Tor As Fast As Possible

Techquickie ·Techquickie ·2016-05-06 · 1,068 words · ~5 min read
Floatplane YouTube

Transcript

JSON SRT VTT 83
0:00 Who would have thought that one of the best ways to preserve your privacy would
0:04 be to hide behind an onion? And no, I'm
0:08 of course not talking about growing a literal massive onion and standing
0:11 behind it hoping that the smell will keep everyone else at bay. Today's
0:16 episode is all about the onion router, better known as tour. used by dissident,
0:22 uh, cyber criminals, and even ordinary folks the world over to keep their
0:27 online activities away from the prying eyes of governments, advertisers,
0:33 stalkers, or maybe even me. Dang it. But
0:36 how does it work? Why is it considered so secure? And does it have any
0:41 weaknesses? We touched on tour in our
0:44 video about the deep web and the dark web, which you can check out here, but
0:49 we're going to dive into it in a little bit more detail. Tour tries to anonymize
0:54 your online activity by encasing your
0:58 traffic in multiple layers of encryption, then sending it through a
1:02 number of nodes that peel back those layers one at a time, hence the onion
1:08 nickname. Each node only decrypts enough
1:11 information in the packet to know where to send it next. So none of the nodes
1:16 know both your identity and the identity
1:19 of whatever website or server you are trying to connect to. This high level of
1:24 encryption and repeated bouncing of network traffic makes tour quite secure,
1:30 but it isn't entirely foolproof. At some
1:33 point, your data has to leave the tour
1:36 network to get to wherever it's going through something called an exit node.
1:41 The very last tour node that your data travels through. And when your data
1:45 leaves an exit node and is sent to its destination, it is no longer necessarily
1:50 encrypted. While it's very difficult still for the recipient to tell that
1:55 it's you connecting, any unencrypted
1:58 personal information can be read by both the operator of the exit node and
2:03 whatever site it is that you're connecting to. In fact, a team of
2:07 researchers several years ago harvested a bunch of unencrypted email addresses
2:12 and passwords in this manner even though they were sent over tour. The fact that
2:17 anyone can run an exit node also means that you don't know who could be looking
2:22 at your information on the other end. To alleviate this problem somewhat, the Tor
2:27 Foundation provides the tour browser for free, which is a modified version of
2:32 Firefox that, among other things, attempts to use the encrypted HTTPS
2:38 standard instead of regular HTTP for as
2:42 much web activity as possible and also
2:45 disable certain plugins that can leak your IP address. Many plugins and other
2:51 applications for that matter won't run over the tour network by default and can
2:57 thereby give away your identity even if
3:00 your other traffic your normal web browsing traffic is going through tour.
3:04 It is possible to force other applications to use the tour network
3:10 either by manually configuring them or using programs like tallow that do it
3:14 for you. But since any unencrypted information that you send or receive can
3:19 still be seen by exit nodes, some users have tried using virtual private
3:24 networks or VPNs, which you can learn more about here, by the way, in
3:28 conjunction with Torah to create an encrypted tunnel at every point of the
3:33 connection. Not a bad solution as long as you can trust your VPN provider not
3:37 to keep tabs on you. Of course though, the best idea is not to send anything
3:43 personally identifying over tour or anywhere if you can help it. Tour also
3:49 has the limitation of being a rather slow network. So it might not be too
3:54 useful for downloading large amounts of
3:57 you know stuff uh streaming in 4K or using Bit Torrent especially the latter
4:02 as the Bit Torrent protocol can broadcast your IP address if you aren't
4:06 careful. Nevertheless though, tour is still a great help to activists, uh,
4:12 victims of crime and people who are just plain concerned about preserving
4:17 personal privacy in an age where it feels like we can always be watched. Tor
4:23 may not be perfect, but it is a good first line of defense against aggressive
4:28 advertisers, shady government shenanigans, or, you know, Skynet.
4:33 Speaking of online security, Tunnel BearVPN lets you tunnel to 20 different
4:39 countries, allowing you to browse the internet and use online services as
4:43 though you were in that different country. And of course, if you clicked
4:47 on the explanation of VPNs that I referred to earlier in this video, you
4:51 would already know that. Aha. They have easy to use apps for iOS, Android, PC,
4:56 and Mac. They also have a Chrome extension. You just choose the country
5:00 that you want. You click the little virtual button and boom, your little
5:04 bear tunnels over to wherever it happens that you want to be tunneling through.
5:09 When you turn on tunnel bear, your connection gets encrypted and your public IP address gets switched so that
5:14 you can show up as though you were in a different country, letting you bypass
5:19 stupid things like geographical region
5:22 restrictions. Super thumbs up. It's also easy to use. You don't have to do any of
5:26 that, you know, port configuration and DNS or blah blah, etc. nonsense. It's so
5:31 easy that your mom could use it and they have a top-rated privacy policy and do
5:35 not log their users's activity. So, you can actually try out Tunnel Bear for
5:39 free with 500 megs of data included. And
5:42 you can save 10% on your unlimited package, which only costs a few bucks a
5:46 month by heading over to tunnelbear.com/Linus linked in the video description. So,
5:51 thanks for watching, guys. If you like this video, hit the like button. If you
5:55 disliked it, hit the dislike button. If you want to check out our other
5:58 channels, hey, go ahead and do that. We've got Channel Super Fun, which we've
6:01 had some pretty rocking videos on lately. Maybe we've got one over there to show you. If you have suggestions for
6:05 future fastest possibles, leave them in a comment below the video. And as always, don't forget to subscribe and
6:09 follow and all that good stuff so you don't miss any other tech quickies.