The Hidden Networks: Onion Routing, TOR, Lokinet, I2P, Freenet

preview_player
Показать описание
This is a primer on how you can layer a hidden network over the public networks and operate only in a completely encrypted environment. This video will cover TOR, Lokinet, I2P, Freenet and the specific applications of the darknet vs the darkweb.

-----------------------------------
-----------------------------------
Merch Store
-----------------------------------

I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Please follow me on
Odysee
Rumble
Рекомендации по теме
Комментарии
Автор

5:54 how to use Tor
7:34 Tor Browsing vs Tor Routing
9:21 The alternative to Tor: Lokinet
13:13 Oxen Nodes
14:00 Darknet vs Darkweb
15:37 Vpn when you download Tor!
16:22 Tor Browser does not offers
sufficient protection
18:45 Other Darknet solutions

yeayea
Автор

I can’t stop watching Rob Braxman lessons.
You loves us: all informations you give to us is some kind of love and we love you back Rob❤

yeayea
Автор

Rob, you are providing an invaluable public service, please keep it up. I have learned so much about internet privacy from your talks. Thanks!!

PWL
Автор

Bravo ROB. one of your complete & comprehensive coverages in Top privacy and security platforms. Your ability to
clarify and simplify concepts into pro active uses are spot on. You continue to include an educational theme to your presentations, My observations come from a tool belt of multi 3 letter influences.. kudos & bravo. continued success. Achilles.

achillesmax
Автор

This is the first time I have seen such a honest advertisement from a VPN provider

justsomeonepassingby
Автор

Rob. Shortly, we (in the UK and the rest of the world) will be forced to have a "digital ID" to access the internet, presumably enforced at the IP level, thereby not even being able to log on to a VPN Any ideas on how to circumnavigate this to access the internet?

chrisrebar
Автор

Nice to see Lokinet get some exposure. Good video!

RTPTechTips
Автор

I tell everyone I talk to that it would be positive to watch your YouTube site !

zannemairiwoods
Автор

Your closing remarks answered most of what I wanted to know but not all

manonfire
Автор

First of all Rob, Thanks a lot for the awesome content you provide.
Have you also covered messengers like Matrix (element) and Briar?
What are your thoughts on them regarding privacy and anonymity?

cmdrrahul
Автор

Just watching this video might put one “on the list!” 😊

dahozabich
Автор

Here in Brazil, every internet provider you hire is obliged to register your document number with the IP and period of use of the IP

siriusleto
Автор

Would be interesting to see you doing a Demo of the Tools you mentioned.

rudypieplenbosch
Автор

I have a different idea. Internet was very entertaining in the year 2000, but since then it became boring. So you will not see me wasting as much time as I used to online. I went for tabletop for entertainment and it is absolutely a blast. I prefer to talk to people face to face instead of using social media.

josepablolunasanchez
Автор

A computer security acquaintance told me to stay clear of the dark web. I can say one thing positive about that. People on the dark web showed me how to write code to protect my software, then someone made it illegal to use. All it did was protect the code layer from view or copying. When you remove my disc, normal operation of the computer is returned.
I don't use it anymore.
To whoever it was that helped me, thank you. I don't know your real name (I wouldn't say it anyway).

theodoreroberts
Автор

The best tactic against this surveillance bug would be when millions of people visit the illegal sites on the dark web every day.

karlbesser
Автор

"In the marvel comics"
They are both (Thor and Loki) central characters of norse mythology. It's like saying "Amaterasu from the Naruto Manga". No hard feelings, I don't "demand" you knowing about some obscure stuff like that, just for future reference.

Loki's specialty being his "silver tongue" it seems quite an apt name for an encrypted protocol. He's a bit of an ambivalent character, using his lies and half truths to the benefit of "the good" many times, but also for "evil" purposes. Which is probably why they chose him as a villain in the Marvel comics. In the end he ends up being tortured for eternity, since he bangs all the other gods wifes, which he got into bed with his trickery - and then brags about it, which is his undoing... At least according to some stories, norse mythology having some basis in oral tradition does not have a 100% clear canon.

towakin
Автор

HOW TO DECIPHER KEY IDENTIFICATION WITH SOFTWARE

XADT-frkb
Автор

All I want to know right now, this very hour, is how to get rid of the VPN and security I've now paid for (it automatically renews which I don't seem to be able to stop) and get what you offer or recommend. I don't believe there's any way for the USA to continue as is for 24 more months.

manonfire
Автор

@Rob Braxman . Hi. Please Answer these. 1. If you have vpn on, will using regular email show your IP address on the header? I’ve never noticed an IP address on emails. 2. since BytzVPN uses Tor with Brax Router, how much does this slow down your internet service? 3. Since sessions messaging uses lokinet is it a secure messaging app? 4. messaging is only secure e-to e via linux to linux or OS to OS. So what do you suggest with either linux or degoogled android for secure messaging? Is this the same scenerio for voice calls? Can you have a non recorded phone call with degoogled android or linux?

PAULAKEITH-mm