1 00:00:00,570 --> 00:00:06,180 Somebody and this video, we are just going to get a brief summary of what we learned in this angles, 2 00:00:06,540 --> 00:00:07,650 so let's get started. 3 00:00:08,250 --> 00:00:10,370 So what did we actually learn in this course? 4 00:00:10,380 --> 00:00:12,550 First of all, we learned about the deep, dark web. 5 00:00:13,140 --> 00:00:16,200 What is it and why is it hidden in this lecture? 6 00:00:16,230 --> 00:00:20,580 We are going to discuss the point deeply, but just the topics we learned. 7 00:00:22,560 --> 00:00:28,380 We learned the gender difference between both of their content and browsers, we used to access them 8 00:00:29,100 --> 00:00:34,320 dobros to discuss about that or about that, as you know, it is used to access the deep, dark web. 9 00:00:34,980 --> 00:00:39,120 We also discussed about the anonymity factor, which keeps broadening and in demand. 10 00:00:39,690 --> 00:00:44,520 We also discussed about the security measures to be taken care of before accessing the deep dark web 11 00:00:45,270 --> 00:00:51,750 and installing dialectal block gene technology, etc. is the way through which Tor browser as well as 12 00:00:51,750 --> 00:00:53,300 the Bitcoin transfer takes place. 13 00:00:54,250 --> 00:00:57,570 Anonymity, of course, was discussed about it a lot in the schools. 14 00:00:58,050 --> 00:01:01,680 It actually protects identity as well as the privacy of a user. 15 00:01:02,680 --> 00:01:08,290 Well, something on the Internet cryptocurrency, cryptocurrency is our digital currency, which can 16 00:01:08,290 --> 00:01:11,380 be used for trading or even purchasing on the Web. 17 00:01:12,160 --> 00:01:12,970 I have some scope. 18 00:01:13,210 --> 00:01:19,120 Well, there are many types of cryptocurrency and they are famous because of their high volatility in 19 00:01:19,120 --> 00:01:19,770 the prices. 20 00:01:20,410 --> 00:01:26,230 Those are discussed about mining of Bitcoin for free and trading them for profit, solving the dotcom 21 00:01:26,240 --> 00:01:29,620 bubble that it was that was a fun element of our cause. 22 00:01:30,070 --> 00:01:37,320 We roamed in the dark, but I was visiting some interesting websites and had some fun binges and their 23 00:01:37,330 --> 00:01:40,030 prevention from a safety valve aspect. 24 00:01:40,540 --> 00:01:42,550 This was the most important part of all. 25 00:01:42,550 --> 00:01:48,250 Of course, we discussed about the trades, which can be fixed while solving the deep dark web, as 26 00:01:48,250 --> 00:01:51,850 well as the security measures that should be taken care of while solving. 27 00:01:52,810 --> 00:01:57,040 First of all, congratulations, you completed this course. 28 00:01:57,220 --> 00:01:58,900 This was a great journey with you. 29 00:01:59,470 --> 00:02:00,460 Hope to see you soon. 30 00:02:00,460 --> 00:02:07,380 In any articles, please do provide a feedback, maybe negative or positive, but please guys do provided 31 00:02:07,810 --> 00:02:11,010 it helps us to make this course even better for you guys. 32 00:02:11,380 --> 00:02:12,540 That's it for this lecture. 33 00:02:12,550 --> 00:02:15,400 Actually, this was or is my first post. 34 00:02:15,790 --> 00:02:19,060 So thank you very much for showing this newbie so much love. 35 00:02:19,480 --> 00:02:21,870 I and our team will always be thankful for you. 36 00:02:21,880 --> 00:02:23,800 Thank you very, very, very much. 37 00:02:24,220 --> 00:02:25,960 Goodbye and see you soon.