In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.
+ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets. posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!
An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address. This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear. The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.
if the exit node knew the address of the destination doesnt that blow my cover? im just confused i know this comment is 5 years old but im still curious.
They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday
I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.
Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.
Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.
It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.
The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.
I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.
You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination. It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)
Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.
11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...
+PyroChimp75 This is actually incorrect. The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up. Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.
Very true that encryption might raise suspicion, e.g., using Tor or VPN. However, the more people that use encryption, the less of an outlier you become ("anonymity loves company"). Unless you are involved in cracking, exfiltrating state secrets, etc., you can probably ignore steganography for more practical alternatives.
Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?
What are you trying to say about UDP and TCP? Both are just ways of sending things from one IP to another. You can see the IP address that each came from no matter what protocol it is sent through, as it still goes through the internet, and each packet contains the source information and destination. As far as the VPN, it really just depends on the provider. Some don't keep logs, some do. If they do, you can still be screwed.
Using tor and anonymous proxies has always been said to keep you anonymous on the internet. But if you don't know who is hosting the server that you are routing everything through you could be putting your self into the middle of a man in the middle attack. What I would recommend doing is buy a prepaid visa credit card (with cash) and use it to buy a server out in the cloud. This way there is no name tied to it. Then run a squid proxy or ssh tunnel safely, assuming the VPS host isnt big brother.
As for Tor, Tor is not nearly as secure as Freenet, for one Directory Requests are (as of the last I checked) sent in the clear (albeit signed) and hence can identify you as a tor user to an easedropper. Otherwise using Tor to surf the open web definately isn't stupid proof, it is safer engaging in the exact same behavior either through a single-hop proxy/VPN or through your ISP. Connecting to a offshore VPN through Tor and paid for with BTC is pretty close to bullet proof.
Awesome thumbnail! I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.
the only issue i would have is weight the phantom(11-12 kg) is 30% heavier +- than the prodigy(7-8 kg) in bare weight. Guess it depends on how mobile you want to be... i've had both, i preferred the phantom easier component access and just like the design. currently use Antec mini P180 ...
"Those who trade liberty for safety deserve neither." - Ben Franklin They keep taking our liberty little by little but everybody is too comfortable with their lives to risk all they own to fight for liberty. By the time we realize what they've taken it will be too late.
Freenets security is two fold. Firtly, when you request a resource from a neighboring node there is no way for them or an easedropper to tell if you are requesting the src for yourself or merely forwarding along the request for someone else. Conneting to strangers does nothing to comprimise this part of the security. The other part only works in F2F mode, and that is that F2F traffic is indistinguishable from VPN traffic.
Freenet is not a connection based network. It's more like a HUGE harddrive where people can insert and retrieve files anonymously while unpopular files get slowly deleted. You can't route connections through Freenet. At least not in the current protocol implementation.
It's not a "fake" IP, it's the IP of the TOR exit node you leave the TOR network with, big difference... You can still be caught from traffic analysis if the exit node you come out of is logging all the traffic and the authorities get a hold of it (they could own the exit node). It is hard and unlikely you will get caught, but it is definitely possible. Traffic to and from .onion websites/services run completely inside the TOR network and are much more secure, you are right about that!
Just connect to any open Wifi in your neighborhood (although this might be considered illegal in some countries). There really is no other way. I did this years back for few weeks when I moved and my ISP took unreasonably long to connect me up, if you are going to do it be nice about it and don't torrent illegal stuff or otherwise abuse their connection.
Hello thanks for the informative vido, it is nice to have a look in too how internet works. I am an freshman in college getting my computer engineer degree, i am active on your forms any suggestions on well anything relater to career wise thanks for your time.
Do one on Retroshare and Jitsi (but wait for version 2.0, which should be out soon). Also the Retroshare guys I think are preparing some big stuff for February, so might want to wait a bit until you do one on both.
tor is one of the best programs ive examined. however nothing will truly keep u in the clear, were not the govt and we dont have their resources. things like timing ataks and window mapping, combined with the right surveillance at each end of the network can be enuf to find and link you with your activity inside. just keep it in mind when ur pushing/pulling data anywhere outside your own network.
most of the weaknesses of for tor claimed in this video are not shortcomings of tor. in many ways tor is in fact superior than freenet in that it allows for websites to have more traditional websites behind a so called "hidden service". a hidden service is a special tor website or service only accessible inside the tor network, therefor there is no exit node required. overall, a fairly half assed video that i am surprised they uploaded.
The other issue that was brought up are data leaks that might deanonymize you. If you don't know what you're doing, stick to the TorBrowser. BitTorrent downloads utilize UDP (Tor is TCP only), so of course you will be deanonymized right away. If you want total privacy and are in the states, use a good VPN provider (e.g., AirVPN). Once connected, run Tor and now your traffic is private, encrypted, and anonymized. Search TH-cam for "nsa whistleblower tells all" to find out more on the subject!
What about PhsiPhon? I actually only use it at school to get past their block on Tumblr but I'm also curious as to how it works differently than TOR. Somebody told me that it actually creates a vpn and somehow sends stuff to itself before sending it away although I'm not exactly sure how it really works.
I think it could be argued that since the monitoring that goes on is non-intrusive (ie. you wouldn't know it's happening if no one told you) it's not as big a deal as some people make it out to be. I personally don't really give a shit if some server farm in Langley filters my web traffic and combs it for certain keywords. It's not as if it's an actual person who goes through your web traffic and judges you accordingly (unless it is... but I'd assume a server would be cheaper).
yes is different bacause vpn change your entire connection not only in the browser also in p2p connections and vpn is not a program is a remote server so is more secure than tor because tor need a browser a especific 1 firefox in vpn you can use any browser and still secure
How can I possibly say? I don't know how you use your computer xD In terms of games though at 1080p, it should be great for most source games, half-life/tf2 etc, minecraft will be fine, most console ports should do well too. But don't expect to be maxing out crysis or metro. I would also suggest that you purchase an decent (synchronous flash) ssd for your OS if you can afford to. I did so, and it makes an enormous difference to overall responsiveness.
Some interesting infos guys. Your voice is a LOT louder than your buddy in the room. Get him a mic or use an expander on the audio track por favor. I like your windscreen.
Need more uploads :D LinusTechTips check, LinusCatTips check, Thechquickie check, razethew0rld check, ashens check. Dam I need more uploads from you guys :D
If my Freenet circle of friends included yellow cake chefs I wouldn't need to go online to search for more information on the subject. The onion exit nodes read our envelopes to include who we are and the final destination of our request, is that information just IP to IP? I guess from there a 3 letter agency likely matches that info to the host server log files to figure out everything that was presumed private?
ok, can you just clear something up for me then? are the servers all the other places my data goes through? (im a noob when it comes to all this stuff) but no cookies or history are recorded on my PC then
If you want to use a coffee shop's internet connection for anonymity, there's no reason to actually go into the shop. Just stay outside in your car and use a directional high gain antenna pointed at the shop. Should work fine through your window glass as long as your windows aren't coated with any metalized film.
Well... logan should say one thing... what is the usage of tor and what of freenet. Freenet has nothing to do with commercial surface internet. Tor if used correctly can improve your privacy on this "surface net browsing" (amongst others of course). I would appreciate if Logan linked a few videos with jacob appelbaum saying things about tor more deeply than here in tek.
In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.
ZXcross Finaly, someone gets it!
+ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets.
posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!
ZXcross bingo! Can't stand the whole nanny state phenomenon, like in ca or my.
That's just it. You are not as free as you think. A safe nation IS the ONLY free one.
underated comment
Can't believe this video is a decade old. Still looks as fresh as this year. And possibly is still relevant.
An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address.
This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear.
The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.
if the exit node knew the address of the destination doesnt that blow my cover?
im just confused i know this comment is 5 years old but im still curious.
I thought that the exit node only knew one of the IP addresses either your or the website you want to visit and the beginning node knows the other
I've learned more about computers and networking from this channel than I have from my two year course in computing.
They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday
Well… private agencies collect data without the consent of users.
I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.
Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.
Nice video but what about I2P? Would be great if you'd cover it too.
Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.
You guyz earned a customer with this one. Gonna buy some gear to help the show and rep the Syndicate!
It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.
The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.
Great video, explained from all angles like you said.
I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.
You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination.
It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)
Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.
you can use google like normal, tor uses the interface of firefox, it just routes your traffic through a bunch of proxies.
11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...
+PyroChimp75
This is actually incorrect.
The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up.
Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.
I learn something new every time I watch your videos.
I totally agree Logan Please do a talk segment about Shodan.
Thanks! im thinking of using the SE Green and Black!
Do you have any preference between the NZXT Phantom or Bitfenix Prodigy. I see both in the shot and was looking at both cases. Any suggestions?
Very true that encryption might raise suspicion, e.g., using Tor or VPN. However, the more people that use encryption, the less of an outlier you become ("anonymity loves company"). Unless you are involved in cracking, exfiltrating state secrets, etc., you can probably ignore steganography for more practical alternatives.
Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?
What are you trying to say about UDP and TCP? Both are just ways of sending things from one IP to another. You can see the IP address that each came from no matter what protocol it is sent through, as it still goes through the internet, and each packet contains the source information and destination.
As far as the VPN, it really just depends on the provider. Some don't keep logs, some do. If they do, you can still be screwed.
Using tor and anonymous proxies has always been said to keep you anonymous on the internet. But if you don't know who is hosting the server that you are routing everything through you could be putting your self into the middle of a man in the middle attack. What I would recommend doing is buy a prepaid visa credit card (with cash) and use it to buy a server out in the cloud. This way there is no name tied to it. Then run a squid proxy or ssh tunnel safely, assuming the VPS host isnt big brother.
Great info on Tor and the freenet...tks.
so what would you recommend? i think BT is the way to go for learning.
really great video. We need more people to see this. They should not touch our privacy. Mass have to show some resistance.
What about the new Pirates DL Browser Promoted by "The Pirates Bay" Which i think uses TOR I have read about?
I have a vps that I use putty to SSH into and configured Firefox to just connect through localhost. Works quite well.
nice cup holder ive always wondered what card it war
As for Tor, Tor is not nearly as secure as Freenet, for one Directory Requests are (as of the last I checked) sent in the clear (albeit signed) and hence can identify you as a tor user to an easedropper. Otherwise using Tor to surf the open web definately isn't stupid proof, it is safer engaging in the exact same behavior either through a single-hop proxy/VPN or through your ISP. Connecting to a offshore VPN through Tor and paid for with BTC is pretty close to bullet proof.
what about i2p?
i heard some things about that, is that any good?
Awesome thumbnail!
I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.
the only issue i would have is weight the phantom(11-12 kg) is 30% heavier +- than the prodigy(7-8 kg) in bare weight. Guess it depends on how mobile you want to be... i've had both, i preferred the phantom easier component access and just like the design. currently use Antec mini P180 ...
"Those who trade liberty for safety deserve neither." - Ben Franklin
They keep taking our liberty little by little but everybody is too comfortable with their lives to risk all they own to fight for liberty. By the time we realize what they've taken it will be too late.
Freenets security is two fold. Firtly, when you request a resource from a neighboring node there is no way for them or an easedropper to tell if you are requesting the src for yourself or merely forwarding along the request for someone else. Conneting to strangers does nothing to comprimise this part of the security. The other part only works in F2F mode, and that is that F2F traffic is indistinguishable from VPN traffic.
on freenet can you visit sites such as youtube and would logging in to this site provide any information towards what you were on ?
Freenet is not a connection based network. It's more like a HUGE harddrive where people can insert and retrieve files anonymously while unpopular files get slowly deleted. You can't route connections through Freenet. At least not in the current protocol implementation.
FINALLY!!!!! Iv been looking for you ever since you left tiger direct!!! now i found you!!!!!YEAHHH
Logan what about Peerblock? good, bad, does it do anything?
It's not a "fake" IP, it's the IP of the TOR exit node you leave the TOR network with, big difference... You can still be caught from traffic analysis if the exit node you come out of is logging all the traffic and the authorities get a hold of it (they could own the exit node). It is hard and unlikely you will get caught, but it is definitely possible.
Traffic to and from .onion websites/services run completely inside the TOR network and are much more secure, you are right about that!
They are talking about the description on their website, not TH-cam.
Where's the link to Bruce Scheier's paper they said they would link to?
7:29 - 7:32 what does he mean by "once you get freenet you can't go back to regular internet like on Tor" ??
What about using one of your friends as an endpoint on Tor? Best of both worlds?
Just connect to any open Wifi in your neighborhood (although this might be considered illegal in some countries). There really is no other way.
I did this years back for few weeks when I moved and my ISP took unreasonably long to connect me up, if you are going to do it be nice about it and don't torrent illegal stuff or otherwise abuse their connection.
better password, better encryption. what algorithm do you use?
Just running an exit node does not give you the IP address of the people visiting web sites. The IP addresses are encrypted in layer.
Logan, where is the link to the article on Brush Schnier?
Yeah man, I've only subscribed to a 4 or 5 things on youtube since 2006, This is one of them.
depends on what site you visited.
I have been waiting for this forever!
one of the finest episodes,,good way to start the year :)
Is there a way to tap into certain circles of friends that are not yours on freenet? Or is it by invite only? Are their freenet chatrooms?
Hello thanks for the informative vido, it is nice to have a look in too how internet works. I am an freshman in college getting my computer engineer degree, i am active on your forms any suggestions on well anything relater to career wise thanks for your time.
Do one on Retroshare and Jitsi (but wait for version 2.0, which should be out soon). Also the Retroshare guys I think are preparing some big stuff for February, so might want to wait a bit until you do one on both.
tor is one of the best programs ive examined. however nothing will truly keep u in the clear, were not the govt and we dont have their resources. things like timing ataks and window mapping, combined with the right surveillance at each end of the network can be enuf to find and link you with your activity inside. just keep it in mind when ur pushing/pulling data anywhere outside your own network.
most of the weaknesses of for tor claimed in this video are not shortcomings of tor. in many ways tor is in fact superior than freenet in that it allows for websites to have more traditional websites behind a so called "hidden service". a hidden service is a special tor website or service only accessible inside the tor network, therefor there is no exit node required.
overall, a fairly half assed video that i am surprised they uploaded.
Did this guy used to do the tiger blog or something??? whats his name?
The other issue that was brought up are data leaks that might deanonymize you. If you don't know what you're doing, stick to the TorBrowser. BitTorrent downloads utilize UDP (Tor is TCP only), so of course you will be deanonymized right away. If you want total privacy and are in the states, use a good VPN provider (e.g., AirVPN). Once connected, run Tor and now your traffic is private, encrypted, and anonymized. Search TH-cam for "nsa whistleblower tells all" to find out more on the subject!
what do you use tor for? the silk road?
What about PhsiPhon? I actually only use it at school to get past their block on Tumblr but I'm also curious as to how it works differently than TOR. Somebody told me that it actually creates a vpn and somehow sends stuff to itself before sending it away although I'm not exactly sure how it really works.
Interesting content in this channel. I heard of Freenet some time ago, never tried it.
I'll keep watching your videos. Subscribed :)
Please make more!! (I know you will but just a little extra encouragement)
Thanks!
Interesting vid but what legitimate use for freenet is there though?? just privacy??
ok, if you get tor, can you then just use google as regular or do you have to go through tor?
Just wondering, what graphics card is it that you use as your coaster?
Congrats on 60 000!!!!
I had to pause and just laugh off the horrible 'torrable' joke, well done done Logan
I think it could be argued that since the monitoring that goes on is non-intrusive (ie. you wouldn't know it's happening if no one told you) it's not as big a deal as some people make it out to be. I personally don't really give a shit if some server farm in Langley filters my web traffic and combs it for certain keywords. It's not as if it's an actual person who goes through your web traffic and judges you accordingly (unless it is... but I'd assume a server would be cheaper).
i cant get onto the tor network, it says no open ports, but all ports are open
Pretty sure Tor was developed by the US Navy / Military or something in the first place? (From my memory of reading about it).
yes is different bacause vpn change your entire connection not only in the browser also in p2p connections and vpn is not a program is a remote server so is more secure than tor because tor need a browser a especific 1 firefox in vpn you can use any browser and still secure
So there's a series of tubes?
How can I possibly say? I don't know how you use your computer xD In terms of games though at 1080p, it should be great for most source games, half-life/tf2 etc, minecraft will be fine, most console ports should do well too. But don't expect to be maxing out crysis or metro.
I would also suggest that you purchase an decent (synchronous flash) ssd for your OS if you can afford to. I did so, and it makes an enormous difference to overall responsiveness.
AAA+ - Standing strong for privacy but to old to be tech savvy so thanks for this video...
A-wake, A-ware, A-lert!
Some interesting infos guys. Your voice is a LOT louder than your buddy in the room. Get him a mic or use an expander on the audio track por favor. I like your windscreen.
fancy recommending an alternate to itunes?
TOR can get to the Silk Road, right?
is it possible to use network games over freenet?
Need more uploads :D LinusTechTips check, LinusCatTips check, Thechquickie check, razethew0rld check, ashens check. Dam I need more uploads from you guys :D
Are there any video hosting youtube replacements on freenet
can you run freenet on your phone to have like secure dropbox or something
So the whole "trusting tom and tom trusts bob" is this the same with LogMeIn Hamachi?
i think so
isn't tor safe if you use onion sites? they're encrypted end to end
Considering his question I'm not so sure :)
What about i2p?
You should mention Tails in this video! Best bootable TOR linux distro.
If my Freenet circle of friends included yellow cake chefs I wouldn't need to go online to search for more information on the subject. The onion exit nodes read our envelopes to include who we are and the final destination of our request, is that information just IP to IP? I guess from there a 3 letter agency likely matches that info to the host server log files to figure out everything that was presumed private?
ok, can you just clear something up for me then? are the servers all the other places my data goes through? (im a noob when it comes to all this stuff)
but no cookies or history are recorded on my PC then
I'm confused, who is this for? I understand the privacy part but this sounds like gold for villains.
I'm really glad that I subscribed too you. Love you guys. (:
If you want to use a coffee shop's internet connection for anonymity, there's no reason to actually go into the shop. Just stay outside in your car and use a directional high gain antenna pointed at the shop. Should work fine through your window glass as long as your windows aren't coated with any metalized film.
Do you know what a wind talker is?
What on here do you need in hd?
Well... logan should say one thing... what is the usage of tor and what of freenet. Freenet has nothing to do with commercial surface internet. Tor if used correctly can improve your privacy on this "surface net browsing" (amongst others of course). I would appreciate if Logan linked a few videos with jacob appelbaum saying things about tor more deeply than here in tek.
Really love your videos, keep them coming!
Is there any purpose/harm in using VPN while using TOR????