Time
1 hour 55 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:07
Hello, peoples of the Interwebs. This is tensed over and welcome to the next video on our comprehensive guy to the tour browser.
00:15
On this episode, we're getting under the hood of Tor browser in discussing tour relays.
00:22
My name is tensed over again.
00:25
Before we get much broader into this course, Let's look over the free Rex.
00:29
There still aren't any.
00:31
This video is moving into some networking and really discussions. This is your first video with me. Welcome aboard.
00:37
I would recommend going back watching the previous video. Since that deal, the great set up to where we are now.
00:43
As you can read here. Basic networking is a plus, but not required. Also, you basically just have a need and or want to lean on his online, especially since eyes, peas or Internet service providers Ken Log and will lock all that you're doing
01:00
due to the fact we're in discussions now of the Deep Web Dark Lab Dark Net. I'm going to give you the proper schools, teach you how to use them and advise on how to safely navigate the deep dark web.
01:11
With that said, this is not an endorsement of going there illegally at your place of work or home.
01:18
Nor, unfortunately, if anything should happen to you, your equipment or any other possessions is library or myself liable. Please be careful.
01:26
Let's get into some terms. First.
01:30
Tor Relays, which is a computer with special software configuration on it, are also referred to as routers for knows they've received traffic on the Tor network and pass it along the Tor network and few words is away toe anonymous eyes In that traffic. They relies on volunteers to donate bend with more. People who run realize
01:49
the faster the core network will be.
01:52
There are three kinds of relays you could run in order to help the Tor network middle relays, exit relays and bridges
02:00
for greater security. Off port traffic passes through three relays before it reaches its destination.
02:06
The 1st 2 relays are middle relays, with one being the guard or entrance, which receives traffic and then pass it along to a relay.
02:13
Middle relays add to the speed of the bus into the tor network without making the owner of the relay look with horses, traffic,
02:20
little relays, advertiser presence to the rest of four network so that any Tor use air. Connect to them. Even if I'm malicious user employees, the tor network to something illegal i p. Address of a middle relay will not show up at this force of the traffic.
02:34
That means the middle relay generally safer running your home in production of the service's or on a computer with your personal files.
02:42
A bridge is an unlisted relay that lets people get to normal. Realize there is no published list of all bridges. We have no idea how many there. Maybe their purpose is to help people in countries like China that actually filter and block tour running a bridge. We use much less bandwidth than a no more relay, so it's usually find to run on home connection
03:02
exit note or where the traffic leaves a tor network to go out to the regular Internet or
03:08
without exit notes. No one could access anything through tour except surfaces. They're very important, and there could never be enough off them.
03:16
The problem is that people often use tour for illegal things. They're running exit node will make all traffic appear to be from your location, so you may be subject to erroneous police investigations.
03:30
I'll go on more of the legal aspect of this in our next lesson, with things too weak, ese and more information.
03:36
Hidden service is basically a server with hidden Nike address.
03:39
Hidden service is cannot be accessed over the Internet. They must go to the tor network. You can run pretty much any service you want this way. Website. IRC Networks, FTP archives Really anything you could think.
03:53
Okay, here's some great graphics to explain how four works from the Electronic Frontier Foundation or Pff dot or GE to create a private network pathway with tour. The user, software or client gradually builds a circuit of encrypted connection through relays on the network circuit is extended. One hop at a time
04:11
relay along the way.
04:13
Nose on Lee, which really gave it data and which relay it is giving data, too.
04:17
No, in which your relay ever knows the complete path. But a data packet has taken. The client negotiates a separate set of encryption keys for each off along the circuits to ensure that each hop can't trace those connections they pass through.
04:32
When's the circuit has been established. Many kinds of data can be exchanged in several different source of software applications can be deployed over the tor network because each relay sees no more than one hop in circuit. Neither an eavesdropper nor compromise relay should be able to use traffic analysis. The link. The connection sources destination
04:51
for efficiency. The tour software uses the same circuit for connections that happened within the same 10 inches.
04:58
Later requests are given a new circuit to keep people from linking your earlier actions to the new ones. Also, if you remember from when we installed the Tor browser, you can force create a new connection from the top left side of your browser.
05:11
Just remember, the TOR Network relies on volunteers to donate bandwidth.
05:15
The more people who run relays, the faster the tor network will be. If you're interested, I will have a link to check out your projects. Wicky on how to check your computer server router to become our tour relate host at the end of the next lesson,

Up Next

Guide to the Tor Browser

This is a comprehensive Tor Browser guide to getting through the mystique of the Tor Browser including, but not limited to: major misconceptions, installation, history, strengths and weaknesses, discussions on onion addresses, and ending on a comparison of the Deep Web and Dark Web.

Instructed By

Instructor Profile Image
Tim Stover
Cybersecurity Research Analyst
Instructor