Tor As Fast As Possible

preview_player
Показать описание
The Tor network has become popular with people who want to stay hidden online. How does it work, and what are its limitations?

Рекомендации по теме
Комментарии
Автор

I prefer to use 8-bit encryption. Faster debugging and I can route it through my Nintendo's memory card.

TheHoaxHotel
Автор

Fun fact: The Internet wasn't designed for privacy. It was designed for trusted computer to trusted computer connections. That's why it's so hard to try to be anonymous. And even with Tor, you can be tracked. It only takes one tiny piece of malware to report back outside of Tor and whoever wants to has your public IP.

BobBobson
Автор

“Whoever is in control of the exit nodes is also in control of the traffic, which makes me the one in control”
- Mr. Robot

ace
Автор

Do _not_ torrent over Tor. A peer-to-peer connection, by definition, has to know your IP address. Torrents will reveal your real IP address to the trackers and peers. That’s why torrenting over Tor defeats the purpose.

MultiRobotnik
Автор

One very important note, even though this video is dirt old dy now, is the fact that the US government are the main founders of the Tor network. It's mainly a network for spies and other intel gathering operations and it has to, in nature, be totally anonymous or else would ruin the cover hence why the Tor project exists. In order for the government to be completely invisible they have to melt in with the rest of the people using Tor. I feel like this is an important thing to note since I've seen a lot of people being afraid of using Tor because they think it's a bait, but as I said, in order to keep their spies hidden they must blend them in with the rest of the anonymous userbase because (even how weird this sounds) if a criminal on the Tor network isn't hidden, then there's also no guarantee that the person undercover isn't hidden either.

saintintrovert
Автор

Linus's web browsing history as fast as possible

iceeblister
Автор

TOR was developed by the US government. You forgot to mention that. Specifically, it was put together by the US military, which explains why it was a government program that didn't completely suck.

CocoaNutCakery
Автор

You missed a bit in the video, you can be even more secure if you use a tor bridge. Tor bridges can be used as exit nodes but the operator of the node can't see your information at all. Plus tor bridges are not publicly listed unlike tor servers.

Ashley_Dale
Автор

"I got a feeling, that somebodys watching got no privacy!"

iLOLZU
Автор

Linus gives some examples of who might want to use TOR and there are some noble reasons why an individual would want to but facts are facts - according to a recent report 80% of internet traffic on the Dark web is child abuse material so if anyone feels cynical about why someone is using TOR they have every right to IMO.

Freddie
Автор

Speaking of aggressive advertisers.... :P

--
Автор

The feeling when the sponsor at the end actually fits the video ^^

marcusplayer
Автор

I find it funny and kinda scary, that my ISP is literally called "Skynet".

psforthewinftw
Автор

One thing I'm curious about is how a computer knows what to do. Like, what happens if you press a key on the keyboard.
Like: Is a value sent from the keyboard sent to a certain port in the processor (Let's say "Ctrl + C"). And then how would the processor analyze this value and determine that value is an order and not a letter. And then how would it move over to look for marked text in an open window and read the value (text and pictures that make up the marked content written in binary) there and symoltaniously write this value to it's own section in the memory (the clipboard).
This was just an example with the "Copy to clipboard" command, but I'd like to know how the processor determines how to do one task over another. Move, copy, add, etc. data. How it knows what values to add together, and not everything stored in the memory.

eessppeenn
Автор

Best of all. you can set your exit node to a specific area.

Like, i can set my exit node to someplace in australia. or someplace in China.

elliotmason
Автор

That was the best opportunity he has ever had for a great transition and he just did his normal "speaking of..." thing.

antdonkop
Автор

What's safer? Should I make a VPN server and install Tor on it, or should I install Tor on my computer and then connect to the VPN server?

theodoros_
Автор

The neighbor keeps 100 pounds of salmon in their garage.... Died laughing:))

martontichi
Автор

Getting Linus's pulseway ad on linus video 😂😂...The real tech OG🔥🔥🙌🙌

Backofthenetshow
Автор

I want to meet the guy that said "dang" in the background. He's gotta be cool

seamusfrederick