Internet Security: TOR and Freenet

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ก.พ. 2025

ความคิดเห็น • 572

  • @KenSherman
    @KenSherman ปีที่แล้ว +7

    Can't believe this video is a decade old. Still looks as fresh as this year. And possibly is still relevant.

  • @ZXcross
    @ZXcross 9 ปีที่แล้ว +81

    In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.

    • @imjoeking_
      @imjoeking_ 9 ปีที่แล้ว +12

      ZXcross Finaly, someone gets it!

    • @kablooie5446
      @kablooie5446 9 ปีที่แล้ว +4

      +ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets.
      posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!

    • @Imissthefuhrer
      @Imissthefuhrer 8 ปีที่แล้ว +3

      ZXcross bingo! Can't stand the whole nanny state phenomenon, like in ca or my.

    • @escobarr8818
      @escobarr8818 5 ปีที่แล้ว +1

      That's just it. You are not as free as you think. A safe nation IS the ONLY free one.

    • @twl148
      @twl148 4 ปีที่แล้ว +1

      underated comment

  • @stinkyforeigner1
    @stinkyforeigner1 12 ปีที่แล้ว +1

    I've learned more about computers and networking from this channel than I have from my two year course in computing.

  • @nulbyte
    @nulbyte 11 ปีที่แล้ว +33

    An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address.
    This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear.
    The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.

    • @ravanadevadas3770
      @ravanadevadas3770 5 ปีที่แล้ว

      if the exit node knew the address of the destination doesnt that blow my cover?
      im just confused i know this comment is 5 years old but im still curious.

    • @williamstyz5509
      @williamstyz5509 5 ปีที่แล้ว

      I thought that the exit node only knew one of the IP addresses either your or the website you want to visit and the beginning node knows the other

  • @backlashstudios6088
    @backlashstudios6088 11 ปีที่แล้ว +2

    Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.

  • @KingFreshies
    @KingFreshies 11 ปีที่แล้ว +4

    They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday

    • @s0kulite
      @s0kulite 2 ปีที่แล้ว

      Well… private agencies collect data without the consent of users.

  • @anthcesana
    @anthcesana 12 ปีที่แล้ว

    I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.

  • @xXXinfonlightXXx
    @xXXinfonlightXXx 9 ปีที่แล้ว

    You guyz earned a customer with this one. Gonna buy some gear to help the show and rep the Syndicate!

  • @rdy4change
    @rdy4change 12 ปีที่แล้ว

    I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.

  • @Kiramitsuoka
    @Kiramitsuoka 11 ปีที่แล้ว +1

    Nice video but what about I2P? Would be great if you'd cover it too.

  • @lanceseidman
    @lanceseidman 11 ปีที่แล้ว

    Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.

  • @davewhool3091
    @davewhool3091 8 ปีที่แล้ว

    Great info on Tor and the freenet...tks.

  • @PyroChimp75
    @PyroChimp75 9 ปีที่แล้ว

    11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...

    • @noneofyourbusiness153
      @noneofyourbusiness153 9 ปีที่แล้ว +1

      +PyroChimp75
      This is actually incorrect.
      The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up.
      Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.

  • @devlin1991
    @devlin1991 12 ปีที่แล้ว

    Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.

  • @SporeTuberTV
    @SporeTuberTV 12 ปีที่แล้ว

    I totally agree Logan Please do a talk segment about Shodan.

  • @Masterjayrock
    @Masterjayrock 12 ปีที่แล้ว

    I learn something new every time I watch your videos.

  • @Deivs65
    @Deivs65 12 ปีที่แล้ว

    really great video. We need more people to see this. They should not touch our privacy. Mass have to show some resistance.

  • @MrPatriot1776
    @MrPatriot1776 12 ปีที่แล้ว

    you can use google like normal, tor uses the interface of firefox, it just routes your traffic through a bunch of proxies.

  • @rdy4change
    @rdy4change 12 ปีที่แล้ว

    It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.

  • @alanraya7730
    @alanraya7730 8 ปีที่แล้ว +2

    Great video, explained from all angles like you said.

  • @NedTheDread
    @NedTheDread 11 ปีที่แล้ว

    It's not a "fake" IP, it's the IP of the TOR exit node you leave the TOR network with, big difference... You can still be caught from traffic analysis if the exit node you come out of is logging all the traffic and the authorities get a hold of it (they could own the exit node). It is hard and unlikely you will get caught, but it is definitely possible.
    Traffic to and from .onion websites/services run completely inside the TOR network and are much more secure, you are right about that!

  • @Smokejumper92
    @Smokejumper92 12 ปีที่แล้ว

    I had to pause and just laugh off the horrible 'torrable' joke, well done done Logan

  • @frozenjava
    @frozenjava 12 ปีที่แล้ว

    Using tor and anonymous proxies has always been said to keep you anonymous on the internet. But if you don't know who is hosting the server that you are routing everything through you could be putting your self into the middle of a man in the middle attack. What I would recommend doing is buy a prepaid visa credit card (with cash) and use it to buy a server out in the cloud. This way there is no name tied to it. Then run a squid proxy or ssh tunnel safely, assuming the VPS host isnt big brother.

  • @DoctorThor21
    @DoctorThor21 12 ปีที่แล้ว

    "Those who trade liberty for safety deserve neither." - Ben Franklin
    They keep taking our liberty little by little but everybody is too comfortable with their lives to risk all they own to fight for liberty. By the time we realize what they've taken it will be too late.

  • @Atrazeal
    @Atrazeal 12 ปีที่แล้ว

    Yeah man, I've only subscribed to a 4 or 5 things on youtube since 2006, This is one of them.

  • @markdaman9
    @markdaman9 12 ปีที่แล้ว

    FINALLY!!!!! Iv been looking for you ever since you left tiger direct!!! now i found you!!!!!YEAHHH

  • @rdy4change
    @rdy4change 11 ปีที่แล้ว

    Very true that encryption might raise suspicion, e.g., using Tor or VPN. However, the more people that use encryption, the less of an outlier you become ("anonymity loves company"). Unless you are involved in cracking, exfiltrating state secrets, etc., you can probably ignore steganography for more practical alternatives.

  • @mikehouchens1223
    @mikehouchens1223 12 ปีที่แล้ว

    I have been waiting for this forever!

  • @folkobg
    @folkobg 12 ปีที่แล้ว

    Congrats on 60 000!!!!

  • @rdy4change
    @rdy4change 11 ปีที่แล้ว

    The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.

  • @terry5008
    @terry5008 5 ปีที่แล้ว

    If you want to use a coffee shop's internet connection for anonymity, there's no reason to actually go into the shop. Just stay outside in your car and use a directional high gain antenna pointed at the shop. Should work fine through your window glass as long as your windows aren't coated with any metalized film.

  • @jeffreylucas4494
    @jeffreylucas4494 11 ปีที่แล้ว

    Very well done. Great video

  • @1NSHAME
    @1NSHAME 11 ปีที่แล้ว

    Freenet is not a connection based network. It's more like a HUGE harddrive where people can insert and retrieve files anonymously while unpopular files get slowly deleted. You can't route connections through Freenet. At least not in the current protocol implementation.

  • @ShiroKage009
    @ShiroKage009 12 ปีที่แล้ว

    Awesome thumbnail!
    I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.

  • @x0nor
    @x0nor 12 ปีที่แล้ว

    Excellent video, very informative.

  • @StealThisKarl
    @StealThisKarl 12 ปีที่แล้ว

    Please make more!! (I know you will but just a little extra encouragement)
    Thanks!

  • @Icureditwithmybrain
    @Icureditwithmybrain 12 ปีที่แล้ว

    Yes, and his name is Logan.

  • @JustLookA7
    @JustLookA7 8 ปีที่แล้ว

    Interesting content in this channel. I heard of Freenet some time ago, never tried it.
    I'll keep watching your videos. Subscribed :)

  • @TheSaadtut
    @TheSaadtut 12 ปีที่แล้ว

    nice cup holder ive always wondered what card it war

  • @andrewe3165
    @andrewe3165 11 ปีที่แล้ว

    Worth watching for the tor-rible joke alone.

  • @lokizfenrir
    @lokizfenrir 11 ปีที่แล้ว

    You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination.
    It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)

  • @railpressureflip
    @railpressureflip 12 ปีที่แล้ว

    Funny thing, me and my friends were talking about this just last night at our blanket fort slumber party haha.

  • @isaackarjala7916
    @isaackarjala7916 12 ปีที่แล้ว

    Freenets security is two fold. Firtly, when you request a resource from a neighboring node there is no way for them or an easedropper to tell if you are requesting the src for yourself or merely forwarding along the request for someone else. Conneting to strangers does nothing to comprimise this part of the security. The other part only works in F2F mode, and that is that F2F traffic is indistinguishable from VPN traffic.

  • @drawingkid1313
    @drawingkid1313 12 ปีที่แล้ว

    You have a very good point.

  • @TekWolfe
    @TekWolfe 11 ปีที่แล้ว

    Thanks! im thinking of using the SE Green and Black!

  • @rnci
    @rnci 12 ปีที่แล้ว

    Need more uploads :D LinusTechTips check, LinusCatTips check, Thechquickie check, razethew0rld check, ashens check. Dam I need more uploads from you guys :D

  • @ronaldebberts4757
    @ronaldebberts4757 11 ปีที่แล้ว

    AAA+ - Standing strong for privacy but to old to be tech savvy so thanks for this video...
    A-wake, A-ware, A-lert!

  • @Iron8Jack9
    @Iron8Jack9 12 ปีที่แล้ว

    They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. -Ben Franklin

  • @UserMum7512
    @UserMum7512 12 ปีที่แล้ว

    Freenet sounds awesome!

  • @skadrumcovers
    @skadrumcovers 12 ปีที่แล้ว

    I have a vps that I use putty to SSH into and configured Firefox to just connect through localhost. Works quite well.

  • @satyanjoy
    @satyanjoy 12 ปีที่แล้ว

    one of the finest episodes,,good way to start the year :)

  • @coolciaran69
    @coolciaran69 12 ปีที่แล้ว

    I need the router hack video as a way to educate myself and find ways to keep my horrible dodgy neighbours of my WLAN

  • @101m4n
    @101m4n 12 ปีที่แล้ว

    How can I possibly say? I don't know how you use your computer xD In terms of games though at 1080p, it should be great for most source games, half-life/tf2 etc, minecraft will be fine, most console ports should do well too. But don't expect to be maxing out crysis or metro.
    I would also suggest that you purchase an decent (synchronous flash) ssd for your OS if you can afford to. I did so, and it makes an enormous difference to overall responsiveness.

  • @miguelcordeiro6063
    @miguelcordeiro6063 12 ปีที่แล้ว

    Really love your videos, keep them coming!

  • @aardvocadoful
    @aardvocadoful 12 ปีที่แล้ว

    I'm confused, who is this for? I understand the privacy part but this sounds like gold for villains.

  • @dieantwoordisawesome
    @dieantwoordisawesome 12 ปีที่แล้ว

    Excellent channel!! keep it up

  • @banksy12195
    @banksy12195 11 ปีที่แล้ว

    What are you trying to say about UDP and TCP? Both are just ways of sending things from one IP to another. You can see the IP address that each came from no matter what protocol it is sent through, as it still goes through the internet, and each packet contains the source information and destination.
    As far as the VPN, it really just depends on the provider. Some don't keep logs, some do. If they do, you can still be screwed.

  • @MikeyDee
    @MikeyDee 12 ปีที่แล้ว

    I love the coffee cup coaster! LOL

  • @burzumite
    @burzumite 12 ปีที่แล้ว

    Good stuff. METAL!

  • @wowcrille95
    @wowcrille95 12 ปีที่แล้ว

    And we will salute you!!!

  • @TerraFiying
    @TerraFiying 11 ปีที่แล้ว

    tor is one of the best programs ive examined. however nothing will truly keep u in the clear, were not the govt and we dont have their resources. things like timing ataks and window mapping, combined with the right surveillance at each end of the network can be enuf to find and link you with your activity inside. just keep it in mind when ur pushing/pulling data anywhere outside your own network.

  • @KingKhain
    @KingKhain 12 ปีที่แล้ว

    Do one on Retroshare and Jitsi (but wait for version 2.0, which should be out soon). Also the Retroshare guys I think are preparing some big stuff for February, so might want to wait a bit until you do one on both.

  • @TekWolfe
    @TekWolfe 11 ปีที่แล้ว

    Do you have any preference between the NZXT Phantom or Bitfenix Prodigy. I see both in the shot and was looking at both cases. Any suggestions?

  • @courtjester7407
    @courtjester7407 8 ปีที่แล้ว

    Great Information Gents!!!!!

  • @peterskovgaard8689
    @peterskovgaard8689 10 ปีที่แล้ว

    Hey guys, GREAT video, very informative, as I am one of those guys that care about privacy. More of that, please :)

  • @HardLuckStories
    @HardLuckStories 12 ปีที่แล้ว

    Great video

  • @frey0r
    @frey0r 12 ปีที่แล้ว

    I'm really glad that I subscribed too you. Love you guys. (:

  • @NER124
    @NER124 12 ปีที่แล้ว

    Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?

  • @HENN3H
    @HENN3H 12 ปีที่แล้ว

    wooohoo, been waiting for this one!

  • @qazmko22
    @qazmko22 11 ปีที่แล้ว

    What about the new Pirates DL Browser Promoted by "The Pirates Bay" Which i think uses TOR I have read about?

  • @AdmitthatijustdiditX
    @AdmitthatijustdiditX 12 ปีที่แล้ว

    You should mention Tails in this video! Best bootable TOR linux distro.

  • @ackables
    @ackables 12 ปีที่แล้ว

    that is actually a good idea. Freenet reminds me of what kim.com was trying to do where megaupload is on many servers not just one or a couple. Actually freenet seems a lot like megaupload's new plan. hmmm...

  • @ShadoFXPerino
    @ShadoFXPerino 12 ปีที่แล้ว

    sweet&solid

  • @12snuffen
    @12snuffen 12 ปีที่แล้ว

    Perfect timing for this vid man!

  • @111111222223
    @111111222223 12 ปีที่แล้ว

    torrible pun right there! 0:04

  • @tmoosy
    @tmoosy 12 ปีที่แล้ว

    on freenet can you visit sites such as youtube and would logging in to this site provide any information towards what you were on ?

  • @thesimulacre
    @thesimulacre 11 ปีที่แล้ว

    Some interesting infos guys. Your voice is a LOT louder than your buddy in the room. Get him a mic or use an expander on the audio track por favor. I like your windscreen.

  • @StringOgre
    @StringOgre 12 ปีที่แล้ว

    Well... logan should say one thing... what is the usage of tor and what of freenet. Freenet has nothing to do with commercial surface internet. Tor if used correctly can improve your privacy on this "surface net browsing" (amongst others of course). I would appreciate if Logan linked a few videos with jacob appelbaum saying things about tor more deeply than here in tek.

  • @isaackarjala7916
    @isaackarjala7916 12 ปีที่แล้ว

    As for Tor, Tor is not nearly as secure as Freenet, for one Directory Requests are (as of the last I checked) sent in the clear (albeit signed) and hence can identify you as a tor user to an easedropper. Otherwise using Tor to surf the open web definately isn't stupid proof, it is safer engaging in the exact same behavior either through a single-hop proxy/VPN or through your ISP. Connecting to a offshore VPN through Tor and paid for with BTC is pretty close to bullet proof.

  • @MrDJHayJ
    @MrDJHayJ 11 ปีที่แล้ว

    its an old graphics card, which has taken the honorable and divine duty of cub holding

  • @MikaelKKarlsson
    @MikaelKKarlsson 12 ปีที่แล้ว

    The villains are constantly sniffing the open internet for information. They hate TOR.

  • @DrewbadourP
    @DrewbadourP 12 ปีที่แล้ว

    They are talking about the description on their website, not TH-cam.

  • @TheMrMorphling
    @TheMrMorphling 12 ปีที่แล้ว

    Just connect to any open Wifi in your neighborhood (although this might be considered illegal in some countries). There really is no other way.
    I did this years back for few weeks when I moved and my ISP took unreasonably long to connect me up, if you are going to do it be nice about it and don't torrent illegal stuff or otherwise abuse their connection.

  • @essunset6
    @essunset6 11 ปีที่แล้ว

    What about using one of your friends as an endpoint on Tor? Best of both worlds?

  • @Unsensitive
    @Unsensitive 12 ปีที่แล้ว

    Yellow cake isn't very tasty. Consumption may lead to: nausea, vomiting, hair loss, and cancer.

  • @JacobP81
    @JacobP81 2 ปีที่แล้ว

    Just running an exit node does not give you the IP address of the people visiting web sites. The IP addresses are encrypted in layer.

  • @1775revolution2012
    @1775revolution2012 11 ปีที่แล้ว

    good stuff guys, thanx! subscribed

  • @mylilmoviesofdoom
    @mylilmoviesofdoom 12 ปีที่แล้ว

    Usually that's how I am too haha. Just keep watching and listening, eventually you'll learn enough to keep up with all of what they're saying.

  • @decilgang
    @decilgang 11 ปีที่แล้ว

    My friend from Norway said America is fucked up because in his country the government isn't allowed to break your door down for booting a site offline for 10 minutes.

  • @ItsYashu
    @ItsYashu 12 ปีที่แล้ว

    Is that your Graphic card underneath your Coffee mug ?

  • @18dnu
    @18dnu 9 ปีที่แล้ว

    Is there a way to tap into certain circles of friends that are not yours on freenet? Or is it by invite only? Are their freenet chatrooms?

  • @kpriess
    @kpriess 12 ปีที่แล้ว

    You have to worry, as right/wrong is a matter of perspective, the perspective of whoever is accusing you..

  • @zonedabone
    @zonedabone 11 ปีที่แล้ว

    Plot Twist. Bob trusts everyone.

  • @SimX9000
    @SimX9000 12 ปีที่แล้ว

    More videos like this please!!!

  • @JacobManson
    @JacobManson 12 ปีที่แล้ว

    most of the weaknesses of for tor claimed in this video are not shortcomings of tor. in many ways tor is in fact superior than freenet in that it allows for websites to have more traditional websites behind a so called "hidden service". a hidden service is a special tor website or service only accessible inside the tor network, therefor there is no exit node required.
    overall, a fairly half assed video that i am surprised they uploaded.

  • @boreman2579
    @boreman2579 12 ปีที่แล้ว

    Logan, where is the link to the article on Brush Schnier?

  • @rdy4change
    @rdy4change 12 ปีที่แล้ว

    The other issue that was brought up are data leaks that might deanonymize you. If you don't know what you're doing, stick to the TorBrowser. BitTorrent downloads utilize UDP (Tor is TCP only), so of course you will be deanonymized right away. If you want total privacy and are in the states, use a good VPN provider (e.g., AirVPN). Once connected, run Tor and now your traffic is private, encrypted, and anonymized. Search TH-cam for "nsa whistleblower tells all" to find out more on the subject!

  • @L1b3rta
    @L1b3rta 12 ปีที่แล้ว

    Where's the link to Bruce Scheier's paper they said they would link to?

  • @HershO.
    @HershO. 2 ปีที่แล้ว

    lmao i didnt realise this video was like 9 years old until reading the comments. an interesting comparison of tor an freenet tho

  • @bluenapalm123
    @bluenapalm123 12 ปีที่แล้ว

    I think all the new videos you guys do, need to come with tin hats. But then again, you live in the States, uniform of any US citizen? ;)