{"video_id":"wlP1JrfvUo0","title":"Tor As Fast As Possible","channel":"Techquickie","show":"Techquickie","published_at":"2016-05-06T14:58:16Z","duration_s":374,"segments":[{"start_s":0.24,"end_s":8.0,"text":"Who would have thought that one of the best ways to preserve your privacy would","speaker":null,"is_sponsor":0},{"start_s":4.24,"end_s":9.84,"text":"be to hide behind an onion? And no, I'm","speaker":null,"is_sponsor":0},{"start_s":8.0,"end_s":13.519,"text":"of course not talking about growing a literal massive onion and standing","speaker":null,"is_sponsor":0},{"start_s":11.759,"end_s":18.88,"text":"behind it hoping that the smell will keep everyone else at bay. Today's","speaker":null,"is_sponsor":0},{"start_s":16.0,"end_s":25.359,"text":"episode is all about the onion router, better known as tour. used by dissident,","speaker":null,"is_sponsor":0},{"start_s":22.72,"end_s":30.4,"text":"uh, cyber criminals, and even ordinary folks the world over to keep their","speaker":null,"is_sponsor":0},{"start_s":27.68,"end_s":36.8,"text":"online activities away from the prying eyes of governments, advertisers,","speaker":null,"is_sponsor":0},{"start_s":33.28,"end_s":39.36,"text":"stalkers, or maybe even me. Dang it. But","speaker":null,"is_sponsor":0},{"start_s":36.8,"end_s":44.96,"text":"how does it work? Why is it considered so secure? And does it have any","speaker":null,"is_sponsor":0},{"start_s":41.92,"end_s":47.12,"text":"weaknesses? We touched on tour in our","speaker":null,"is_sponsor":0},{"start_s":44.96,"end_s":50.719,"text":"video about the deep web and the dark web, which you can check out here, but","speaker":null,"is_sponsor":0},{"start_s":49.12,"end_s":58.0,"text":"we're going to dive into it in a little bit more detail. Tour tries to anonymize","speaker":null,"is_sponsor":0},{"start_s":54.8,"end_s":60.48,"text":"your online activity by encasing your","speaker":null,"is_sponsor":0},{"start_s":58.0,"end_s":65.519,"text":"traffic in multiple layers of encryption, then sending it through a","speaker":null,"is_sponsor":0},{"start_s":62.879,"end_s":71.6,"text":"number of nodes that peel back those layers one at a time, hence the onion","speaker":null,"is_sponsor":0},{"start_s":68.08,"end_s":73.68,"text":"nickname. Each node only decrypts enough","speaker":null,"is_sponsor":0},{"start_s":71.6,"end_s":79.439,"text":"information in the packet to know where to send it next. So none of the nodes","speaker":null,"is_sponsor":0},{"start_s":76.4,"end_s":81.759,"text":"know both your identity and the identity","speaker":null,"is_sponsor":0},{"start_s":79.439,"end_s":86.88,"text":"of whatever website or server you are trying to connect to. This high level of","speaker":null,"is_sponsor":0},{"start_s":84.4,"end_s":93.2,"text":"encryption and repeated bouncing of network traffic makes tour quite secure,","speaker":null,"is_sponsor":0},{"start_s":90.0,"end_s":96.24,"text":"but it isn't entirely foolproof. At some","speaker":null,"is_sponsor":0},{"start_s":93.2,"end_s":98.72,"text":"point, your data has to leave the tour","speaker":null,"is_sponsor":0},{"start_s":96.24,"end_s":103.439,"text":"network to get to wherever it's going through something called an exit node.","speaker":null,"is_sponsor":0},{"start_s":101.2,"end_s":107.759,"text":"The very last tour node that your data travels through. And when your data","speaker":null,"is_sponsor":0},{"start_s":105.439,"end_s":113.2,"text":"leaves an exit node and is sent to its destination, it is no longer necessarily","speaker":null,"is_sponsor":0},{"start_s":110.479,"end_s":118.479,"text":"encrypted. While it's very difficult still for the recipient to tell that","speaker":null,"is_sponsor":0},{"start_s":115.2,"end_s":120.96,"text":"it's you connecting, any unencrypted","speaker":null,"is_sponsor":0},{"start_s":118.479,"end_s":125.04,"text":"personal information can be read by both the operator of the exit node and","speaker":null,"is_sponsor":0},{"start_s":123.52,"end_s":129.599,"text":"whatever site it is that you're connecting to. In fact, a team of","speaker":null,"is_sponsor":0},{"start_s":127.28,"end_s":134.959,"text":"researchers several years ago harvested a bunch of unencrypted email addresses","speaker":null,"is_sponsor":0},{"start_s":132.0,"end_s":139.92,"text":"and passwords in this manner even though they were sent over tour. The fact that","speaker":null,"is_sponsor":0},{"start_s":137.599,"end_s":144.879,"text":"anyone can run an exit node also means that you don't know who could be looking","speaker":null,"is_sponsor":0},{"start_s":142.08,"end_s":150.4,"text":"at your information on the other end. To alleviate this problem somewhat, the Tor","speaker":null,"is_sponsor":0},{"start_s":147.76,"end_s":154.879,"text":"Foundation provides the tour browser for free, which is a modified version of","speaker":null,"is_sponsor":0},{"start_s":152.56,"end_s":162.16,"text":"Firefox that, among other things, attempts to use the encrypted HTTPS","speaker":null,"is_sponsor":0},{"start_s":158.72,"end_s":165.599,"text":"standard instead of regular HTTP for as","speaker":null,"is_sponsor":0},{"start_s":162.16,"end_s":168.48,"text":"much web activity as possible and also","speaker":null,"is_sponsor":0},{"start_s":165.599,"end_s":174.239,"text":"disable certain plugins that can leak your IP address. Many plugins and other","speaker":null,"is_sponsor":0},{"start_s":171.84,"end_s":180.08,"text":"applications for that matter won't run over the tour network by default and can","speaker":null,"is_sponsor":0},{"start_s":177.04,"end_s":181.92,"text":"thereby give away your identity even if","speaker":null,"is_sponsor":0},{"start_s":180.08,"end_s":187.44,"text":"your other traffic your normal web browsing traffic is going through tour.","speaker":null,"is_sponsor":0},{"start_s":184.72,"end_s":192.64,"text":"It is possible to force other applications to use the tour network","speaker":null,"is_sponsor":0},{"start_s":190.319,"end_s":197.36,"text":"either by manually configuring them or using programs like tallow that do it","speaker":null,"is_sponsor":0},{"start_s":194.879,"end_s":202.4,"text":"for you. But since any unencrypted information that you send or receive can","speaker":null,"is_sponsor":0},{"start_s":199.76,"end_s":206.64,"text":"still be seen by exit nodes, some users have tried using virtual private","speaker":null,"is_sponsor":0},{"start_s":204.4,"end_s":210.239,"text":"networks or VPNs, which you can learn more about here, by the way, in","speaker":null,"is_sponsor":0},{"start_s":208.319,"end_s":215.92,"text":"conjunction with Torah to create an encrypted tunnel at every point of the","speaker":null,"is_sponsor":0},{"start_s":213.36,"end_s":220.64,"text":"connection. Not a bad solution as long as you can trust your VPN provider not","speaker":null,"is_sponsor":0},{"start_s":217.92,"end_s":226.08,"text":"to keep tabs on you. Of course though, the best idea is not to send anything","speaker":null,"is_sponsor":0},{"start_s":223.519,"end_s":231.84,"text":"personally identifying over tour or anywhere if you can help it. Tour also","speaker":null,"is_sponsor":0},{"start_s":229.519,"end_s":237.36,"text":"has the limitation of being a rather slow network. So it might not be too","speaker":null,"is_sponsor":0},{"start_s":234.159,"end_s":240.239,"text":"useful for downloading large amounts of","speaker":null,"is_sponsor":0},{"start_s":237.36,"end_s":244.239,"text":"you know stuff uh streaming in 4K or using Bit Torrent especially the latter","speaker":null,"is_sponsor":0},{"start_s":242.4,"end_s":249.519,"text":"as the Bit Torrent protocol can broadcast your IP address if you aren't","speaker":null,"is_sponsor":0},{"start_s":246.959,"end_s":255.28,"text":"careful. Nevertheless though, tour is still a great help to activists, uh,","speaker":null,"is_sponsor":0},{"start_s":252.879,"end_s":259.519,"text":"victims of crime and people who are just plain concerned about preserving","speaker":null,"is_sponsor":0},{"start_s":257.28,"end_s":266.08,"text":"personal privacy in an age where it feels like we can always be watched. Tor","speaker":null,"is_sponsor":0},{"start_s":263.68,"end_s":270.0,"text":"may not be perfect, but it is a good first line of defense against aggressive","speaker":null,"is_sponsor":0},{"start_s":268.32,"end_s":276.0,"text":"advertisers, shady government shenanigans, or, you know, Skynet.","speaker":null,"is_sponsor":0},{"start_s":273.84,"end_s":281.12,"text":"Speaking of online security, Tunnel BearVPN lets you tunnel to 20 different","speaker":null,"is_sponsor":0},{"start_s":279.52,"end_s":285.84,"text":"countries, allowing you to browse the internet and use online services as","speaker":null,"is_sponsor":0},{"start_s":283.52,"end_s":289.28,"text":"though you were in that different country. And of course, if you clicked","speaker":null,"is_sponsor":0},{"start_s":287.44,"end_s":293.68,"text":"on the explanation of VPNs that I referred to earlier in this video, you","speaker":null,"is_sponsor":0},{"start_s":291.12,"end_s":298.0,"text":"would already know that. Aha. They have easy to use apps for iOS, Android, PC,","speaker":null,"is_sponsor":0},{"start_s":296.32,"end_s":302.56,"text":"and Mac. They also have a Chrome extension. You just choose the country","speaker":null,"is_sponsor":0},{"start_s":300.32,"end_s":307.199,"text":"that you want. You click the little virtual button and boom, your little","speaker":null,"is_sponsor":0},{"start_s":304.72,"end_s":310.8,"text":"bear tunnels over to wherever it happens that you want to be tunneling through.","speaker":null,"is_sponsor":0},{"start_s":309.44,"end_s":316.479,"text":"When you turn on tunnel bear, your connection gets encrypted and your public IP address gets switched so that","speaker":null,"is_sponsor":0},{"start_s":314.24,"end_s":322.4,"text":"you can show up as though you were in a different country, letting you bypass","speaker":null,"is_sponsor":0},{"start_s":319.28,"end_s":325.28,"text":"stupid things like geographical region","speaker":null,"is_sponsor":0},{"start_s":322.4,"end_s":328.8,"text":"restrictions. Super thumbs up. It's also easy to use. You don't have to do any of","speaker":null,"is_sponsor":0},{"start_s":326.96,"end_s":333.199,"text":"that, you know, port configuration and DNS or blah blah, etc. nonsense. It's so","speaker":null,"is_sponsor":0},{"start_s":331.36,"end_s":337.6,"text":"easy that your mom could use it and they have a top-rated privacy policy and do","speaker":null,"is_sponsor":0},{"start_s":335.199,"end_s":342.4,"text":"not log their users's activity. So, you can actually try out Tunnel Bear for","speaker":null,"is_sponsor":0},{"start_s":339.36,"end_s":344.8,"text":"free with 500 megs of data included. And","speaker":null,"is_sponsor":0},{"start_s":342.4,"end_s":347.36,"text":"you can save 10% on your unlimited package, which only costs a few bucks a","speaker":null,"is_sponsor":0},{"start_s":346.479,"end_s":352.479,"text":"month by heading over to tunnelbear.com/Linus linked in the video description. So,","speaker":null,"is_sponsor":0},{"start_s":351.36,"end_s":357.28,"text":"thanks for watching, guys. If you like this video, hit the like button. If you","speaker":null,"is_sponsor":0},{"start_s":355.039,"end_s":359.759,"text":"disliked it, hit the dislike button. If you want to check out our other","speaker":null,"is_sponsor":0},{"start_s":358.24,"end_s":362.96,"text":"channels, hey, go ahead and do that. We've got Channel Super Fun, which we've","speaker":null,"is_sponsor":0},{"start_s":361.44,"end_s":366.88,"text":"had some pretty rocking videos on lately. Maybe we've got one over there to show you. If you have suggestions for","speaker":null,"is_sponsor":0},{"start_s":365.52,"end_s":370.96,"text":"future fastest possibles, leave them in a comment below the video. And as always, don't forget to subscribe and","speaker":null,"is_sponsor":0},{"start_s":369.44,"end_s":375.12,"text":"follow and all that good stuff so you don't miss any other tech quickies.","speaker":null,"is_sponsor":0}],"full_text":"Who would have thought that one of the best ways to preserve your privacy would be to hide behind an onion? And no, I'm of course not talking about growing a literal massive onion and standing behind it hoping that the smell will keep everyone else at bay. Today's episode is all about the onion router, better known as tour. used by dissident, uh, cyber criminals, and even ordinary folks the world over to keep their online activities away from the prying eyes of governments, advertisers, stalkers, or maybe even me. Dang it. But how does it work? Why is it considered so secure? And does it have any weaknesses? We touched on tour in our video about the deep web and the dark web, which you can check out here, but we're going to dive into it in a little bit more detail. Tour tries to anonymize your online activity by encasing your traffic in multiple layers of encryption, then sending it through a number of nodes that peel back those layers one at a time, hence the onion nickname. Each node only decrypts enough information in the packet to know where to send it next. So none of the nodes know both your identity and the identity of whatever website or server you are trying to connect to. This high level of encryption and repeated bouncing of network traffic makes tour quite secure, but it isn't entirely foolproof. At some point, your data has to leave the tour network to get to wherever it's going through something called an exit node. The very last tour node that your data travels through. And when your data leaves an exit node and is sent to its destination, it is no longer necessarily encrypted. While it's very difficult still for the recipient to tell that it's you connecting, any unencrypted personal information can be read by both the operator of the exit node and whatever site it is that you're connecting to. In fact, a team of researchers several years ago harvested a bunch of unencrypted email addresses and passwords in this manner even though they were sent over tour. The fact that anyone can run an exit node also means that you don't know who could be looking at your information on the other end. To alleviate this problem somewhat, the Tor Foundation provides the tour browser for free, which is a modified version of Firefox that, among other things, attempts to use the encrypted HTTPS standard instead of regular HTTP for as much web activity as possible and also disable certain plugins that can leak your IP address. Many plugins and other applications for that matter won't run over the tour network by default and can thereby give away your identity even if your other traffic your normal web browsing traffic is going through tour. It is possible to force other applications to use the tour network either by manually configuring them or using programs like tallow that do it for you. But since any unencrypted information that you send or receive can still be seen by exit nodes, some users have tried using virtual private networks or VPNs, which you can learn more about here, by the way, in conjunction with Torah to create an encrypted tunnel at every point of the connection. Not a bad solution as long as you can trust your VPN provider not to keep tabs on you. Of course though, the best idea is not to send anything personally identifying over tour or anywhere if you can help it. Tour also has the limitation of being a rather slow network. So it might not be too useful for downloading large amounts of you know stuff uh streaming in 4K or using Bit Torrent especially the latter as the Bit Torrent protocol can broadcast your IP address if you aren't careful. Nevertheless though, tour is still a great help to activists, uh, victims of crime and people who are just plain concerned about preserving personal privacy in an age where it feels like we can always be watched. Tor may not be perfect, but it is a good first line of defense against aggressive advertisers, shady government shenanigans, or, you know, Skynet. Speaking of online security, Tunnel BearVPN lets you tunnel to 20 different countries, allowing you to browse the internet and use online services as though you were in that different country. And of course, if you clicked on the explanation of VPNs that I referred to earlier in this video, you would already know that. Aha. They have easy to use apps for iOS, Android, PC, and Mac. They also have a Chrome extension. You just choose the country that you want. You click the little virtual button and boom, your little bear tunnels over to wherever it happens that you want to be tunneling through. When you turn on tunnel bear, your connection gets encrypted and your public IP address gets switched so that you can show up as though you were in a different country, letting you bypass stupid things like geographical region restrictions. Super thumbs up. It's also easy to use. You don't have to do any of that, you know, port configuration and DNS or blah blah, etc. nonsense. It's so easy that your mom could use it and they have a top-rated privacy policy and do not log their users's activity. So, you can actually try out Tunnel Bear for free with 500 megs of data included. And you can save 10% on your unlimited package, which only costs a few bucks a month by heading over to tunnelbear.com/Linus linked in the video description. So, thanks for watching, guys. If you like this video, hit the like button. If you disliked it, hit the dislike button. If you want to check out our other channels, hey, go ahead and do that. We've got Channel Super Fun, which we've had some pretty rocking videos on lately. Maybe we've got one over there to show you. If you have suggestions for future fastest possibles, leave them in a comment below the video. And as always, don't forget to subscribe and follow and all that good stuff so you don't miss any other tech quickies."}