Internet Security: TOR and Freenet

Sdílet
Vložit
  • čas přidán 7. 08. 2024
  • Get the music: zweihander.bandcamp.com
    Shirts, posters, etc.: epicpants.com
    Join the community: teksyndicate.com/user/register
    You can create a new account or join using your google, steam, facebook, openID, twitter, linkedin, yahoo, etc.
    If you have questions, comments, suggestions, or if would like to use a portion of this video please email us: inbox@teksyndicate.com
    For marketing (sponsorship opportunities) inquires email info@teksyndicate.com
    Social:
    Twitter: / teksyndicate
    Logan's Twitter: / logan_rtw
    Facebook: / teksyndicate
  • Věda a technologie

Komentáře • 572

  • @ZXcross
    @ZXcross Před 9 lety +79

    In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.

    • @imjoeking_
      @imjoeking_ Před 9 lety +12

      ZXcross Finaly, someone gets it!

    • @kablooie5446
      @kablooie5446 Před 8 lety +4

      +ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets.
      posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!

    • @Imissthefuhrer
      @Imissthefuhrer Před 7 lety +3

      ZXcross bingo! Can't stand the whole nanny state phenomenon, like in ca or my.

    • @escobarr8818
      @escobarr8818 Před 5 lety +1

      That's just it. You are not as free as you think. A safe nation IS the ONLY free one.

    • @twl148
      @twl148 Před 4 lety +1

      underated comment

  • @KenSherman
    @KenSherman Před rokem +7

    Can't believe this video is a decade old. Still looks as fresh as this year. And possibly is still relevant.

  • @nulbyte
    @nulbyte Před 10 lety +32

    An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address.
    This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear.
    The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.

    • @ravanadevadas3770
      @ravanadevadas3770 Před 4 lety

      if the exit node knew the address of the destination doesnt that blow my cover?
      im just confused i know this comment is 5 years old but im still curious.

    • @williamstyz5509
      @williamstyz5509 Před 4 lety

      I thought that the exit node only knew one of the IP addresses either your or the website you want to visit and the beginning node knows the other

  • @stinkyforeigner1
    @stinkyforeigner1 Před 11 lety +1

    I've learned more about computers and networking from this channel than I have from my two year course in computing.

  • @MrAliveanddying
    @MrAliveanddying Před 10 lety +4

    They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday

    • @s0kulite
      @s0kulite Před rokem

      Well… private agencies collect data without the consent of users.

  • @anthcesana
    @anthcesana Před 11 lety

    I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.

  • @xXXinfonlightXXx
    @xXXinfonlightXXx Před 8 lety

    You guyz earned a customer with this one. Gonna buy some gear to help the show and rep the Syndicate!

  • @backlashstudios6088
    @backlashstudios6088 Před 10 lety +2

    Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.

  • @JustLookA7
    @JustLookA7 Před 8 lety

    Interesting content in this channel. I heard of Freenet some time ago, never tried it.
    I'll keep watching your videos. Subscribed :)

  • @alanraya7730
    @alanraya7730 Před 7 lety +2

    Great video, explained from all angles like you said.

  • @davewhool3091
    @davewhool3091 Před 7 lety

    Great info on Tor and the freenet...tks.

  • @Masterjayrock
    @Masterjayrock Před 11 lety

    I learn something new every time I watch your videos.

  • @miguelcordeiro6063
    @miguelcordeiro6063 Před 11 lety

    Really love your videos, keep them coming!

  • @jeffreylucas4494
    @jeffreylucas4494 Před 11 lety

    Very well done. Great video

  • @Smokejumper92
    @Smokejumper92 Před 11 lety

    I had to pause and just laugh off the horrible 'torrable' joke, well done done Logan

  • @folkobg
    @folkobg Před 11 lety

    Congrats on 60 000!!!!

  • @x0nor
    @x0nor Před 11 lety

    Excellent video, very informative.

  • @ShiroKage009
    @ShiroKage009 Před 11 lety

    Awesome thumbnail!
    I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.

  • @satyanjoy
    @satyanjoy Před 11 lety

    one of the finest episodes,,good way to start the year :)

  • @dieantwoordisawesome
    @dieantwoordisawesome Před 11 lety

    Excellent channel!! keep it up

  • @truthspeak6608
    @truthspeak6608 Před 7 lety

    Are there any video hosting youtube replacements on freenet

  • @drawingkid1313
    @drawingkid1313 Před 11 lety

    You have a very good point.

  • @frey0r
    @frey0r Před 11 lety

    I'm really glad that I subscribed too you. Love you guys. (:

  • @peterskovgaard8689
    @peterskovgaard8689 Před 9 lety

    Hey guys, GREAT video, very informative, as I am one of those guys that care about privacy. More of that, please :)

  • @MrPatriot1776
    @MrPatriot1776 Před 11 lety

    you can use google like normal, tor uses the interface of firefox, it just routes your traffic through a bunch of proxies.

  • @PyroChimp75
    @PyroChimp75 Před 9 lety

    11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...

    • @noneofyourbusiness153
      @noneofyourbusiness153 Před 9 lety +1

      +PyroChimp75
      This is actually incorrect.
      The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up.
      Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.

  • @MrLoggfreak
    @MrLoggfreak Před 10 lety +1

    what about i2p?
    i heard some things about that, is that any good?

  • @MrsDubidap
    @MrsDubidap Před 10 lety +1

    Great video. I'm subscribing right now :D

  • @mihaSLOmetal
    @mihaSLOmetal Před 11 lety

    can you run freenet on your phone to have like secure dropbox or something

  • @markdaman9
    @markdaman9 Před 11 lety

    FINALLY!!!!! Iv been looking for you ever since you left tiger direct!!! now i found you!!!!!YEAHHH

  • @TekWolfe
    @TekWolfe Před 11 lety

    Thanks! im thinking of using the SE Green and Black!

  • @tmoosy
    @tmoosy Před 11 lety

    on freenet can you visit sites such as youtube and would logging in to this site provide any information towards what you were on ?

  • @andrewrichard5147
    @andrewrichard5147 Před 11 lety

    i cant get onto the tor network, it says no open ports, but all ports are open

  • @mikehouchens1223
    @mikehouchens1223 Před 11 lety

    I have been waiting for this forever!

  • @18dnu
    @18dnu Před 8 lety

    Is there a way to tap into certain circles of friends that are not yours on freenet? Or is it by invite only? Are their freenet chatrooms?

  • @SporeTuberTV
    @SporeTuberTV Před 11 lety

    I totally agree Logan Please do a talk segment about Shodan.

  • @WizardOfChicamunga
    @WizardOfChicamunga Před 10 lety

    I tried to use the 'tracert' and the widow opened but closed suddenly. Won't let me use it!

  • @StealThisKarl
    @StealThisKarl Před 11 lety

    Please make more!! (I know you will but just a little extra encouragement)
    Thanks!

  • @Xpeplus
    @Xpeplus Před 11 lety

    i use too have tor and uise hide ip at the same time does it help?

  • @lanceseidman
    @lanceseidman Před 11 lety

    Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.

  • @123456789robbie
    @123456789robbie Před 11 lety

    so what would you recommend? i think BT is the way to go for learning.

  • @010010ryan
    @010010ryan Před 11 lety

    ok, if you get tor, can you then just use google as regular or do you have to go through tor?

  • @12snuffen
    @12snuffen Před 11 lety

    Perfect timing for this vid man!

  • @Konsori
    @Konsori Před 11 lety

    Does anyone know a usb loadable ubuntu OS that runs with TOR's network? The kind of thing he suggested to use in the video.

  • @Deivs65
    @Deivs65 Před 11 lety

    really great video. We need more people to see this. They should not touch our privacy. Mass have to show some resistance.

  • @rdy4change
    @rdy4change Před 11 lety

    I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.

  • @cholokun
    @cholokun Před 11 lety

    is it possible to use network games over freenet?

  • @aliyuaminu5924
    @aliyuaminu5924 Před 2 lety

    Hey
    How do I connect to the freenet

  • @devlin1991
    @devlin1991 Před 11 lety

    Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.

  • @penguinskillyou
    @penguinskillyou Před 11 lety

    Good to see the 'Pun'isher is back with that TOR joke!

  • @minecrafyer
    @minecrafyer Před 11 lety

    what do you use tor for? the silk road?

  • @skadrumcovers
    @skadrumcovers Před 11 lety

    I have a vps that I use putty to SSH into and configured Firefox to just connect through localhost. Works quite well.

  • @TLBEoGyOH
    @TLBEoGyOH Před 11 lety

    ok, can you just clear something up for me then? are the servers all the other places my data goes through? (im a noob when it comes to all this stuff)
    but no cookies or history are recorded on my PC then

  • @jreese5303
    @jreese5303 Před 11 lety

    Hello thanks for the informative vido, it is nice to have a look in too how internet works. I am an freshman in college getting my computer engineer degree, i am active on your forms any suggestions on well anything relater to career wise thanks for your time.

  • @1775revolution2012
    @1775revolution2012 Před 11 lety

    good stuff guys, thanx! subscribed

  • @TekWolfe
    @TekWolfe Před 11 lety

    Do you have any preference between the NZXT Phantom or Bitfenix Prodigy. I see both in the shot and was looking at both cases. Any suggestions?

  • @PhilipPlahn
    @PhilipPlahn Před 11 lety

    depends on what site you visited.

  • @HardLuckStories
    @HardLuckStories Před 11 lety

    Great video

  • @parko246
    @parko246 Před 8 lety

    My ISP throttles my connection every time I open my torrent program. Whats the best/quickest way to block their access to my traffic?

  • @boreman2579
    @boreman2579 Před 11 lety

    Logan, where is the link to the article on Brush Schnier?

  • @comradethoth9629
    @comradethoth9629 Před 8 lety

    What about using a VPN while on tor? What about using a VPN and mobile tor on IOS?

  • @minecrafyer
    @minecrafyer Před 11 lety

    so if one were to torrent what would they use?

  • @JacobP81
    @JacobP81 Před 2 lety

    Just running an exit node does not give you the IP address of the people visiting web sites. The IP addresses are encrypted in layer.

  • @Stummyhurted
    @Stummyhurted Před 11 lety

    What theme for chrome is used in the video?

  • @lokizfenrir
    @lokizfenrir Před 11 lety

    You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination.
    It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)

  • @railpressureflip
    @railpressureflip Před 11 lety

    Funny thing, me and my friends were talking about this just last night at our blanket fort slumber party haha.

  • @ahmed55555
    @ahmed55555 Před 8 lety

    Could someone link me to the article by Bruce Schneier that Logan mentioned?

  • @courtjester7407
    @courtjester7407 Před 7 lety

    Great Information Gents!!!!!

  • @MikeyDee
    @MikeyDee Před 11 lety

    I love the coffee cup coaster! LOL

  • @sellelpoc
    @sellelpoc Před 11 lety

    Why not just configure privoxy to use Tor, i2p, AND freenet? And don't the exit nodes only see the IP of the previoud node? I confus :\

  • @rdy4change
    @rdy4change Před 11 lety

    It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.

  • @rdy4change
    @rdy4change Před 11 lety

    The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.

  • @JanetDiaz6152
    @JanetDiaz6152 Před 11 lety

    Thank you

  • @deadlypeachez
    @deadlypeachez Před 11 lety

    What on here do you need in hd?

  • @HellNo842
    @HellNo842 Před 11 lety

    Interesting vid but what legitimate use for freenet is there though?? just privacy??

  • @ANDREASRIAL
    @ANDREASRIAL Před 10 lety

    great info

  • @L1b3rta
    @L1b3rta Před 11 lety

    Where's the link to Bruce Scheier's paper they said they would link to?

  • @BigBahss
    @BigBahss Před 11 lety

    Just wondering, what graphics card is it that you use as your coaster?

  • @qazmko22
    @qazmko22 Před 11 lety

    What about the new Pirates DL Browser Promoted by "The Pirates Bay" Which i think uses TOR I have read about?

  • @Kiramitsuoka
    @Kiramitsuoka Před 11 lety +1

    Nice video but what about I2P? Would be great if you'd cover it too.

  • @themitchwich
    @themitchwich Před 11 lety

    Is there a mobile version of freenet?

  • @123456789robbie
    @123456789robbie Před 11 lety

    better password, better encryption. what algorithm do you use?

  • @TomlinsTE
    @TomlinsTE Před 10 lety

    If my Freenet circle of friends included yellow cake chefs I wouldn't need to go online to search for more information on the subject. The onion exit nodes read our envelopes to include who we are and the final destination of our request, is that information just IP to IP? I guess from there a 3 letter agency likely matches that info to the host server log files to figure out everything that was presumed private?

  • @dangerdavedave
    @dangerdavedave Před 11 lety

    You guys are making great vids keep it up :D

  • @AdrianColumbus
    @AdrianColumbus Před 11 lety

    7:29 - 7:32 what does he mean by "once you get freenet you can't go back to regular internet like on Tor" ??

  • @HENN3H
    @HENN3H Před 11 lety

    wooohoo, been waiting for this one!

  • @KiteFlyingGuy
    @KiteFlyingGuy Před 10 lety

    What about PhsiPhon? I actually only use it at school to get past their block on Tumblr but I'm also curious as to how it works differently than TOR. Somebody told me that it actually creates a vpn and somehow sends stuff to itself before sending it away although I'm not exactly sure how it really works.

  • @Atrazeal
    @Atrazeal Před 11 lety

    Yeah man, I've only subscribed to a 4 or 5 things on youtube since 2006, This is one of them.

  • @Oliverharry600
    @Oliverharry600 Před 11 lety

    @Dietcamstudios yes.

  • @TheSaadtut
    @TheSaadtut Před 11 lety

    nice cup holder ive always wondered what card it war

  • @Edward135i
    @Edward135i Před 11 lety

    Logan what about Peerblock? good, bad, does it do anything?

  • @lokizfenrir
    @lokizfenrir Před 11 lety

    the only issue i would have is weight the phantom(11-12 kg) is 30% heavier +- than the prodigy(7-8 kg) in bare weight. Guess it depends on how mobile you want to be... i've had both, i preferred the phantom easier component access and just like the design. currently use Antec mini P180 ...

  • @Pongo1320
    @Pongo1320 Před 11 lety

    Do you know what a wind talker is?

  • @goozbaghali
    @goozbaghali Před 10 lety

    Is there any purpose/harm in using VPN while using TOR????

  • @ristyp
    @ristyp Před 11 lety

    Where is the last episode?

  • @ThyDoughnuttt
    @ThyDoughnuttt Před 11 lety

    fancy recommending an alternate to itunes?

  • @NER124
    @NER124 Před 11 lety

    Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?

  • @yam316
    @yam316 Před 11 lety

    yes is different bacause vpn change your entire connection not only in the browser also in p2p connections and vpn is not a program is a remote server so is more secure than tor because tor need a browser a especific 1 firefox in vpn you can use any browser and still secure

  • @andrewe3165
    @andrewe3165 Před 11 lety

    Worth watching for the tor-rible joke alone.

  • @RyanBurnsRed
    @RyanBurnsRed Před 11 lety

    What video card are you using for a coaster? o.O