Internet Security: TOR and Freenet
Vložit
- čas přidán 7. 08. 2024
- Get the music: zweihander.bandcamp.com
Shirts, posters, etc.: epicpants.com
Join the community: teksyndicate.com/user/register
You can create a new account or join using your google, steam, facebook, openID, twitter, linkedin, yahoo, etc.
If you have questions, comments, suggestions, or if would like to use a portion of this video please email us: inbox@teksyndicate.com
For marketing (sponsorship opportunities) inquires email info@teksyndicate.com
Social:
Twitter: / teksyndicate
Logan's Twitter: / logan_rtw
Facebook: / teksyndicate - Věda a technologie
In school, I was taught that the USA was founded on freedom. That is freedom even if it compromises safety. The famous quote ,"Give me liberty, or give me death" comes to mind. Personal, I would rather live in a free nation, than live in a safe one.
ZXcross Finaly, someone gets it!
+ZXcross Oxymoron: No one can live in a safe one. Some choke down the aspartame of safe life. I like sugar, real and bad for me. Duality of Man's alignment is His natural state, no different than organ function, to whit; regulation of one's own good/bad output denies the benefits of the exercise, creating an imbalance ideal for runaway excess, sans even the ability to recognize it and/or its warning signs. We cannot allow any authority to regulate freedom of choice, nor let slip the frightened ignorant of our own to piece it out to the blind, consistent pressure aimed at complete,fictional control by the self superior tendencies of enforcement offices, both tendencies and pressure being the norm of the job, " place adult human here". Duality, them, us. That's that real sugar taste of it. My right hand helps old ladies across streets, and rubs out a mighty fine one with precision like a loved Japanese engine. Sometimes, it even uses water and soap between (give or take) my old lady rubbing sessions! Fear is their most reliable ally. Rub ya'll some fuckin old ass ladies! Yes especially while being chased. Be assured: there is a gold nugget of understanding in that expedition that will serve you and society FAR better than another twist on the regulatory crank in the house. Or ya know, maybe not. Find out, fuck ANYONE who feels compelled to relieve us and ours of the choice. And now, a porn break. Love me them internets.
posts are for reading, less so writing, and it's pure rhetoric too.Proof NO version of the pull out method prevents someone getting the Jernkk. Gedggie out!
ZXcross bingo! Can't stand the whole nanny state phenomenon, like in ca or my.
That's just it. You are not as free as you think. A safe nation IS the ONLY free one.
underated comment
Can't believe this video is a decade old. Still looks as fresh as this year. And possibly is still relevant.
An interesting discussion about Tor and Freenet. I have to call out the obvious, though: The speaker doesn't seem to understand Tor to the extent that he claims, and after decrying Tor, in part, because of its speed, he touts Freenet above it while acknowledging its even slower speed. Both have their uses, but this video makes an error in an attempt to trash Tor. The central tenant used to decry Tor was that the exit node would know the origin's address.
This is not true, unless the exit node just happens to have all the encryption keys used along the entire route. The origin's address is encrypted by the first hop, so it is only known to the origin and the first hop. That encrypted data along with the first hop's address is then encrypted by the next hop, and so on and so forth. The exit node receives all this mess, plucking out the original data to pass along to the destination. Thus, the exit node can only determine three things: 1) the original data to transmit, 2) the address of the n-1 peer, and 3) the address of the destination. This is why TLS should be used even with Tor: to establish an encrypted channel end-to-end that prevents the exit node from obtaining the original payload in the clear.
The most likely weakness of Tor has nothing to do with Tor itself. Protocols can include origin addresses, users might not enforce end-to-end encryption, users might inadvertantly transmit revealing data, and plenty more. Tor itself is fine, The weaknesses are everything else, including (especially) the user.
if the exit node knew the address of the destination doesnt that blow my cover?
im just confused i know this comment is 5 years old but im still curious.
I thought that the exit node only knew one of the IP addresses either your or the website you want to visit and the beginning node knows the other
I've learned more about computers and networking from this channel than I have from my two year course in computing.
They created the internet. You jumped in. You gave you information willingly. You signed the agreement. To each digital license to take your personal information (like Facebook for example. ) at their will. Happy birthday
Well… private agencies collect data without the consent of users.
I love you guys. You are so awake and in tune with what's happening. It's awesome to see cool dudes spreading the word and looking after people who may not be as knowledgeable/bothered to learn.
You guyz earned a customer with this one. Gonna buy some gear to help the show and rep the Syndicate!
Excellent video. I was wondering if I should go with Tor or Freenet and this has made it very clear. Also Bob your hairstyle looks cool and the jacket helps.
Interesting content in this channel. I heard of Freenet some time ago, never tried it.
I'll keep watching your videos. Subscribed :)
Great video, explained from all angles like you said.
Great info on Tor and the freenet...tks.
I learn something new every time I watch your videos.
Really love your videos, keep them coming!
Very well done. Great video
I had to pause and just laugh off the horrible 'torrable' joke, well done done Logan
Congrats on 60 000!!!!
Excellent video, very informative.
Awesome thumbnail!
I vowed for posting a reminder in every video I watch by razethew0rld: You tend to say "objective" when you mean "subjective", Logan.
one of the finest episodes,,good way to start the year :)
Excellent channel!! keep it up
Are there any video hosting youtube replacements on freenet
You have a very good point.
I'm really glad that I subscribed too you. Love you guys. (:
Hey guys, GREAT video, very informative, as I am one of those guys that care about privacy. More of that, please :)
you can use google like normal, tor uses the interface of firefox, it just routes your traffic through a bunch of proxies.
11:25 - This comes down to the frog in the boiling water analogy; if you place a frog in a hot pan of boiling water it'll jump straight out - put the frog in a pan of cold water, heat the the water slowly till boiling and he frog will slowly die...
+PyroChimp75
This is actually incorrect.
The frogs in this experiments were lobotomised, basically had their brains physically scrambled and cut up.
Healthy frogs would still jump out when it gets hot, no matter how slowly you heat it up.
what about i2p?
i heard some things about that, is that any good?
Great video. I'm subscribing right now :D
can you run freenet on your phone to have like secure dropbox or something
FINALLY!!!!! Iv been looking for you ever since you left tiger direct!!! now i found you!!!!!YEAHHH
Thanks! im thinking of using the SE Green and Black!
on freenet can you visit sites such as youtube and would logging in to this site provide any information towards what you were on ?
i cant get onto the tor network, it says no open ports, but all ports are open
I have been waiting for this forever!
Is there a way to tap into certain circles of friends that are not yours on freenet? Or is it by invite only? Are their freenet chatrooms?
I totally agree Logan Please do a talk segment about Shodan.
I tried to use the 'tracert' and the widow opened but closed suddenly. Won't let me use it!
Please make more!! (I know you will but just a little extra encouragement)
Thanks!
i use too have tor and uise hide ip at the same time does it help?
Good job. FYI: I use a Raspberry Pi for all data. I also use cheap VPS Hosting ans SSH Tunnel & use PuTTY to host the connection letting me run all my traffic via the VPS. I have the video on TechMeShow if interested.
so what would you recommend? i think BT is the way to go for learning.
ok, if you get tor, can you then just use google as regular or do you have to go through tor?
Perfect timing for this vid man!
Does anyone know a usb loadable ubuntu OS that runs with TOR's network? The kind of thing he suggested to use in the video.
really great video. We need more people to see this. They should not touch our privacy. Mass have to show some resistance.
I second that. Tails is great for beginners, since it automatically firewalls all non-Tor traffic, i.e., no data leaks. More advanced users might enjoy Whonix. One good mental exercise while using Tor is to assume an anonymous alter-ego while using it, i.e., don't do anything personally identifiable, like checking bank accounts, etc.
is it possible to use network games over freenet?
Hey
How do I connect to the freenet
Some Government agencies can request passwords to encrypted data when seized. This is still a major issue with a a lot of encryption programs. There is a method which Truecrypt can use called "Hidden Volume" which allows you to have two different passwords for the one encrypted volume, the second of which reveals data which remains as random bits if the first password is used to decrypt the volume.
Good to see the 'Pun'isher is back with that TOR joke!
what do you use tor for? the silk road?
I have a vps that I use putty to SSH into and configured Firefox to just connect through localhost. Works quite well.
ok, can you just clear something up for me then? are the servers all the other places my data goes through? (im a noob when it comes to all this stuff)
but no cookies or history are recorded on my PC then
Hello thanks for the informative vido, it is nice to have a look in too how internet works. I am an freshman in college getting my computer engineer degree, i am active on your forms any suggestions on well anything relater to career wise thanks for your time.
good stuff guys, thanx! subscribed
Do you have any preference between the NZXT Phantom or Bitfenix Prodigy. I see both in the shot and was looking at both cases. Any suggestions?
depends on what site you visited.
Great video
My ISP throttles my connection every time I open my torrent program. Whats the best/quickest way to block their access to my traffic?
Logan, where is the link to the article on Brush Schnier?
What about using a VPN while on tor? What about using a VPN and mobile tor on IOS?
so if one were to torrent what would they use?
Just running an exit node does not give you the IP address of the people visiting web sites. The IP addresses are encrypted in layer.
What theme for chrome is used in the video?
You made an almost correct statement...however tracert does NOT show the COMPLETE route from origin to destination.
It's just like a marco-polo game where each hop node can only "polo" once, however some nodes en-route play coy and doesn't polo to your marco, hence those * returned in tracert.... and secondly as you stated routes are not constant they change... freenet, less secure... the more encrypted a package the more attention it draws... online = internet (privacy is a placebo)
Funny thing, me and my friends were talking about this just last night at our blanket fort slumber party haha.
Could someone link me to the article by Bruce Schneier that Logan mentioned?
Great Information Gents!!!!!
I love the coffee cup coaster! LOL
Why not just configure privoxy to use Tor, i2p, AND freenet? And don't the exit nodes only see the IP of the previoud node? I confus :\
It seems like the major issue being raised here is that some "evil" Tor exit nodes could be sniffing your traffic. As long as you can verify you are using H.T.T.P.S. or S.S.L., and that the connection is secure (e.g., click on the "lock" symbol next to the URL to verify the certificate chain), not only are you being anonymized, but your traffic is being encrypted in a way that prevents eavesdropping. The more you learn, the less you will fear.
The issue is that Tor will route TCP for you, thus anonymizing those packets, but does NOT route UDP, thus exposing your source IP to the rest of the world. Whenever you "Torify" an application, e.g., a torrent program, you first run Tor as a SOCKS5 proxy and then configure the application to use that proxy instead of your default route. UDP will not route through the Tor proxy. The entire purpose of Tor is to obfuscate your true source IP contained in the IPv4 packet header.
Thank you
What on here do you need in hd?
Interesting vid but what legitimate use for freenet is there though?? just privacy??
great info
Where's the link to Bruce Scheier's paper they said they would link to?
Just wondering, what graphics card is it that you use as your coaster?
What about the new Pirates DL Browser Promoted by "The Pirates Bay" Which i think uses TOR I have read about?
Nice video but what about I2P? Would be great if you'd cover it too.
Is there a mobile version of freenet?
better password, better encryption. what algorithm do you use?
If my Freenet circle of friends included yellow cake chefs I wouldn't need to go online to search for more information on the subject. The onion exit nodes read our envelopes to include who we are and the final destination of our request, is that information just IP to IP? I guess from there a 3 letter agency likely matches that info to the host server log files to figure out everything that was presumed private?
You guys are making great vids keep it up :D
7:29 - 7:32 what does he mean by "once you get freenet you can't go back to regular internet like on Tor" ??
wooohoo, been waiting for this one!
What about PhsiPhon? I actually only use it at school to get past their block on Tumblr but I'm also curious as to how it works differently than TOR. Somebody told me that it actually creates a vpn and somehow sends stuff to itself before sending it away although I'm not exactly sure how it really works.
Yeah man, I've only subscribed to a 4 or 5 things on youtube since 2006, This is one of them.
@Dietcamstudios yes.
nice cup holder ive always wondered what card it war
Logan what about Peerblock? good, bad, does it do anything?
the only issue i would have is weight the phantom(11-12 kg) is 30% heavier +- than the prodigy(7-8 kg) in bare weight. Guess it depends on how mobile you want to be... i've had both, i preferred the phantom easier component access and just like the design. currently use Antec mini P180 ...
Do you know what a wind talker is?
Is there any purpose/harm in using VPN while using TOR????
Where is the last episode?
fancy recommending an alternate to itunes?
Just a question, but with this explanation would it be safe to assume that using Tor is a good solution from remaining anonymous for anything outside of the US government? If we're not breaking the law but still want to remain anonymous, Tor would still be a solid solution, right?
yes is different bacause vpn change your entire connection not only in the browser also in p2p connections and vpn is not a program is a remote server so is more secure than tor because tor need a browser a especific 1 firefox in vpn you can use any browser and still secure
Worth watching for the tor-rible joke alone.
What video card are you using for a coaster? o.O