credit card (with cash) and use it to buy a server out in the cloud. This way there is no name tied to it. Then run a squid proxy or ssh tunnel safely, assuming the VPS host isnt big brother.
"Those who trade liberty for safety deserve neither." - Ben Franklin
They keep taking our liberty little by little but everybody is too comfortable with their lives to risk all they own to fight for liberty. By the time we realize what they've taken it will be too late.
Yeah man, I've only subscribed to a 4 or 5 things on youtube since 2006, This is one of them.
FINALLY!!!!! Iv been looking for you ever since you left tiger direct!!! now i found you!!!!!YEAHHH
Very true that encryption might raise suspicion, e.g., using Tor or VPN. However, the more people that use encryption, the less of an outlier you become ("anonymity loves company"). Unless you are involved in cracking, exfiltrating state secrets, etc., you can probably ignore steganography for more practical alternatives.
I have been waiting for this forever!
Congrats on 60 000!!!!
The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.
If you want to use a coffee shop's internet connection for anonymity, there's no reason to actually go into the shop. Just stay outside in your car and use a directional high gain antenna pointed at the shop. Should work fine through your window glass as long as your windows aren't coated with any metalized film.
Very well done. Great video
Freenet is not a connection based network. It's more like a HUGE harddrive where people can insert and retrieve files anonymously while unpopular files get slowly deleted. You can't route connections through Freenet. At least not in the current protocol implementation.
Awesome thumbnail!
I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.
Excellent video, very informative.
Please make more!! (I know you will but just a little extra encouragement)
Thanks!
Yes, and his name is Logan.
Interesting content in this channel. I heard of Freenet some time ago, never tried it.
I'll keep watching your videos. Subscribed :)
nice cup holder ive always wondered what card it war
Worth watching for the tor-rible joke alone.
You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination.
It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)
Funny thing, me and my friends were talking about this just last night at our blanket fort slumber party haha.
Freenets security is two fold. Firtly, when you request a resource from a neighboring node there is no way for them or an easedropper to tell if you are requesting the src for yourself or merely forwarding along the request for someone else. Conneting to strangers does nothing to comprimise this part of the security. The other part only works in F2F mode, and that is that F2F traffic is indistinguishable from VPN traffic.
You have a very good point.
Thanks! im thinking of using the SE Green and Black!
Need more uploads :D LinusTechTips check, LinusCatTips check, Thechquickie check, razethew0rld check, ashens check. Dam I need more uploads from you guys :D
AAA+ - Standing strong for privacy but to old to be tech savvy so thanks for this video...
A-wake, A-ware, A-lert!
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. -Ben Franklin
Freenet sounds awesome!
I have a vps that I use putty to SSH into and configured Firefox to just connect through localhost. Works quite well.
one of the finest episodes,,good way to start the year :)
I need the router hack video as a way to educate myself and find ways to keep my horrible dodgy neighbours of my WLAN
How can I possibly say? I don't know how you use your computer xD In terms of games though at 1080p, it should be great for most source games, half-life/tf2 etc, minecraft will be fine, most console ports should do well too. But don't expect to be maxing out crysis or metro.
I would also suggest that you purchase an decent (synchronous flash) ssd for your OS if you can afford to. I did so, and it makes an enormous difference to overall responsiveness.
Really love your videos, keep them coming!
I'm confused, who is this for? I understand the privacy part but this sounds like gold for villains.
Excellent channel!! keep it up
What are you trying to say about UDP and TCP? Both are just ways of sending things from one IP to another. You can see the IP address that each came from no matter what protocol it is sent through, as it still goes through the internet, and each packet contains the source information and destination.
As far as the VPN, it really just depends on the provider. Some don't keep logs, some do. If they do, you can still be screwed.
I love the coffee cup coaster! LOL
Good stuff. METAL!
And we will salute you!!!
tor is one of the best programs ive examined. however nothing will truly keep u in the clear, were not the govt and we dont have their resources. things like timing ataks and window mapping, combined with the right surveillance at each end of the network can be enuf to find and link you with your activity inside. just keep it in mind when ur pushing/pulling data anywhere outside your own network.
Do one on Retroshare and Jitsi (but wait for version 2.0, which should be out soon). Also the Retroshare guys I think are preparing some big stuff for February, so might want to wait a bit until you do one on both.
Do you have any preference between the NZXT Phantom or Bitfenix Prodigy. I see both in the shot and was looking at both cases. Any suggestions?
Great Information Gents!!!!!
Hey guys, GREAT video, very informative, as I am one of those guys that care about privacy. More of that, please :)
Great video
I'm really glad that I subscribed too you. Love you guys. (:
Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?
wooohoo, been waiting for this one!
What about the new Pirates DL Browser Promoted by "The Pirates Bay" Which i think uses TOR I have read about?
You should mention Tails in this video! Best bootable TOR linux distro.
that is actually a good idea. Freenet reminds me of what kim.com was trying to do where megaupload is on many servers not just one or a couple. Actually freenet seems a lot like megaupload's new plan. hmmm...
sweet&solid
Perfect timing for this vid man!
torrible pun right there! 0:04
on freenet can you visit sites such as youtube and would logging in to this site provide any information towards what you were on ?
Some interesting infos guys. Your voice is a LOT louder than your buddy in the room. Get him a mic or use an expander on the audio track por favor. I like your windscreen.
Well... logan should say one thing... what is the usage of tor and what of freenet. Freenet has nothing to do with commercial surface internet. Tor if used correctly can improve your privacy on this "surface net browsing" (amongst others of course). I would appreciate if Logan linked a few videos with jacob appelbaum saying things about tor more deeply than here in tek.
As for Tor, Tor is not nearly as secure as Freenet, for one Directory Requests are (as of the last I checked) sent in the clear (albeit signed) and hence can identify you as a tor user to an easedropper. Otherwise using Tor to surf the open web definately isn't stupid proof, it is safer engaging in the exact same behavior either through a single-hop proxy/VPN or through your ISP. Connecting to a offshore VPN through Tor and paid for with BTC is pretty close to bullet proof.
its an old graphics card, which has taken the honorable and divine duty of cub holding
The villains are constantly sniffing the open internet for information. They hate TOR.
They are talking about the description on their website, not TH-cam.
Just connect to any open Wifi in your neighborhood (although this might be considered illegal in some countries). There really is no other way.
I did this years back for few weeks when I moved and my ISP took unreasonably long to connect me up, if you are going to do it be nice about it and don't torrent illegal stuff or otherwise abuse their connection.
What about using one of your friends as an endpoint on Tor? Best of both worlds?
Yellow cake isn't very tasty. Consumption may lead to: nausea, vomiting, hair loss, and cancer.
Just running an exit node does not give you the IP address of the people visiting web sites. The IP addresses are encrypted in layer.
good stuff guys, thanx! subscribed
Usually that's how I am too haha. Just keep watching and listening, eventually you'll learn enough to keep up with all of what they're saying.
My friend from Norway said America is fucked up because in his country the government isn't allowed to break your door down for booting a site offline for 10 minutes.
Is that your Graphic card underneath your Coffee mug ?
Is there a way to tap into certain circles of friends that are not yours on freenet? Or is it by invite only? Are their freenet chatrooms?
You have to worry, as right/wrong is a matter of perspective, the perspective of whoever is accusing you..
Plot Twist. Bob trusts everyone.
More videos like this please!!!
most of the weaknesses of for tor claimed in this video are not shortcomings of tor. in many ways tor is in fact superior than freenet in that it allows for websites to have more traditional websites behind a so called "hidden service". a hidden service is a special tor website or service only accessible inside the tor network, therefor there is no exit node required.
overall, a fairly half assed video that i am surprised they uploaded.
Logan, where is the link to the article on Brush Schnier?
The other issue that was brought up are data leaks that might deanonymize you. If you don't know what you're doing, stick to the TorBrowser. BitTorrent downloads utilize UDP (Tor is TCP only), so of course you will be deanonymized right away. If you want total privacy and are in the states, use a good VPN provider (e.g., AirVPN). Once connected, run Tor and now your traffic is private, encrypted, and anonymized. Search TH-cam for "nsa whistleblower tells all" to find out more on the subject!
Where's the link to Bruce Scheier's paper they said they would link to?
lmao i didnt realise this video was like 9 years old until reading the comments. an interesting comparison of tor an freenet tho
I think all the new videos you guys do, need to come with tin hats. But then again, you live in the States, uniform of any US citizen? ;)