7.1 Tor in All the Places
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
1 hour 55 minutes
Hello, peoples of Interwebs. This is tensed over and welcome to the next video on our comprehensive guide to the Tor browser. On this episode, we're installing tour outside of Windows First with tour on County Lennox with a walk through. After that, we discussed differences of installing it on a Mac and then talk about why selling it on an android phone right now isn't a good idea.
My name is tempest over again. Before we get much further into this lesson. Let's look over the pre Rex. There is one. We broke the cycle. It will be helpful if you have already spent some time in Lenox, preferably Debian Linux. As we'll be using the command line Summers, we install the Tor browser on that platform. This is your first video with me.
Recommend going back and walking a previous videos as I deal with a great set up to where we are now.
Due to the fact we're in discussions now of the Deep Web, Dark Lab and Dark Net, I'm going to give you the proper tools, teach you how to use them and advise on how to safely navigate the deep Web dark Web dark next. But that said, this is not an endorsement of going there illegally at your place of work or home.
Nor, unfortunately, if anything should happen to you,
your equipment or any other possessions is cyber or myself liable. Please be careful.
All right, let's getting the installing tour on colonics.
First, we're gonna boot up our virtual machine and I have it and set to full screen. Here's my top. I'm using
BM Workstation Pro 15. I believe for this
and power this on if you're using root access to your ballot. Callie V. In, which is what I'll be doing. You will have to tweak some coding in one of configuration files. It's not that big of a deal. I will show you that in this video
you do not have tohave coding experience to do it. I'm not big on the coding experience yet,
so I'll walk you through it. Not a big deal. If you don't want to do that, open up a guest IQ access account to your county P M. And then you won't have any problems at all. But
like I said, we're gonna do it with Rudy Access and I'll show you how to change that convict file to make sure that you're good user name, of course, is root for a default Password is T. O. R.
And we sign in.
So open up your Firefox browser, which is in the top left hand side with little icon. There'll Swirl icon, foxtail icon
you've been using Doctor Go course right to search for this I haven't set up is my default,
and we want to look for tour Download Lennox
Band. You want to use Theo the Tor Project. Make sure you're using that and not some other set up or whatever wiki house or any other kind of things used their website toward Project Works official site for clean downloads,
and we're looking at
64 bit and 32 bit. I'm going to go in with 64 bit
if you're not for sure, you should pop up 32 be good.
We're going to save this file when the public comes up
saving toward Downloads Folder
and you can see here we are downloading.
This could take a few minutes, or it could take a couple seconds being on your download speed
from your I s P
and we are good
right? It's minimized that browser for a second.
Okay, so, yes, we have it here and downloads folder,
go to the terminal
We need to change directories as to what we're in.
Chloe hit CD downloads.
Changes that directory to download folder
and let's take a peek on theirs are downloaded following. Just downloaded.
Right now we have to unpack it. So I'm going to t a r
x b j f.
And then we could easily do
Highlight that with two clicks to the right click
control shift C
or you can also do copy and then do paste.
You see a lot of file scrolled past the screen while impacts when it finishes. Lets change directory to where we are inside of that folder. So we're here, We're done,
we need to change into that unpacked folder now.
This could be very finicky. Make sure everything incorrectly. And yes, we are. We're now inside of that
less listed again. See where we are.
Oh, right on. Then. Let's type in this here
to try running it. I'm gonna show you the error that will pop up
if you're using, like I am root access
and there's the error
should not be run as route. We are running it as roots. So let's go. Leave this up where you are.
So let's come over
to your folder icon, which is right. Here you go. Downloads and then way. Need to go to
in the browser.
Start tour browser file. Here. This guy
double click it
hit display. Open it up.
And then we need to find this code.
Should be about 1/3 of the way down.
This is it right here. This is the rudeness of the error that we saw
Stumpy run his route.
So I only need to do to
get rid of that issue
is to this right here, which is gonna turn it into notes and not actual command line.
It's not code, so I'm trying to say so
it's gonna be in a beer note,
not a code,
so you can see it changed colors. We are out there and top left corner wienie gets saved. This because this is something we need to have completed. Done
good. Right now, let's hit the up arrow again to do that command. We just entered in.
And now let's do it.
And it's starting up
Cool. Okay, As we look at the tor browser before, in a previous video, if you're in the U. S, which is where I'm at right now, not a big deal. It is connected. If you're in the country, that's gonna block this or censor this hit configure work on your bridge and for us to connect rolling with this.
first thing like to do when I pulled up a brand new version of tour is
to go check out the def con media servers union addresses, which I think I did in the previous video with you guys as well
dot org's should give us an onion link
power. But there's around your link
toward rock and
Okay, so here's something that I quickly did a check out on, and it worked. So let me show you how I did. Tor browser. Here
is this is our download folder. I wanna keep going on Donald Quarter. Every time I'm gonna bring up tour and Cali, that's annoying. I'm lazy. Let's be real. S o what I did
because I copied these two on the desktop.
And then I went to hear and I clicked. Allow launching.
And there we are. Now you have the icon on your desktop easier to get into. Let's be for real in the command line. So that's another way of launching the Tor browser, and it all looks good. So awesome. That's his tour on colonics.
Tour insulation on Mac OS 2018 later is exactly the same as downloading and installing it on Windows 10 so I won't spend towards time on it. It will also ask about if you need a bridge or local proxy, or do you want to directly connected to your network? Beyond that, I don't see anything different that we need to cover.
If you have any questions on this, please feel free to email me.
New machine learning algorithm can detect use of ABS like YouTube, instagram, among others, and Androids Tor browser or bought.
A group of network security in ethical hacking specialists claims to have developed an algorithm capable of detecting the activity patterns and android operating system APS within the tor network traffic with 97% accuracy this algorithm is not attempting to de anonymized because it cannot reveal the rial i p address of a user
nor other details about their identity.
Still, this algorithm can reveal the tour user is using an angler application.
The work of this team of network security experts is based on previous developments that were able to analyze the flows of TCP packets of traffic and tour on differentiate between eight different types of traffic browsing, chatting, email, streaming audio, video file transfer blows over i, P and P two p.
This time, a specialist applied a similar concept of analysis of TCP packets flowing through it, or connection to detect specific patterns associated with the activity of certain android applications.
Once the algorithm training was completed, specialist used it in tor traffic to detect whether an individual were using any of these APS results were overwhelming. Algorithm showed 97.3% accuracy,
according to network security specialists from the International Institute of Cybersecurity. It could only be used when there is no background traffic.
In other words, when the user is using one and only one application on a smart device at a time,
In addition, they are greatly also has precision laws. Some streaming acts like YouTube or Spotify produce very similar traffic patterns, so the operation tends to confuse them. Finally, as future experiments considered analysis of more applications, similar problems will continue to appear. Thus, the effectiveness of the algorithm will be considerably reduced.