1 00:00:00,660 --> 00:00:06,510 Previously we learned how to install and use data or browser and in the previous lecture I showed you 2 00:00:06,510 --> 00:00:08,580 how to use it with tails. 3 00:00:08,580 --> 00:00:14,520 Now this will be the browser that will use most of the time to protect our anonymity and privacy and 4 00:00:14,520 --> 00:00:19,070 to access the hidden services or the darknet web. 5 00:00:19,140 --> 00:00:25,380 In this lecture though I want to show you another browser that comes with tails which is the insecure 6 00:00:25,500 --> 00:00:28,380 or unsafe browser. 7 00:00:28,490 --> 00:00:33,490 Now you might think why would they want to use an insecure or unsafe browser. 8 00:00:33,510 --> 00:00:41,280 See as we mentioned before unlike install and deter browser on other operating systems such as Windows 9 00:00:41,300 --> 00:00:48,200 OS X or Linux where only traffic going through the Tor browser will go through the Tor network and all 10 00:00:48,230 --> 00:00:53,170 other traffic will literally go directly to the Internet on tails. 11 00:00:53,240 --> 00:00:57,500 All traffic is forced to go through the Tor network. 12 00:00:57,500 --> 00:01:04,610 So regardless of what application generates this traffic even if it's a system update even if it's some 13 00:01:04,610 --> 00:01:12,380 malware that got downloaded and got executed on your system it will always be forced to go through the 14 00:01:12,380 --> 00:01:13,500 Tor network. 15 00:01:13,610 --> 00:01:17,010 Now like we said this is great because it prevents leaks. 16 00:01:17,120 --> 00:01:23,480 It improves our security and anonymity because no other programs can access the Internet directly. 17 00:01:23,480 --> 00:01:28,660 Therefore all of our connections are always going through to our network. 18 00:01:28,880 --> 00:01:33,220 So this is really really good and an amazing feature of tales. 19 00:01:33,230 --> 00:01:41,000 The only problem is sometimes you actually need to access the Internet directly or you need a browser 20 00:01:41,180 --> 00:01:44,090 that will not use data or network. 21 00:01:44,090 --> 00:01:50,750 For example if you're trying to connect to a captive portal what I mean by a captive foretell is a network 22 00:01:50,870 --> 00:01:57,500 similar to the networks you see in airports universities or coffee shops where once you connect you 23 00:01:57,500 --> 00:02:00,160 have to log in or you have to authenticate. 24 00:02:00,230 --> 00:02:04,460 Now usually the authentication is done using a web browser. 25 00:02:04,460 --> 00:02:11,240 Any web browser will work but the Tor browser will not work because as we know Tor browser will arrived 26 00:02:11,270 --> 00:02:19,750 traffic through the Tor network and therefore you want be able to authenticate with the local network. 27 00:02:19,750 --> 00:02:25,810 Now if you were running the Tor browser from a normal operating system like Linux Windows or OS X the 28 00:02:25,810 --> 00:02:27,380 solution to this is easy. 29 00:02:27,460 --> 00:02:33,340 You just go to one of your other browsers and like I said these will be access and the Internet directly. 30 00:02:33,340 --> 00:02:35,170 So that will be fine. 31 00:02:35,170 --> 00:02:41,030 The problem is as we mentioned Intel's everything is forced to go through the Tor network. 32 00:02:41,050 --> 00:02:46,510 So even if you had another web browser it will be forced to go through the Tor network and therefore 33 00:02:46,600 --> 00:02:50,350 you still won't be able to authenticate with these networks. 34 00:02:50,350 --> 00:02:57,550 Therefore for this reason and for any other cases where you would actually need to access the Internet 35 00:02:57,550 --> 00:03:01,410 directly tells comes with another web browser. 36 00:03:01,510 --> 00:03:09,100 It's actually called the unsafe browser because this is the only application on the operating system 37 00:03:09,340 --> 00:03:18,000 that can make direct connection to the Internet outside of the Tor network so you want to be very very 38 00:03:18,000 --> 00:03:23,400 careful when you're using this and you want to make sure that you know what you're doing because it 39 00:03:23,400 --> 00:03:25,070 is not using detailed network. 40 00:03:25,260 --> 00:03:31,680 It's going to be accessing the Internet directly revealing your location your IP and so on. 41 00:03:32,980 --> 00:03:42,490 So right here unpack a tails and if I go to my Wi-Fi networks and look for a Wi-Fi network you can see 42 00:03:42,490 --> 00:03:45,590 that there is a Starbucks Wi-Fi around me. 43 00:03:45,640 --> 00:03:51,680 So this is a coffee shop network and this is an example of a network that uses a captive portal. 44 00:03:51,760 --> 00:03:58,810 Like I said these networks are commonly used in coffee shops colleges hotels or airports. 45 00:03:59,020 --> 00:04:00,960 So it's all the same scenario. 46 00:04:01,060 --> 00:04:04,260 Once you connect so I'm going to click on it and connect. 47 00:04:04,570 --> 00:04:10,900 You'll see that I will be able to connect to the network but I won't have internet access. 48 00:04:12,130 --> 00:04:16,920 So if I go up here you can see that I am connected to the network. 49 00:04:17,140 --> 00:04:21,780 But as you can see the tour icon right here still has an X beside it. 50 00:04:21,790 --> 00:04:28,900 So I'm not able to connect to the tower network and even if I go and run my Tor Browser As you can see 51 00:04:28,900 --> 00:04:32,210 it's telling me that the Tor network is not ready yet. 52 00:04:32,320 --> 00:04:36,030 So the browser will probably not be able to access the Internet. 53 00:04:36,550 --> 00:04:39,250 And even if you wait for this it's not going to connect. 54 00:04:39,580 --> 00:04:41,910 So I'm going to click on start anyway. 55 00:04:46,360 --> 00:04:50,920 And as you can see nothing will load will be stuck at the welcome page. 56 00:04:50,920 --> 00:04:56,920 And even if you try to go to any Web site it's not going to load because the captive portal needs you 57 00:04:56,920 --> 00:04:58,780 to first authenticate with it. 58 00:04:58,780 --> 00:05:05,890 So this network is configured in a way that the users have to authenticate using a web interface first 59 00:05:07,000 --> 00:05:11,640 see usually on normal operating systems when you launch your browser. 60 00:05:11,830 --> 00:05:19,390 You'll see the authentication web interface the authentication page by default but because Thales is 61 00:05:19,450 --> 00:05:26,470 configured so that it routes all traffic through the network the web interface or the authentication 62 00:05:26,470 --> 00:05:29,200 page is inaccessible to us. 63 00:05:29,950 --> 00:05:36,820 Therefore the only way around this is to go ahead and use the insecure browser which accesses the Internet 64 00:05:36,850 --> 00:05:46,500 directly to do this we're going to go to applications Internet and we're going to click on the unsafe 65 00:05:46,500 --> 00:05:47,730 browser. 66 00:05:47,870 --> 00:05:51,660 It's going to show us a warning telling us that this will access the Internet directly. 67 00:05:51,660 --> 00:05:53,170 You will not be anonymous. 68 00:05:53,220 --> 00:05:54,270 So be careful. 69 00:05:54,450 --> 00:05:56,250 I've explained all this to you. 70 00:05:56,250 --> 00:06:04,060 So we're going to click on launch and as you can see we get another web browser with a big warning again 71 00:06:04,120 --> 00:06:06,590 about the implications of using this browser. 72 00:06:06,880 --> 00:06:09,450 But we know what we're doing so that's fine. 73 00:06:09,490 --> 00:06:16,120 And now you can use this browser similar to the way that you use any web browser on any other operating 74 00:06:16,120 --> 00:06:23,570 system that does not force traffic through the Tor network so you probably already connected such networks 75 00:06:23,600 --> 00:06:25,250 in hotels or airports. 76 00:06:25,250 --> 00:06:30,970 Once you connect to it you open your web browser and you can go to any Web site you want. 77 00:06:31,070 --> 00:06:33,830 For example I'm going to go to Dr. Cole dot com 78 00:06:37,890 --> 00:06:44,880 and as you can see the Web site that I want will not load but I will get the page for the captive portal. 79 00:06:44,970 --> 00:06:47,970 Now some captive portals will ask you for a name and e-mail. 80 00:06:47,970 --> 00:06:49,790 They might ask for your phone number. 81 00:06:49,950 --> 00:06:52,110 You can fill this with any information you want. 82 00:06:52,110 --> 00:06:54,450 You don't have to give valid information. 83 00:06:54,540 --> 00:06:57,410 And once you do this you can click on Connect. 84 00:06:57,480 --> 00:07:01,080 In my case I can just connect without filling any information. 85 00:07:01,230 --> 00:07:04,790 And as you can see I'll get redirected to the Starbucks Web site. 86 00:07:04,830 --> 00:07:09,700 So I got authenticated with the network with the capped portal now. 87 00:07:09,780 --> 00:07:15,030 So now tails should be able to establish a connection with the terror network and the terror browser 88 00:07:15,030 --> 00:07:22,340 should work for us as well and perfect as you can see we get a notification telling us now we can access 89 00:07:22,340 --> 00:07:23,900 the Internet on detail. 90 00:07:23,920 --> 00:07:24,290 Right. 91 00:07:24,290 --> 00:07:26,300 The X has disappeared. 92 00:07:26,300 --> 00:07:33,650 So if I go to check the Tor Project dot org as you can see we get a nice message telling us that we 93 00:07:33,650 --> 00:07:40,630 are connected properly to the TOR network our IP is changed and everything is working as expected. 94 00:07:40,640 --> 00:07:43,670 So now we don't need the unsafe browser anymore. 95 00:07:43,700 --> 00:07:48,680 We can close it because we have authenticated with the target network properly. 96 00:07:48,860 --> 00:07:54,830 And the network is going to allow us to access the Internet and then Thales is going to force all traffic 97 00:07:54,830 --> 00:08:00,530 through the Tor network which is exactly what we want which will improve our privacy and anonymity.