Fun fact: The Internet wasn't designed for privacy. It was designed for trusted computer to trusted computer connections. That's why it's so hard to try to be anonymous. And even with Tor, you can be tracked. It only takes one tiny piece of malware to report back outside of Tor and whoever wants to has your public IP.
You have a clear lack of knowledge in the fiels of lineair algebra and ICT. One doesn't just decode a fkn matrix at random with malware thats the whole point of encryption. (at least not without a quantum computer) edit: before I get blasted, there ofc are multiple techniques usually layered. often there will be one of these involved.
So why don't i have a TOR Exit Node running ? maybe because i'm lazy as Hell. OK most Traffic will be HTTPS but i stil can see where it goes. A hidden Service may also be nice.
Do _not_ torrent over Tor. A peer-to-peer connection, by definition, has to know your IP address. Torrents will reveal your real IP address to the trackers and peers. That’s why torrenting over Tor defeats the purpose.
TOR was developed by the US government. You forgot to mention that. Specifically, it was put together by the US military, which explains why it was a government program that didn't completely suck.
no it wasnt. it was started by the navy and then funded. but iirc not they dont accet money from any gobernment or big corporation that could compromise the project's economic independence. You should hear applebaun talking. he makes it very clear they are there to give people tools to resist the nsa and such.
Laharl Krichevskoy I never said that it is currently a project that the government is involved in, merely that it was developed by... I believe it was naval intelligence. It's since been handed over to a non-profit organization for updates and continued development.
+CocoaNutCakery If I remember right, they mentioned this in the Dark/Deep Web video, and as it isn't majorly important info, they probably decided that once is enough
One very important note, even though this video is dirt old dy now, is the fact that the US government are the main founders of the Tor network. It's mainly a network for spies and other intel gathering operations and it has to, in nature, be totally anonymous or else would ruin the cover hence why the Tor project exists. In order for the government to be completely invisible they have to melt in with the rest of the people using Tor. I feel like this is an important thing to note since I've seen a lot of people being afraid of using Tor because they think it's a bait, but as I said, in order to keep their spies hidden they must blend them in with the rest of the anonymous userbase because (even how weird this sounds) if a criminal on the Tor network isn't hidden, then there's also no guarantee that the person undercover isn't hidden either.
Thats like making a drink and saying" Because I want my drink to make people fly, it now makes them fly." Just because the Government may want and had designed tor to be as anonymous as possible does NOT meant bad actors cant exploit its weaknesses. There has never and most likely will never be anything that is unexploitable. The only way you can keep some form of information secure or private is by only storing it in one place. Your head. And even then your just a biological machine that one day very soon with the likes of technologies like neural links your mind will be able to be read just like a harddrive
You missed a bit in the video, you can be even more secure if you use a tor bridge. Tor bridges can be used as exit nodes but the operator of the node can't see your information at all. Plus tor bridges are not publicly listed unlike tor servers.
Some bridges are public, but you can request a private one. They're not necessarily more secure, the reason they exist is to get around networks that block normal entry nodes
One thing I'm curious about is how a computer knows what to do. Like, what happens if you press a key on the keyboard. Like: Is a value sent from the keyboard sent to a certain port in the processor (Let's say "Ctrl + C"). And then how would the processor analyze this value and determine that value is an order and not a letter. And then how would it move over to look for marked text in an open window and read the value (text and pictures that make up the marked content written in binary) there and symoltaniously write this value to it's own section in the memory (the clipboard). This was just an example with the "Copy to clipboard" command, but I'd like to know how the processor determines how to do one task over another. Move, copy, add, etc. data. How it knows what values to add together, and not everything stored in the memory.
Linus gives some examples of who might want to use TOR and there are some noble reasons why an individual would want to but facts are facts - according to a recent report 80% of internet traffic on the Dark web is child abuse material so if anyone feels cynical about why someone is using TOR they have every right to IMO.
Freddie1980 I was wondering about Tor in relation to using Torrent sites for the content I can't get in my country as our government is about to block access to them. Tor feels to dodgy for my liking 😨
In Australia, I've known someone who had their computer held by police specifically because Tor was installed on it. The assumption being that it is only used for hiding criminal activity.
Are you sure the computer want running an exit node? Exit nodes are where the internet requests exit and if your IP address has been seen accessing illegal drug websites while you’re just running an exit node then their computer would be seized by the government since they probably didn’t know that the exit node on tor works like that.
What you could do is get a flash drive with Linux, specifically the tails version. Have it as a live boot drive on your PC. On Linux tails get a VPN, a VM use together and then in the VM you can use tor.
+Theodoros Nicolaou If you want a secure way to browse the web, ask nigerians. They provide the best security, as long as you pay them a small fee, and prove that you are real by giving them ssomething like your credit card info. Safe browsing! ^^
The moment you download tor you've already been caught, because lets use common scene here, if the "authorities" go into your network traffic, provided by law from your ISP, and isolate that one file you downloaded from the tor website your name is already in some list. Best option is to get a flash drive from someone else with the installation file in it.
a. Honestly, I'd trust a TOR exit node more than I'd trust a consumer-available VPN service. b. Using both TOR and VPN is pointless, as the VPN can still see everything anyway. I don't have to worry about that though, 'cause I set up my own VPN! Plus, I can run it through TOR as well. Gotta feel sorry for those loosers who actually pay for a VPN service like Tunnel Bear.
Apparently the videos are getting something like : 1. This comes from this -- which you can learn from this video. 2. Because of this -- which you can learn from this video. 3. That leads to this -- which you can learn from this video. 4. And results into that -- which you can learn from this video. 5. Shave with DollarShaveClub, Make your website in squarespace, learn your shit from lynda.com and listen to those damn books from audible you piece of shit! like it if you liked it.... Not complaining, I still love it though. Don't stop making'em.
The sound is really weird. There are echo and some kind of white-noise as if the microphone is too sensitive. And I only get this with LinusTechtips and TechQuickie. I'm using an Audio Technica ADG1X with en external soundcard and do professional work with it, so its not on my side. Edit: There are some popping aswell.
Well basically anything you send, shouldn't give away who you are.(Like writing a message with your name in it). Other than that its basically inpenetrable encryption. Im actually amazed how smart this is and sad for how evil its users are(mostly)
Idk man, Tor + HTTPS is basically fully secure. Yes you can do some really fancy stuff to still find people, but that takes a lot of ressources and you must've made some big governments very mad to be afraid of that happening. Other than that, as long as you make sure all websites use HTTPS (the plugins make sure of that by default) you're literally fine and nobody can read your stuff, exit node or not.
I don't understand how CMOS can both be a camera sensor AND a data storage chip. Anyone who knows a lot about electronics, could you please explain me how?
3:49 sounds about perfect for a decade old system like 1st gen i7 mobile, Tesla 2.0, and what will be an outdated yet still proper operating system like 7 or 8.1 (not 10/11). TH-cam 1080p60's about the most this system candle anyways. I want this to be a mostly local system.
Can you please explain TPM and give a general overview of how it works and what all it does? Don't just say it enables BitLocker because that's the only think I know about it.
Has there ever been an improvement on Tor’s data speed? For almost a decade I keep hearing that it’s super slow and it’s not ideal for video streaming or downloading.
The speed is suitable for everything but those two things. In fact, some nodes in the network actively throttle connections that try to download a lot of data. Keep in mind that the network was made for people who need to get around censorship to gain access to unbiased daily news or research, as well as journalists and military to communicate securely. The network isn't supposed to provide single high speeds, but it's spread out by design, even to places that naturally have slower connection speeds. Visiting twitter or sending emails works just fine, but downloads and videos put a HUUUGE strain on the entire network, disturbing all other users and making the whole thing slower for everyone. So it's not just not ideal for those things, you _really should not do them at all_ to make sure the network stays accessible for those who need it.
Tor feels great to use though! I used it the first two days I had it but started missingmy chrome extensions and mow it's just taking up space on my desktop... Why did I install it on my desktop?
+NickCraft Productions Check out his other channels. Go to this channel's page and look at the "My Other Channels" tab. He does a good amount on those. And NCIX does some as well (and Linus works there, I believe).
Its unfortunate that you guys have to trade sound quality for workspace. You can still really hear the room response of your warehouse in the audio recording.
Exactly that is what I was looking for "Anyone could run an exit Nodes , infact they could drive all yore traffic through certain nodes" . This is where they are playing for sure .
+diegofu1 Users think they are safe, when in reality, they are not. NSA GHCQ run many exit nodes themselves, and private exit nodes are easily compromised. Let's not even get into traffic analysis.
Tb0n3 You don't know who is operating the exit nodes. That is the point. Could be private, could be NSA, FSB, GHCQ. If you are willing to roll the dice, go for it.
People worry too much about privacy online. I don't care if companies know what a person with my name searches for. It doesn't mean they know "me" does it. I think people who are overly concerned are hiding stuff.
Well in this day a age you search for something and the next day you have news and advertising on all your apps from the thing that you didn't really care that much
Linus tech tips as fast as possible
Yes!
^^
^^
+sebasifas ^^
+MixedMatt As Fast as Possible as fast as possible.
Fun fact: The Internet wasn't designed for privacy. It was designed for trusted computer to trusted computer connections. That's why it's so hard to try to be anonymous. And even with Tor, you can be tracked. It only takes one tiny piece of malware to report back outside of Tor and whoever wants to has your public IP.
No
You have a clear lack of knowledge in the fiels of lineair algebra and ICT. One doesn't just decode a fkn matrix at random with malware thats the whole point of encryption. (at least not without a quantum computer) edit: before I get blasted, there ofc are multiple techniques usually layered. often there will be one of these involved.
@@aleksaristic8278non?
What do u mean in non nerd
Do you mean say ur on tor then u get a email then someone can access ur ip through that even tho its bouncing?
I prefer to use 8-bit encryption. Faster debugging and I can route it through my Nintendo's memory card.
Lol
I prefer to call my webpages using assembly code, bypassing the drivers. It only takes me 5 days for debugging.
“Whoever is in control of the exit nodes is also in control of the traffic, which makes me the one in control”
- Mr. Robot
+Arthur C yess
Elliot.............. ET phone home....
So why don't i have a TOR Exit Node running ? maybe because i'm lazy as Hell. OK most Traffic will be HTTPS but i stil can see where it goes. A hidden Service may also be nice.
Is there any truth to that quote?
@@namz2k11 Yep.
Linus's web browsing history as fast as possible
+Kendai Ren they already created such a thing you're thinking
+iceeblister he didn't say that it's something "new"...
It's nice not having to clear my browser cache, because I don't save anything in there to begin with.
Incognito Mode FTW!
Do _not_ torrent over Tor. A peer-to-peer connection, by definition, has to know your IP address. Torrents will reveal your real IP address to the trackers and peers. That’s why torrenting over Tor defeats the purpose.
So what's the alternative?
"I got a feeling, that somebodys watching meeeee, got no privacy!"
Safing how to give away your IP address^
TOR was developed by the US government. You forgot to mention that. Specifically, it was put together by the US military, which explains why it was a government program that didn't completely suck.
Yup
no it wasnt. it was started by the navy and then funded. but iirc not they dont accet money from any gobernment or big corporation that could compromise the project's economic independence.
You should hear applebaun talking. he makes it very clear they are there to give people tools to resist the nsa and such.
Laharl Krichevskoy I never said that it is currently a project that the government is involved in, merely that it was developed by... I believe it was naval intelligence. It's since been handed over to a non-profit organization for updates and continued development.
U.S. Navy
+CocoaNutCakery If I remember right, they mentioned this in the Dark/Deep Web video, and as it isn't majorly important info, they probably decided that once is enough
One very important note, even though this video is dirt old dy now, is the fact that the US government are the main founders of the Tor network. It's mainly a network for spies and other intel gathering operations and it has to, in nature, be totally anonymous or else would ruin the cover hence why the Tor project exists. In order for the government to be completely invisible they have to melt in with the rest of the people using Tor. I feel like this is an important thing to note since I've seen a lot of people being afraid of using Tor because they think it's a bait, but as I said, in order to keep their spies hidden they must blend them in with the rest of the anonymous userbase because (even how weird this sounds) if a criminal on the Tor network isn't hidden, then there's also no guarantee that the person undercover isn't hidden either.
Thats like making a drink and saying" Because I want my drink to make people fly, it now makes them fly." Just because the Government may want and had designed tor to be as anonymous as possible does NOT meant bad actors cant exploit its weaknesses. There has never and most likely will never be anything that is unexploitable. The only way you can keep some form of information secure or private is by only storing it in one place. Your head. And even then your just a biological machine that one day very soon with the likes of technologies like neural links your mind will be able to be read just like a harddrive
That segue at the end was 10/10
*segue
+NotTheFeesh *Seagul
+NotTheFeesh I thought it was segway all this time :O
+Stapled Fish *Segal
SEGWAY STEEEVVVEE
You missed a bit in the video, you can be even more secure if you use a tor bridge. Tor bridges can be used as exit nodes but the operator of the node can't see your information at all. Plus tor bridges are not publicly listed unlike tor servers.
Tor bridge is already added to the tor browser by default, no?
Some bridges are public, but you can request a private one. They're not necessarily more secure, the reason they exist is to get around networks that block normal entry nodes
can be used as exit nodes?
Watching this video gets you on the "list", welcome my "listed" brethren.
:D
:D
:D
+John McPherson :D
Lmao I started a trend under your comment.
The neighbor keeps 100 pounds of salmon in their garage.... Died laughing:))
"as fast as possible" *proceeds to make jokes every 5 seconds*
Speaking of aggressive advertisers.... :P
Was thinkin the same haha....at least it was tunnelbear and not ting
+Erico Kompatzki
HEIL SQUARESPACE
E
I
L
S
Q
U
A
R
E
S
P
A
C
E
+Generic Throwaway you should.
I wonder if Linus ever has or will make a video on using tunnel bear and explain that Canada is a 5 eyes country..
@@SikConVicTioN
What That means ??
The feeling when the sponsor at the end actually fits the video ^^
That was the best opportunity he has ever had for a great transition and he just did his normal "speaking of..." thing.
I find it funny and kinda scary, that my ISP is literally called "Skynet".
Lmao
Lmao
Bruh, i named my ISP skynet too lol
@@andreasvega599 lol
Lithuania ?
One thing I'm curious about is how a computer knows what to do. Like, what happens if you press a key on the keyboard.
Like: Is a value sent from the keyboard sent to a certain port in the processor (Let's say "Ctrl + C"). And then how would the processor analyze this value and determine that value is an order and not a letter. And then how would it move over to look for marked text in an open window and read the value (text and pictures that make up the marked content written in binary) there and symoltaniously write this value to it's own section in the memory (the clipboard).
This was just an example with the "Copy to clipboard" command, but I'd like to know how the processor determines how to do one task over another. Move, copy, add, etc. data. How it knows what values to add together, and not everything stored in the memory.
I want to meet the guy that said "dang" in the background. He's gotta be cool
Linus gives some examples of who might want to use TOR and there are some noble reasons why an individual would want to but facts are facts - according to a recent report 80% of internet traffic on the Dark web is child abuse material so if anyone feels cynical about why someone is using TOR they have every right to IMO.
Freddie1980 I was wondering about Tor in relation to using Torrent sites for the content I can't get in my country as our government is about to block access to them. Tor feels to dodgy for my liking 😨
Thanks for the information!
In Australia, I've known someone who had their computer held by police specifically because Tor was installed on it. The assumption being that it is only used for hiding criminal activity.
pathetic lmao
I will never go to Australia
@U.S Department of the Treasury lmao
Are you sure the computer want running an exit node? Exit nodes are where the internet requests exit and if your IP address has been seen accessing illegal drug websites while you’re just running an exit node then their computer would be seized by the government since they probably didn’t know that the exit node on tor works like that.
Thanks for the protip!
What you could do is get a flash drive with Linux, specifically the tails version. Have it as a live boot drive on your PC. On Linux tails get a VPN, a VM use together and then in the VM you can use tor.
Best of all. you can set your exit node to a specific area.
Like, i can set my exit node to someplace in australia. or someplace in China.
Hey Linus, nice shirt man!!!
A lot of nodes are monitored by the NSA so just because your packets are encrypted doesn't mean the NSA can't keep track of packet movement.
What's safer? Should I make a VPN server and install Tor on it, or should I install Tor on my computer and then connect to the VPN server?
+Theodoros Nicolaou If you want a secure way to browse the web, ask nigerians. They provide the best security, as long as you pay them a small fee, and prove that you are real by giving them ssomething like your credit card info. Safe browsing! ^^
+as505 Yeah, sure! They're not gonna steal my money when I give them my credit card.
Theodoros Nicolaou exactly!! ^^ safe browsing!
+Theodoros Nicolaou Connect to your vpn first, then tor
Nord VPN, promo price to sign up for 2 yrs for $79. > $3.29/month
how am I just finding your vlogs?
just subscribed to you this week. love your videos, keep up the great work man 👌👍
Tunnel Bear Linus link is broken
3:52 yea, "stuff" ;)
Me : watches this video
My brain :
*YEAH SCIENCE!!!*
Hey why is the LTT techquickie playlist always 8 months behind? +Techquickie
system 32 virus as fast as possible
Kevin Vandy I hope you are joking
delete it
Shift delete it
if you cant understand sarcasm...
you're probably reading this comment and have replied to the same comment I have replied to.
System 32 isn't a virus
The moment you download tor you've already been caught, because lets use common scene here, if the "authorities" go into your network traffic, provided by law from your ISP, and isolate that one file you downloaded from the tor website your name is already in some list. Best option is to get a flash drive from someone else with the installation file in it.
What you say is extremely obvious.
Linux as fast as possible!
Comment flame wars as fast as possible!
Thanks LMG for featuring my suggestion on Tor Onion Routing AFAP! :D
Techquickie as fast as possible
Downloaded TunnelBear, and it is actually awesome. I also like the little pictures of the bear when you travel to a new location!
a. Honestly, I'd trust a TOR exit node more than I'd trust a consumer-available VPN service.
b. Using both TOR and VPN is pointless, as the VPN can still see everything anyway.
I don't have to worry about that though, 'cause I set up my own VPN! Plus, I can run it through TOR as well.
Gotta feel sorry for those loosers who actually pay for a VPN service like Tunnel Bear.
How do you do that oh wise hackerman?
Tunnelbear is FREE🤦♂️
@Nigel YING It is TOR because it comes from The Onion Router.
And what makes you think the Tor exit node cannot steal the data you are sending over it?
I always thought it was a router from The Onion.
Apparently the videos are getting something like :
1. This comes from this -- which you can learn from this video.
2. Because of this -- which you can learn from this video.
3. That leads to this -- which you can learn from this video.
4. And results into that -- which you can learn from this video.
5. Shave with DollarShaveClub, Make your website in squarespace, learn your shit from lynda.com and listen to those damn books from audible you piece of shit!
like it if you liked it....
Not complaining, I still love it though. Don't stop making'em.
i was waiting for the TunnelBear ad :D
Your videos and tutorials are very helpful to me bro, I think I could learn a lot from you ....cheers👍
Thanks for sharing the Tunnel bear with us
The sound is really weird. There are echo and some kind of white-noise as if the microphone is too sensitive.
And I only get this with LinusTechtips and TechQuickie. I'm using an Audio Technica ADG1X with en external soundcard and do professional work with it, so its not on my side.
Edit: There are some popping aswell.
+Odd-Erik Bakkebø I'm hearing the same thing, but this is the first video I've really been able to notice it on
Getting Linus's pulseway ad on linus video 😂😂...The real tech OG🔥🔥🙌🙌
Well basically anything you send, shouldn't give away who you are.(Like writing a message with your name in it). Other than that its basically inpenetrable encryption. Im actually amazed how smart this is and sad for how evil its users are(mostly)
Holy VRAM! A relevant end video ad!
Idk man, Tor + HTTPS is basically fully secure. Yes you can do some really fancy stuff to still find people, but that takes a lot of ressources and you must've made some big governments very mad to be afraid of that happening. Other than that, as long as you make sure all websites use HTTPS (the plugins make sure of that by default) you're literally fine and nobody can read your stuff, exit node or not.
history of linus as fast as possible please
I don't understand how CMOS can both be a camera sensor AND a data storage chip. Anyone who knows a lot about electronics, could you please explain me how?
Abdullah Khatib Thanks!
i was listening to this in the background and i thought it was an add segment until Linus started taking about
tunnel bear
anyone else get a random push notification for this today, November 3rd,2016?
Sollux Captor I did
prntscr.com/d3521y Thought it said 6mins, dang 1k comments in 6 mins!
I got it on November 4th 2016
November 3rd 2018
3:49 sounds about perfect for a decade old system like 1st gen i7 mobile, Tesla 2.0, and what will be an outdated yet still proper operating system like 7 or 8.1 (not 10/11). TH-cam 1080p60's about the most this system candle anyways. I want this to be a mostly local system.
I can trust my vpn. I checked on the logs file and it only logged me connecting to a sever and what time
That is saying quite a lot about you.
Hmmmmmmmm
With Tor you can also browse blocked webpages at school and work computers and networks
Can you please explain TPM and give a general overview of how it works and what all it does? Don't just say it enables BitLocker because that's the only think I know about it.
Tor video sponsored by TunnelBear... Absolutely make sense.
Has there ever been an improvement on Tor’s data speed? For almost a decade I keep hearing that it’s super slow and it’s not ideal for video streaming or downloading.
The speed is suitable for everything but those two things. In fact, some nodes in the network actively throttle connections that try to download a lot of data. Keep in mind that the network was made for people who need to get around censorship to gain access to unbiased daily news or research, as well as journalists and military to communicate securely. The network isn't supposed to provide single high speeds, but it's spread out by design, even to places that naturally have slower connection speeds. Visiting twitter or sending emails works just fine, but downloads and videos put a HUUUGE strain on the entire network, disturbing all other users and making the whole thing slower for everyone.
So it's not just not ideal for those things, you _really should not do them at all_ to make sure the network stays accessible for those who need it.
Tor feels great to use though! I used it the first two days I had it but started missingmy chrome extensions and mow it's just taking up space on my desktop...
Why did I install it on my desktop?
Uninstall it, brah!
+Rizvi Rab You didn't use windows did you?
FiftyPercentHealth I did, but for some reason, the installer defaulted to the desktop for the location :P I just uninstalled it :D
Never use windows with Tor
I'm using it for years already. It used to be pretty private for government, army and such.
Techquickie is very nice , one can have full knowledge about that thing in less time . love this Linus
I use Tunnel Bear for Spotify :3
wow this time the ad spot goes kinda well with the subject
LVM and/or ZFS as fast as possible.
So when somebody does something criminal on Tor:
-What happens to the one on the "End-Node"?
You forgot to mention how Tor is a project of the US Military
also when he said Tor is slow it is and this is because of all of the DDOS traffic. The More You Know.
question do you ever do giveaways? I really need a new processor for my pc, just wondering.
+Jonathan Christensen I can afford that, and ram.
Lol you have like a 1/1000000000 chance of winning anyways lol
+NickCraft Productions Check out his other channels. Go to this channel's page and look at the "My Other Channels" tab. He does a good amount on those. And NCIX does some as well (and Linus works there, I believe).
Buy one
im viewing this through tor and i still see ads in the video
"??so i should uninstall chrome and use "tor"
If you really value privacy, yes. If you value speed over privacy, then no.
Onion router + real onion = safety
ogres are like onions, onions have layers ogres have layers
+MTRREMX Yep, and just like onions, all the layers stink.
Richard Smith lol nice
I want to see TunnelBear in a Mario game. Seems like he'd fit right in.
I should not have clicked on this video. Now a bunch of Deep/Dark Web videos came up and im super scared
*****
The internet is so scary so now im listening to the dog theme from undertale and im happy again
lol listen to it´s raining tacos XD
Watch out for the Noir, Lukas, and The Dollmaker...
Uh..sorry, three years later, but.. clicking on this video just made the algorithm recommend you more videos of this topic. Nothing too scary.
Its unfortunate that you guys have to trade sound quality for workspace. You can still really hear the room response of your warehouse in the audio recording.
The Tor Network never used to be slow. It's slow because little idiots are using Bitorrent over it, thinking they are protected, when they aren't.
I can't access normal sites with tor.. Only deep sites are accessible.
That doesnt make sense. You can browse almost any site..
The Tor Browser is like a Firefox, which received the Holy Spirit. It gives it the ability to send data to send in tongues.
Every pc at my school has toor.
tor
cool
+Mountainpixels at our school we have a proxy server which blocks certain sites, so tor solves our problems :)
Mikat our School is smal 70 People we dont have someting like this
+Mountainpixels cool
Exactly that is what I was looking for "Anyone could run an exit Nodes , infact they could drive all yore traffic through certain nodes" . This is where they are playing for sure .
how to delete system32 as fast as possible
do it
How to make you stop sending random messages as fast as possible.
Install avira antivirus
Destroy your computer into pieces, there you go its okay now:)
Boot from a Linux live usb and delete system32. Thank me later.
TOR also means Tornado Warning in weather world, too lol
Onions are MOIIISSSSSSSTTT
Use TOR Browser for browsing, and advOR for routing traffic - torrents, games, etc.
Oh, and shut off javascript and such.
Here's the shorter version.
Tor: placebo effect.
In what way does the placebo affect apply?
+diegofu1 Users think they are safe, when in reality, they are not. NSA GHCQ run many exit nodes themselves, and private exit nodes are easily compromised. Let's not even get into traffic analysis.
+Mark Z It's only a problem if they keep scaring away those who operate exit nodes. The more there are the safer and faster the network is.
Tb0n3 You don't know who is operating the exit nodes. That is the point. Could be private, could be NSA, FSB, GHCQ. If you are willing to roll the dice, go for it.
This guy is still around? 🤣🤣🤣. I remember watching him long ago. He’s so funny.
Wasnt Tor developed by the government?
no
Yeah
+Zachary Silfen originally, the concept that tor is based upon was created by the us military.but now they no longer use it.
;)
+Zachary Silfen The software is open-source. What's your point?
tor alone has been compromised. best to use tor within tails within a virtual machine
On a disposable computer
You shoulkd have titled it "Tor EXPLAINED as fast as possible" I thought this was a video about improving Tor Performance
So what Shrek meant, when he told Donkey that ogres are like onions, was that they have several layers of encryption. I see now...
So another advertisement disguised as helpful information
Is tor completely safe to use if you only do regular stuff what u would do on a regular browser?
That fututama ad at 0:32
People worry too much about privacy online. I don't care if companies know what a person with my name searches for. It doesn't mean they know "me" does it. I think people who are overly concerned are hiding stuff.
Well in this day a age you search for something and the next day you have news and advertising on all your apps from the thing that you didn't really care that much
I just wanna say gamer words without getting fired from my job
"It's so easy......THAT YOUR MOM CAN USE IT"
Ohhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh xD
I already saw that add coming before clicking on the video.
1:44 Perspective.
You still need SSL if you use TOR because an exit node can harvest data
"Or maybe even me..." hahahhahahahahah. Is there anyone at Linus Media Groups that could get access and decrypt my data? I doubt it.
Can u please make captions.. Eng...