1 00:00:00,000 --> 00:00:07,000 So in this section, I'm going to show you a better method to improve our anonymity and privacy and 2 00:00:07,000 --> 00:00:08,000 to access the Darknet. 3 00:00:09,000 --> 00:00:15,000 We're going to use an operating system designed to protect our anonymity and privacy. 4 00:00:15,000 --> 00:00:17,000 You probably already heard of this. 5 00:00:18,000 --> 00:00:25,000 It's called Thales, and it stands for the incognito, amnesic live operating system. 6 00:00:25,000 --> 00:00:28,000 It's a Linux based operating system. 7 00:00:28,000 --> 00:00:37,000 And what they mean by life is that you install it on a USB stick or on a DVD, and then you can start 8 00:00:37,000 --> 00:00:37,000 it. 9 00:00:37,000 --> 00:00:44,000 You can boot it in any computer you want, regardless of what operating system installed on that computer. 10 00:00:44,000 --> 00:00:51,000 So it doesn't matter if that computer runs Windows, Linux OS X, all you need is your USB stick with 11 00:00:51,000 --> 00:00:57,000 tails on it, you stick it in, you boot from it, and you can use tails from there. 12 00:00:58,000 --> 00:01:06,000 The really cool thing about tails, which is where the Incognito comes from, is the fact that all traffic 13 00:01:06,000 --> 00:01:09,000 sent from it will go through the Tor network. 14 00:01:09,000 --> 00:01:13,000 So not only browsing traffic, not only messaging traffic. 15 00:01:13,000 --> 00:01:22,000 Anything you do on that system or any program you even install on that system will have to use the Tor 16 00:01:22,000 --> 00:01:24,000 network for its traffic. 17 00:01:24,000 --> 00:01:29,000 Therefore, it eliminates the fear or the risks of other programs. 18 00:01:29,000 --> 00:01:37,000 Leaking data tells also never touches the storage of your computer other than the RAM, so it completely 19 00:01:37,000 --> 00:01:43,000 runs using the RAM, which gets cleared once you restart or shut down your computer. 20 00:01:43,000 --> 00:01:48,000 Therefore it leaves no traces on the used computer. 21 00:01:48,000 --> 00:01:51,000 And this is where the word amnesic comes from. 22 00:01:51,000 --> 00:01:58,000 This means that you can use any computer to use tales, and once done, there will be no traces of what 23 00:01:58,000 --> 00:02:01,000 you did on that computer. 24 00:02:01,000 --> 00:02:07,000 So let's say, for argument's sake, you use Thales, which already routes all traffic through the Tor 25 00:02:07,000 --> 00:02:13,000 network, but somehow someone managed to identify where you are and anonymize you. 26 00:02:13,000 --> 00:02:19,000 And they come and they use your computer and they inspect that computer to see what you did on it. 27 00:02:19,000 --> 00:02:25,000 If you turn off that computer, there will be no traces of what you did on that computer. 28 00:02:25,000 --> 00:02:31,000 Not only that, but there will even be no traces of Thales on that computer. 29 00:02:31,000 --> 00:02:36,000 So it will seem as if you did not even run Thales on that computer. 30 00:02:36,000 --> 00:02:41,000 So that's why Thales is really, really cool, because first of all, it's live. 31 00:02:41,000 --> 00:02:47,000 Once we have it installed on a USB stick or on a DVD, we can use it from any computer we want. 32 00:02:47,000 --> 00:02:54,000 Second, it's incognito, so all traffic sent from Thales will always go through the Tor network. 33 00:02:55,000 --> 00:02:57,000 Second, it's incognito, it's private. 34 00:02:57,000 --> 00:03:05,000 So anything we do on a thales system using any program will always go through the Tor network. 35 00:03:05,000 --> 00:03:08,000 And finally it leaves no traces. 36 00:03:08,000 --> 00:03:14,000 So once we turn off that computer, if the computer gets inspected, there will be no traces of what 37 00:03:14,000 --> 00:03:15,000 we did. 38 00:03:15,000 --> 00:03:20,000 And they will even be no traces that tells us even used on that computer. 39 00:03:21,000 --> 00:03:27,000 So throughout this section, we're going to learn how to properly configure tables, install it and 40 00:03:27,000 --> 00:03:33,000 use it to access websites privately and anonymously, and access the darknet.