5:54 how to use Tor 7:34 Tor Browsing vs Tor Routing 9:21 The alternative to Tor: Lokinet 13:13 Oxen Nodes 14:00 Darknet vs Darkweb 15:37 Vpn when you download Tor! 16:22 Tor Browser does not offers sufficient protection 18:45 Other Darknet solutions
I have a different idea. Internet was very entertaining in the year 2000, but since then it became boring. So you will not see me wasting as much time as I used to online. I went for tabletop for entertainment and it is absolutely a blast. I prefer to talk to people face to face instead of using social media.
Exactly...the net was good but now is populated by "social media" types...a big difference from the early days where you needed to type commands to to even log on.those days were much better,the only downside was the sloooow speeds. Once the general population got the internet it was always going to become crap...my first account was in 1994 and much prefer that to what we have now and am slowly decoupling myself from the net.
Bravo ROB. one of your complete & comprehensive coverages in Top privacy and security platforms. Your ability to clarify and simplify concepts into pro active uses are spot on. You continue to include an educational theme to your presentations, My observations come from a tool belt of multi 3 letter influences.. kudos & bravo. continued success. Achilles.
Rob. Shortly, we (in the UK and the rest of the world) will be forced to have a "digital ID" to access the internet, presumably enforced at the IP level, thereby not even being able to log on to a VPN ..... Any ideas on how to circumnavigate this to access the internet?
Yep the UK psychopath government have been pushing to do this for years since David pigfkker Cameron got up on stage at the UN and said we will not tolerate these conspiracies about 911 and 77 hahaha they were so annoyed that everyone was calling out their contrived events and exposing them left right and centre they had to memory hole thousands of videos and wipe out so many legit commentators on this platform . Unreal.
Build your own browser that removes that part of the PDU, and it's checksum flag? Just spitballing an idea. Malform the packet or attack the fuzz surface vector?
"In the marvel comics" They are both (Thor and Loki) central characters of norse mythology. It's like saying "Amaterasu from the Naruto Manga". No hard feelings, I don't "demand" you knowing about some obscure stuff like that, just for future reference. Loki's specialty being his "silver tongue" it seems quite an apt name for an encrypted protocol. He's a bit of an ambivalent character, using his lies and half truths to the benefit of "the good" many times, but also for "evil" purposes. Which is probably why they chose him as a villain in the Marvel comics. In the end he ends up being tortured for eternity, since he bangs all the other gods wifes, which he got into bed with his trickery - and then brags about it, which is his undoing... At least according to some stories, norse mythology having some basis in oral tradition does not have a 100% clear canon.
I thought the same. But you can't expect from non-europeans to know norse or germanic mythology. I know nothing about african or southamerican Mythology.
First of all Rob, Thanks a lot for the awesome content you provide. Have you also covered messengers like Matrix (element) and Briar? What are your thoughts on them regarding privacy and anonymity?
@Rob Braxman . Hi. Please Answer these. 1. If you have vpn on, will using regular email show your IP address on the header? I’ve never noticed an IP address on emails. 2. since BytzVPN uses Tor with Brax Router, how much does this slow down your internet service? 3. Since sessions messaging uses lokinet is it a secure messaging app? 4. messaging is only secure e-to e via linux to linux or OS to OS. So what do you suggest with either linux or degoogled android for secure messaging? Is this the same scenerio for voice calls? Can you have a non recorded phone call with degoogled android or linux?
A computer security acquaintance told me to stay clear of the dark web. I can say one thing positive about that. People on the dark web showed me how to write code to protect my software, then someone made it illegal to use. All it did was protect the code layer from view or copying. When you remove my disc, normal operation of the computer is returned. I don't use it anymore. To whoever it was that helped me, thank you. I don't know your real name (I wouldn't say it anyway).
the dark web free uncensored and nothing is out of bounds, it supposedly has illegal stuff, but what walk of life can not turn into something illegal, with a bit of effete it what you use it for, not what it is, that matters, when out cries, to ban it, happen, that being up some thing, drugs gun or something like that, but there not exclusive to the dark web, they where happen long before the dark web, and the word "dark web" put around, but what is the dark web, it the bits of the internet that are not catalogued by big search engines, your own home internet could be described as part of the dark web, now have a new look at banning the dark web, are happy to have your home internet fully searched and indexed, that every thing that has storage, and is on your home network at some point just take one stage on, and have all your round the home web cam, security cameras and microphones to, all being search and caterloged 24/7 every day for who no's what use?
Can I learn to be content running TOR in Tails as my default browser? Seen the video twice now. Seems helpful to me, needing to wake up to so much. It's like I've been asleep.
All I want to know right now, this very hour, is how to get rid of the VPN and security I've now paid for (it automatically renews which I don't seem to be able to stop) and get what you offer or recommend. I don't believe there's any way for the USA to continue as is for 24 more months.
Rob please can you suggest some books to study all these topics about privacy? I watch all your videos but I feel like my memory doesn’t keep informations learned by videos, I need book of paper. Please write a book🙏🏻🙏🏻🙏🏻🙏🏻
The Privacy, security and OSint shows host has a comprehensive book called extreme privacy. The podcast is linked to the Darknet diaries series. Both excellent series. Rob should definately write a book if he has the time.
One hint for increased understanding is to turn on the closed captioning. This way if you see a word you don't understand you can look it up. I stop the video and look up words I don't understand. Going past words you don't understand can put a "blank" in your mind. I'd love to get Rob's recommendation on a computer dictionary.
@@michaela2098 The best book is the careful notes you take while watching his video. Don't understand a concept or term, pause the video and look it up.
Hello, I've enjoyed learning some of your knowledge but my phone is continuing to be targeted with the inability to share vital information. So I'm considering your brax phone, the best performing for the US. Paper information to operate it, as well as anywhere I can go to learn far more in this direction. We need to be prepared for an information war like we've never imagined before. So where do I get your phone, ( untraceable, black ops version and a price) thank you for your tireless work
Rob. Is there a reasonable option to the internet ? Here in Canada, the government has given its self the right to censor and control what can be put up online as well as what can be obtained on line. Is there other systems in the world not public yet ? Help. Thanks
Another nice video. What is your input on IPFS, the Mega network for file sharing, torrenting, and blockchain based social media like Bastyon. I do wish you got into more specific (technical) details on these other darknet serviecs that are less known: I2P, freenet, etc. Tor is much more commonly known already... many videos online about it... it doesnt really need another. Its these other ones that are hard to find any information on. As for lokinet, I heard about them a couple years ago but when I looked them up their sites and services were down... for a long time. I thought they were taken out by gov, or werent self-sustainable. But... Im surprised to hear you taking about them now in 2023. I guess they're still a thing.
I am not a hacker of sorts or any kind of suspicious person, but I like to be private in the open web world so I use Tor from inside Brave. It fair to assume that I am left private or is someone able to see me?
It will require a lot of dedication to see track your TCP data, but your UDP data is not sent over Tor. It's something to be aware of, although the Tor Browser keeps track of that, of course.
Hi Rob. This is not related to the above video, but I noticed something concerning after acquiring a used phone to install LineageOS on. Basically, without inserting a SIM card, I was trying to use my phone's built in GPS to ping my location on OsManD, but no matter how many times I tried it was not able to get my location. However, after popping in a SIM card... you guessed it. It finally started receiving my location only after inserting the SIM. My question is: shouldn't my phone's built in GPS be enough to get my location? Why does the SIM card have to be involved at all? And is this a cause for concern in terms of privacy and surveillance by my phone plans service provider? Thanks.
estimated guess: usually, the gps module and the mobile networking chips reside on a single "node" (e.g. PCIe card), and it might be the case that your model or firmware doesn't support turning off just a part of it or initializing a partially. or alternatively, it is turned off in hardware by disconnecting the node if no SIM card is inserted.
Rob - as a community watch target, is there a way to fight this? Should I even bother? I inherited this from my dad's side of the family. Problem is, I live with others who have no interest in keeping our internet safe. So should I even bother? Once a target, I'm assuming it's impossible to escape these police agencies. They are ruthless.
Our govt is trying to pass a bill outlawing encryption for the people! I, like many have been told....the down side to the TOR concept is that, should your system be seized, you are liable for the content of all msg passing through (i.e the content of that data)??
videolarda dil yazı sorunu.cansız videolarda chromede kısmi ücretsiz olarak altyazı ve sesli okuma çözüm bulsakda oda berbat canlı yayınlarda çözüm bulamıyoruz.otomatik altyazı çeviri bile kapatılıyor.altyazılar çok hızlı takip edemiyoruz.dil ilk önce kelime kelime öğrenmeli sonra cümle ve dilbilgisi.malesef bizim dilde rakam ve harflerde benzerlik var.0,0,9,g,ğ,h vb ayrıca p,b,t,d gbi ayrımı bitişikmi yazılır çözemedik.ayrıca bel altı da çoğunlukda.örnek seksen,amca,sigorta eksik gibi.argo da var.q ve w da yok. dilimiz güzelde berbat ettiler yabancı kelimelerde doldu..
Rob, is there a way to delete all of my text messages, in Google messenger, at once? I have a moto e 5 Android. Are those messages taking up space on my phone?
The point is that deleting data from your filesystem never deletes data from your storage device. It will eventually be overwritten when something needs to do so, but that could take decades if you have a large storage device. A filesystem is just a map; if you delete a cabin from a map, it does not mean the cabin no longer exists in the landscape. Deleting files is the same. Once data is deleted, it does not "take up space", because it can be overwritten at any time. But just because it _can_ be overwritten, does not mean that it will be.
anlattıklarınızın ne olduğunuda anlamadık hala tor,p2p,hyphanet nedir ne işe yarar anlamadım.hyphanet kurdum açtım bir yazı ve frefoxumu gizli aramaya aldı fakat bi özellik getirmedi kaldırdım.
Hi, do you think would be possible to have a main os linux and a "router" wth tor&vpn in vm with openwrt or whonix? Meaning tht the main has internet onlyvthrough vm virtual router?
What servers do u use for your VPN?? Like is it decentralized? Or u run your own servers?, Thanks for your time , definitely thing about getting your VPN! Plz help
16:48 _"Tails and Whonix"_ How about _Parrot OS?_ Not that complicated like Whonix, but made for installation. It comes with *_Anon Surf_* to torify all the traffic. What do you think about? Or do you even have checked it out?
I only use Tails and Whonix as examples. You can load TOR on any Linux distro if you know how. You can also load Lokinet instead which is what I use on my own Linux computer
@@robbraxmantech How to load _"Anonsurf"_ to my linux mint I don't know. That's why I think about using Parrot, because it's coming by default with _"Anonsurf"._ And I am interested to know, how do you think about the tiny _"Anonsurf"_ in comparison to Whonix regarding practicability, RAM-consumption etc.?
@Rob: From lokinetorg I downloaded, then installed it on windows with VPN. It seems interesting. But a red ring surrounds the on/off-button and traffic still doesn't count. It doesn't show anything right of "Uptime:", "Version:" and "Lokinet-address.". How to get it online? Can you explain it to me, please?
@@onemoremisfit you should learn about something before trying to teach others. he was not caught because of vulnerabilities in Tor. he was caught because he did not use proper operational security. in other words, he slipped up and leaked information. Tor did not leak it.
@@quickmythril2398 I did not say anything about Tor specifically and spare me the pious admonitions, because I'm not trying to teach anybody. I expressed my personal doubt about the idea of absolutely secure anonymity, and all I know is what I said: the silk road guy got busted.
@@onemoremisfit if you are talking about silk road, you are talking about tor. but clearly you are showing you have no idea what you are talking about at all. not sure why anyone would seek or value your opinion on anonymity in that case.
It's pretty clear why. You are probably best off just using the fort VeraCrypt these days. They did a security audit and fixed bugs that were present in the last version of TrueCrypt
I can only wish I had the knowledge and experience you have. Then I would feel safe and unchained. I can't even recover an important video someone downloaded on RU-vid that was saved to my watchlist for future reference. I had five videos, politically contented, that was deleted by RU-vid.
@Jo-Erlend Schinstad Thanks for the advice. My learning has been with research and reference. When one has to weed through the bs and what's accurate, it's like a lost cause. Hindsight, I should have enrolled in computer programming. I was too gullible to see what we would face today. Feels like my last hope is to bug out and go off grid completely. Being self-sufficient in what God provided was the survival of my elders. Unfortunately, that big eye in the sky through technology advancements would probably find me laid to rest, clutching my firearm.
@@sambraswell8388: There are very good technical communities where people care deeply about facts. If you want to learn, it's not that difficult. But general social media, where everyone has an incentive to pretend to be experts, is a bad place to learn. But just some basics will get you a very long way.
@@jeschinstad I suspect a lot of ppl watch these types of vids for exactly that reason. The problem is unless one has some baseline then how are ppl to know what's true & what's false.
Stuff Marvel comics. Loki and Thor are older than Christianity by a long way! It's a bit like saying you can only find the real Jesus in the Freak brothers comics
The ONLY solution is being in a network where webpages are downloaded to you randomly throughout your day. We must become willing participants in random downloads on our computers as a condition of participation. Each request we make must be just that, a request we may or may not be served. Each request must be delayed to be accompanied by random requests NOT explicitly made.
I'm fairly sure I got on someone's list for doing that! It was a Firefox add-on that 'clicked' on *every single link* on the page you were reading. In the background it would download the document at the URL and discarded it, but it would stop early if you clicked on a new link. It was used to mess up advert tracking more than visiting dodgy sites. Unfortunately I think it might have swept up a few Al Quaida (or however it's spelt) links. 🙂 I'm not a baddie! I'm really very boring! Google web analytics told me my website (for my son's kindergarten in Australia) was being read by the folks at Fort Meade. 🙄
Bit Caesars senate though.. Or nuclear epstein... Everyone sharing in guilt just means open season autogenda magic Martial law another more surgical way That's when it matters that as a surveyor George Washington kept his eye on a plot he saw and wanted then eventually obtained by multi tasking the area into the territory they came to need to occupy and secure strategically.
@@JJFX- This is another way of taking away privacy of individuals. A dossier has been flagged for everyone. This is called 'tracking' and is dangerous and deadly.
@@manonfire3642 RU-vid already tracked every thing you do on the platform. This is just another vague attempt to help people identify all the bots they still aren't going to ban.
Now if you were able to impplement something that would allow me to access my local machines over the internet safely, now that is something i would be willing to pay for.
You can use Wireguard for that. Unlike Tor, it works with all traffic and is quite simple to use. Unlike these VPN services you buy, it's just software that you install on your PC and acts like an extra network card, with its own sets of IPs.
@@fokyewtoob8835: Yes. These days, I'd rather recommend Wireguard for that type of use and instead use SSH on top. The benefit of Wireguard is that it doesn't depend on static addresses; as long as one of the nodes are reachable over its previous IP, peers will automatically learn how to connect.
@@linsqopiring6816: The issue is latency, not bandwidth. At some point, while you _can_ stream over header-stripping overlay networks, you will prefer to just download in advance. And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it. Non-streaming codecs are far more efficient, making it far more appealing.
@@jeschinstad Latency is a non issue for streaming videos since video players already buffer a certain amount. The video player IS actually downloading in it advance. "And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it." Can you rephrase that ?
@@linsqopiring6816: Buffering is a smaller issue for shorter videos because the buffering takes place before the video. For longer videos, you get lots of breaks when you run out of buffer, which you invariably will because latency quickly adds up, as Grace Hopper so eloquently illustrated. For ads, if you pay for visitors on my site, you need to know that those visitors are actually unique, because otherwise, I could just inflate my numbers to make you pay more or just invent visitors. With Tor, you can't prove unique visitors, hence advertisements are useless.
WHAT WE DO WHIT ANTIVIRUS APP . OR HOW I NAME IT I DONT KNOW THEY ARE REALY BOURING THEY COME TO MY COPPUTER WHIT OUT I ASK FOR THEM WHAT WE CAN DO TO STOP THIS ANTI VIRUS PROGRAMS** i realy dont know nothing about this ? is this programs good or not . i dont have nothing to hide , but if its posibile to somebody block my PC if i dont have this programs ??
Works great for normal privacy, but any government or APT will own you pretty quickly unless you use human shields. But if you're a Pablo Escobar or something, you can definitely do it, for instance live migrating LXD servers running Wireguard.
@@jeschinstad I'm not superbly tech-head or know the ins and out of computer networking, coding, or hardware. But have you heard of Deeper Network devices? *edit: just curious about your opinion on the company's tech.
@@couchpotatter: No, I hadn't heard about that, but on their website, they make this claim: «Comes fully loaded with the world’s first and only decentralized VPN»
There's only two. Pinephone and Librem. Most phones have their radio permanently switched on and can easily be owned remotely. With new phones, the radio is in the SoC, making it theoretically impossible to make them safe.
@@robbraxmantech: This distinction does not exist. Tor Browser is simply a browser that uses Tor for its traffic, along with some other things like tracking leaks.