TOR Hidden Services - Computerphile

  Рет қаралды 1,266,827

Computerphile

Computerphile

7 жыл бұрын

The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
Onion Routing: • How TOR Works- Compute...
The Perfect Code: • The Perfect Code - Com...
Max's Deep Web Video : • Web vs Internet (Deep ...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Пікірлер: 737
@EddyGurge
@EddyGurge 7 жыл бұрын
The thing I like about this guy is that I get it, and it all makes sense in one pass. He's got a gift.
@minimoto2883
@minimoto2883 5 жыл бұрын
It's because he's English hehe
@meeluangkhot7086
@meeluangkhot7086 3 жыл бұрын
@@minimoto2883 ห
@meeluangkhot7086
@meeluangkhot7086 3 жыл бұрын
หนังเรื่องใหม่
@meeluangkhot7086
@meeluangkhot7086 3 жыл бұрын
@@minimoto2883โอเวอร์
@meeluangkhot7086
@meeluangkhot7086 3 жыл бұрын
@@minimoto2883 เส้นเลือดข
@xPROxSNIPExMW2xPOWER
@xPROxSNIPExMW2xPOWER 7 жыл бұрын
Can this guy just take over the channel, I think its about time...
@cheeseguy7269
@cheeseguy7269 7 жыл бұрын
agreed xd
@xPROxSNIPExMW2xPOWER
@xPROxSNIPExMW2xPOWER 7 жыл бұрын
still does't mean he can't take over the channel lol
@SteveUrlz
@SteveUrlz 7 жыл бұрын
++
@endrigolloshi493
@endrigolloshi493 7 жыл бұрын
He can't. He has knowledge for some things, but not all.
@xPROxSNIPExMW2xPOWER
@xPROxSNIPExMW2xPOWER 7 жыл бұрын
having a PhD in Computer Scince, aren't you required to know pretty much everything and keep yourself updated on the new theories and papers since he is doing research, or am I mistaken
@Kazrael
@Kazrael 5 жыл бұрын
"Facebook is trying to protect their customer" - *laughs in 2018*
@keinunvergebenesaliasgefunden
@keinunvergebenesaliasgefunden 5 жыл бұрын
But isn't Goldman Sachs their main customer?
@nelsonjimenez7939
@nelsonjimenez7939 4 жыл бұрын
Liberals will get angry
@nils_r
@nils_r 4 жыл бұрын
Facebook is trying to protect their data, from other data horders
@yohaneschristianp
@yohaneschristianp 3 жыл бұрын
Facebook: We care about you, your data 2020
@srulizuckerman7212
@srulizuckerman7212 3 жыл бұрын
Just wait til 2020 😂
@dralfonzo24
@dralfonzo24 3 жыл бұрын
These professors on Computerphile are just amazing. I wish I would have had the oportunity to learn from people like these when I was in uni.
@JustPlainRob
@JustPlainRob 6 жыл бұрын
"It's Facebook, we know where their server is. Their business is protecting their customers." AHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA
@Cynderfan35
@Cynderfan35 4 жыл бұрын
"wait you are serious?" *bender laughs even harder*
@ClassifiedPerson
@ClassifiedPerson 3 жыл бұрын
I am the product😑
@jessicablack5306
@jessicablack5306 2 жыл бұрын
Since I downloaded Tor the browser has links saying that people should stop using Facebook and other similar apps. Again that came from a few places on Tor.
@MrTylersmash
@MrTylersmash 2 жыл бұрын
@@jessicablack5306 well yeah everyone should be saying that, Facebook is horrible with how invasive they are, in Australia there's already videos up of police with papers in their hands and those pages have the persons Facebook information they're using it to justify arrests now. Also if you use any Amazon products like Alexa, hook up your Alexa to your computer and browse the files, you might not know it but there's numerous files being made of recordings of you, even when it's off.
@huw008
@huw008 7 жыл бұрын
Every time I see Dr Mike Pound in my subscription feed, I have watch the video
@davidashford6091
@davidashford6091 5 жыл бұрын
Just stumbled on this channel. Really like the way this guy explains things. Really clear, really concise. Also really like that he draws things out on mainframe printer paper. Takes me back.
@PleasestopcallingmeDoctorImath
@PleasestopcallingmeDoctorImath 7 жыл бұрын
_uses two colors_ well im out of colors, so im going to use a third color, orange. oh, ok
@Houdini111
@Houdini111 7 жыл бұрын
That orange was a highlighter. The others were markers.
@carrotman
@carrotman 7 жыл бұрын
*colour
@PleasestopcallingmeDoctorImath
@PleasestopcallingmeDoctorImath 7 жыл бұрын
Carrotman no. im canadian and its or for me. has saved and will continue to save countless seconds
@lubomirsalgo7638
@lubomirsalgo7638 7 жыл бұрын
Doctor Robotnik, I like your use of countless :)
@carrotman
@carrotman 7 жыл бұрын
You're quoting an English man. So would it count as a translation?
@MCcoolj360
@MCcoolj360 6 жыл бұрын
I don't even use TOR, but damn, it's design is clever and interesting. Good job on the videos!
@kezzyhko
@kezzyhko 3 жыл бұрын
@@MattInIllinois many people don't mind that, or even like that
@Filipcorobivblenderi
@Filipcorobivblenderi 3 жыл бұрын
@@MattInIllinois so just dont use google, you dont need tor.
@jesse1511
@jesse1511 Жыл бұрын
What do you use instead of tor ?
@Pax_Veritas
@Pax_Veritas 5 жыл бұрын
This dude is my favourite on Computerphile. He's one step away from being a criminal mastermind
@astropgn
@astropgn 7 жыл бұрын
You guys should make a video telling people how you can be identified even if you are trying to be anonymous. He talked about data trafficking correlation, but there are other things that can identify you. Something very mundane, like the resolution you use, the browser etc.
@heyandy889
@heyandy889 7 жыл бұрын
Marcos Vinícius Petri and third party scripts
@Nautilus1972
@Nautilus1972 4 жыл бұрын
You must protect your entry into the TOR network and your exit from it - you are vulnerable at both points e.g. with a VPN as another layer.
@michaelarlen7805
@michaelarlen7805 4 жыл бұрын
Nautilus1972 Using VPN with tor actually decreases anonymity. Tor project doesn’t recommend it. VPN server IP addresses are known, so you have a known exit point when using them.
@SmellyLegend
@SmellyLegend 3 жыл бұрын
Meta data. contact lists. You are identified by your associations you make through most app/servers
@prakharmishra3000
@prakharmishra3000 3 жыл бұрын
Watch the hated one. He makes vids about that
@spaceman2142
@spaceman2142 7 жыл бұрын
I'd love a video on the fall of silk road and transaction malleability. Keep up the great videos!
@radu9568
@radu9568 6 жыл бұрын
Been wondering how it worked for some time now and was too lazy to search. This video is gold
@thenerdyouknowabout
@thenerdyouknowabout 7 жыл бұрын
"Stuff happens here, encrypted stuff..."
@yesim18duh14
@yesim18duh14 7 жыл бұрын
You guys should do a video on some of the weakness of TOR that have come out in the past year!
@Athenas_Realm_System
@Athenas_Realm_System 6 жыл бұрын
With the in→out thing be possible to counteract by random padding going in that is dropped at the last node before being sent out, making it harder to correlate the two?
@leelinden8107
@leelinden8107 4 жыл бұрын
What I want to to know is where this dude got the nostalgic stripy green fanfold tractor-feed paper that doesn't even look yellowed?? I remember when "backup" meant dumping your data onto 137 boxes of that stuff. [cough wheeze creak]
@Abby_Liu
@Abby_Liu 4 жыл бұрын
from the storage room in this university I'd imagine.
@Dusk-MTG
@Dusk-MTG 4 жыл бұрын
I'm not an informatic and I won't ever know how to actually make all the things he says, but just understanding all of this is very fun and informative.
@ss3lman40
@ss3lman40 6 жыл бұрын
Does Tor have one Master server that handles assigning the circuits of clients on initial setup or is that all done automatically? Like how does it know that this server is a circuit? Does the first circuit you connect to know your IP?
@Aemilindore
@Aemilindore 7 жыл бұрын
the best feature of tor hidden services to me is NAT punching. it basically allows a user to have a pc behind a NAT and still have a .onion address to SSH it. this is amaizing.
@b3b3chaud
@b3b3chaud 4 жыл бұрын
He is right; i found Onion cookies recipe in the deep&dark web. Excellent video, thank you
@Goldwelp
@Goldwelp 4 жыл бұрын
Does that hidden server cycle its introduction points inside of this onion cloud? Or does it not need to? And are they manually picking these points or is it part of the TOR protocols? Are they able to pick them?
@DaffyDaffyDaffy33322
@DaffyDaffyDaffy33322 Ай бұрын
I'm not 100% sure so take this with a grain of salt, but when you create an onion service, the only thing you store locally is the public and private key and the hostname (the .onion address itself). There's no information stored locally about the descriptor or introduction points, so I assume they're determined every time tor is restarted
@Bakipll
@Bakipll 7 жыл бұрын
An episode about firewalls would be awesome.
@obfuscated3090
@obfuscated3090 5 жыл бұрын
Or your could read about them and get far more detail.
@austinmcpeak1926
@austinmcpeak1926 5 жыл бұрын
Bakipll you mean virtual broken condom.
@exactzero
@exactzero 3 жыл бұрын
@@obfuscated3090 Booo...
@isiuiki
@isiuiki 7 жыл бұрын
Is there any way that you can open the auto-captions in videos? Sometimes it is harder to understand with the accent if you are not the native speaker.
@VishalSharma-gt1hy
@VishalSharma-gt1hy 5 жыл бұрын
press C
@d3sphil
@d3sphil 7 жыл бұрын
I am not an expert in cryptograph/security, but I am quiet well versed in distributed systems. It would seem to me that the key to hidden services is that the server hosting the service operates using TOR cells (packets? not sure on nomenclature here). Since the cells are all the same size and encrypted, it becomes infeasible using simple/traditional means to correlate data packets at the destination to those from a client origin. Without hidden services the destination servers will have traditional IP packets that are susceptible to correlation using data size and timing techniques. Is this a correct interpretation of hidden services? The introduction points, DHT, onion address, etc. all seem like a cryptographic replacement of DNS with a method to bridge two TOR circuits. That, in itself, doesn't seem like it provides the extra anonymity of the hidden service.
@zoltan1953
@zoltan1953 5 жыл бұрын
I'm not sure if you guys do this or not, but could you do a video about Kali Linux/Kali Nethunter and penetration testing, and perhaps a video about DNS queries and how OSs like TAILS and Whonix allegedly prevent DNS leakage? I know I'm asking for quite a bit of content here... Just thought I'd ask and see what I get. Lol. Thanks for all the great videos. They've been greatly informative as I endeavor to learn more about networking and programming.
@noway2831
@noway2831 5 жыл бұрын
Could you randomly divide the traffic (every 8,16 or 24 bits) between 3 different, unconnected circuits?
@benjaminbrady2385
@benjaminbrady2385 7 жыл бұрын
Seven words: Professor Brailsford, Tom Scott and Mike Pound Like if you agree!
@johnnyblack612
@johnnyblack612 4 жыл бұрын
Who are them?
@Fleurlean4
@Fleurlean4 3 жыл бұрын
That’s eleven words.
@Marjannuel
@Marjannuel 3 жыл бұрын
Tom Scott! My teacher
@rz2374
@rz2374 3 жыл бұрын
@YASH TRIVEDI He has his own channel, just put Tom Scott into youtube
@EnduranceT
@EnduranceT 7 жыл бұрын
W00t thanks for this follow-up as we requested!!!
@Tiesproductions
@Tiesproductions 7 жыл бұрын
Maybe I didn't get this right, but with the single union facebook example you described, coulnt someone theoreticaly still sniff at the entry node and exit node to do a corilation based attac, since the exit node can know the identity of the server?
@heyandy889
@heyandy889 7 жыл бұрын
Tiesproductions yes this is an issue with tor in general - a sufficiently powerful adversary with global knowledge of the network could (theoretically) correlate all the network's input and output messages to identify the users and their destinations. however this is already the situation of the internet without tor, so by using tor you are increasing an adversary's effort by a significant margin.
@pauldowling2160
@pauldowling2160 3 жыл бұрын
0:53 I haven't seen that paper in a long time. Great explanation. Thanks,
@TechXSoftware
@TechXSoftware 7 жыл бұрын
All these onions are making me cry
@austingriff5905
@austingriff5905 4 жыл бұрын
This was really well articulated thank you
@Lysergesaure1
@Lysergesaure1 7 жыл бұрын
Another amazing video. Do you know the details about how Silk Road was taken down?
@Elyseon
@Elyseon 2 жыл бұрын
Worse, he was using that account to advertise the site. Also he used the same username on several such accounts.
@joyalmathew2156
@joyalmathew2156 5 жыл бұрын
Is there something in place that prevents the IP and the RP from being the same router?
@ChupachuGames
@ChupachuGames 4 жыл бұрын
It seems like the main drawback is that an attacker with large servers could populate the node list with thousands or more of nodes, track down regular users, and hit them with a denial of service for a short window to control all traffic passing through the network, and easily sniff users out.
@dr.winner2516
@dr.winner2516 2 жыл бұрын
That is why Tor is better with more legit nodes, they make Tor more resilient
@Laayekthar
@Laayekthar 7 жыл бұрын
Please make a video about h265 and h264. I understand that h265 is more efficient? and should give a better quality at the same bitrate.. but which has better quality 2.6GB h264 1080p or 580MB h265 1080p?
@zer02626
@zer02626 3 жыл бұрын
Yet another great overview!
@dopplereffect7325
@dopplereffect7325 5 жыл бұрын
thanks. exited with the content of your channel , am a big fan. ....please i wish to ask ,are websites on the dark web coded with normal web languages???.
@sonicthehedgehog5088
@sonicthehedgehog5088 5 жыл бұрын
Yes. they use the same web languages.
@yoimborat
@yoimborat 7 жыл бұрын
Does this guy have his own channel?
@BlackQueenNetwork
@BlackQueenNetwork 6 жыл бұрын
yes but he has no vids on it
@danielmiddleton6094
@danielmiddleton6094 6 жыл бұрын
This is his channel now
@grace-ok5dp
@grace-ok5dp 3 жыл бұрын
I literally fell asleep to this. not in a bad way at all. it calms me
@marcin_pisz
@marcin_pisz 7 жыл бұрын
Wonder if they ever will do episode on computerphile of why Tor browser suggests it not be opened to full screen or it can be tracked. How can opening the tor browser to full window be possibly be used to track someone?
@jaym1045
@jaym1045 7 жыл бұрын
Martin Pisz it's to do with mouselogging. Basic keyloggers will take mouse location and click points. People who log into Bank Account using on-screen keyboards may be keylogged via positions. Obviously the are other ways to mouselog but basic ones dont bother
@nopenoperson9118
@nopenoperson9118 7 жыл бұрын
Martin Pisz In addition, browser window resolution is information used in producing a browser fingerprint for the purpose of identifying a user.
@MrDmnk93
@MrDmnk93 7 жыл бұрын
Sites (or anybody sniffing around hard enough) can see your browsers dimensions (in full-screen your screen dimensions) and it might prove useful in finding you. There might be other reasons but this what I know of. If anybody has more info, your contribution would be appreciated.
@jangxx
@jangxx 7 жыл бұрын
Just disable JavaScript inside the TOR Browser, then it doesn't matter. No hidden service worth anything actually requires JavaScript to work, some even explicitly tell you to turn it off.
@whuzzzup
@whuzzzup 7 жыл бұрын
IF(!) you have JavaScript enabled (which is a very very very very bad idea when you want anonymity), a script can detect your resolution/browser size. This does not mean that thousands of others might have the same one, but it's one puzzle piece for identifying someone. You should google panopticlick and/or browserleaks.TorBrowser is a hardened Firefox, with lots of stuff disabled or tweaked to make identifying someone harder. But the biggest problem is JavaScript - as proven by some FBI hack some years ago.
@qm3ster
@qm3ster 3 жыл бұрын
Where can I read more about Facebook's integration? Is this just something an `.onion` service can choose to do - connect directly to rendezvous node?
@Iftikharyk
@Iftikharyk 5 жыл бұрын
Awesome channel, especially this guy do explanation so easy.
@chromaticvisionstudio5489
@chromaticvisionstudio5489 4 жыл бұрын
I’m so sick of Facebook and that’s why I deleted my account. I couldn’t be happier and should’ve done it years ago.
@ElagabalusRex
@ElagabalusRex 7 жыл бұрын
I think it's interesting how Facebook is embracing Tor users while other sites deny service to them altogether.
@heyandy889
@heyandy889 7 жыл бұрын
ElagabalusRex yes we are lucky Alec Muffett is in the organization.
@ChunkyWaterisReal
@ChunkyWaterisReal 6 жыл бұрын
Why the would you use Facebook on tor anyways? I mean...seems counterintuitive, cause anonymity.
@ChunkyWaterisReal
@ChunkyWaterisReal 6 жыл бұрын
Oh wait.. firewalls and such I Imagine.
@exactzero
@exactzero 3 жыл бұрын
@@ChunkyWaterisReal because you have some activities you do there, or clients you do for. It's a big network and you don't necessarily have to use your real personal information to use their services.
@nahCmeR
@nahCmeR 7 жыл бұрын
Does anyone know the name of orrecognize that C++ book on the bookshelf in the background?
@biocuts
@biocuts 6 жыл бұрын
As for 01:09, even if someone is sniffing A and B, they can't prove that B is A because B's source IP is of some machine the the TOR network. Unless you follow through all the nodes A used to B, you can't show they are connected. Correct me if I'm wrong.
@danya023
@danya023 3 жыл бұрын
They can't prove that with certainty, but they can with some degree of confidence. If A puts in a packet, then after a semi-constant delay it comes out on the other side, and it's happened a lot of times in sequence already, then it's probable that B is relaying A's traffic.
@44Kokoloko
@44Kokoloko 2 жыл бұрын
I know I'm late, but trying my hand here... Once the RP is set, how is the connection any more anonymous than usual, except for the added nodes? How is the traffic monitoring on both ends any harder?
@Treddian
@Treddian 2 жыл бұрын
My understanding is that only the server will know when the message has reached the final hop. Anyone watching could just think that the server is another router in the chain.
@ahsanashraf4385
@ahsanashraf4385 5 жыл бұрын
Thank you for all the services you provide free of cost and it is not even hidden :P
@masonmackall0
@masonmackall0 5 жыл бұрын
If the routers are publicly listed can someone actually go to the introduction router and demand that they give them the address they forward the messages to and keep doing that along the 3 nodes until the reach the server? Also is a vpn just a 1 router onion router?
@rationalism_communism
@rationalism_communism 9 ай бұрын
theres thousends of connections and are random, this is only works with clear net, traffic corelation only works in the clearnet, when using tor.
@do0m389
@do0m389 2 жыл бұрын
what if someone sniffs at the randevu point? Does the RP have decrypted messages of both server and the client?
@frodo279
@frodo279 7 жыл бұрын
Can you make a video explaining the math behind onion routing?
@phoenix2464
@phoenix2464 7 жыл бұрын
best books for networking and cloud computing ?
@afonsohipolito6983
@afonsohipolito6983 4 жыл бұрын
phoenix go to hidden wiki and search for library links
@Twisted_Code
@Twisted_Code 4 жыл бұрын
5:10 or a pastebin document publishing a big fat list of them (but usually only sharing the doc with a certain group), as is the case for some services
@neumdeneuer1890
@neumdeneuer1890 7 жыл бұрын
If I controlled the entrypoint of the client, and the entrypoint of the server then I should be able to perform a heuristic analysis or not ?
@heyandy889
@heyandy889 7 жыл бұрын
neumde neuer yes tor is vulnerable to a sufficiently powerful adversary with global knowledge of the network
@utkarshpandey3299
@utkarshpandey3299 3 жыл бұрын
I just installed Tor on my phone and now getting this video recommendation.
@levitatingbusinessman2560
@levitatingbusinessman2560 Жыл бұрын
So when do we get an I2P video?
@leondas1000
@leondas1000 7 жыл бұрын
Have you got the link to the dark web video?
@GenaKazachek
@GenaKazachek 7 жыл бұрын
I would be appreciate if you made a video about I2P and Freenet too.
@anthonyvega2146
@anthonyvega2146 6 жыл бұрын
Is a Rendezvous point kind of like a VPN or is it different
@___aZa___
@___aZa___ 7 жыл бұрын
i love this channel.
@bubblesgrappling736
@bubblesgrappling736 2 жыл бұрын
could you make a video on mix networks?
@jclad5145
@jclad5145 7 жыл бұрын
would it be possible to follow a trail of physical locations where each node is to link the server and the client?
@ruben307
@ruben307 7 жыл бұрын
they probably don't store their data.
@jclad5145
@jclad5145 7 жыл бұрын
What about cache, there has to be some sort of cache
@techmage89
@techmage89 7 жыл бұрын
Rovert2001 The network is designed to prevent this sort of thing. If you control two nodes involved, though, you can start to identify the nodes between them, but that's difficult given the randomness and number of nodes available.
@ImmenseLeverage
@ImmenseLeverage Ай бұрын
Had no clue this much was going on with Tor. Didn’t really know what was going on at all before this.
@mrsuperguy2073
@mrsuperguy2073 7 жыл бұрын
i think i asked this in the comments to his last video about onion routing but since it didn't get an answer I'm gonna ask it again here: to avoid the danger of someone correlating traffic going into and coming out of the TOR network, could you build into the protocol that the client node adds a random number of dud packets that are taken out while being passed on in the TOR network, and within the TOR network more dud packets are added? Shouldn't this completely screw up any chance of being able to correlate traffic? Wouldn't this advantage be even better if the client and server knew to delay random packets by a random amount of time as well?
@mrsuperguy2073
@mrsuperguy2073 7 жыл бұрын
heyandy x ah ok then. so those other protocols you mentioned, are they used by other dark web browsers then?
@btcsys
@btcsys 5 жыл бұрын
Would that slow traffic down to a slower crawl? Don't know just asking
@AdamRyman
@AdamRyman 7 жыл бұрын
What if the introduction point is compromised?
@idrissberchil25
@idrissberchil25 4 жыл бұрын
it won't matter because the communication is encrypted with public encryption, think of it like TLS.
@ayb100
@ayb100 2 жыл бұрын
I would love to watch this guy have a conversation about TOR with Eli the computer guy. That would be interesting :)
@aaron_martin
@aaron_martin 7 жыл бұрын
I see you found something to do with those reams of dotmatrix paper... :)
@btcsys
@btcsys 5 жыл бұрын
I think I still have a case of that stuff somewhere in my office
@moralesriveraomar233
@moralesriveraomar233 4 жыл бұрын
Send me those boxes! This is extremely cool, I was wondering what was that paper
@rogernevez5187
@rogernevez5187 4 жыл бұрын
5:22 *The way the Distributed Hash Table is programmed the vast majority of nodes wont know what the descriptor is for a given key. Only one or a couple.* Why one or a couple? Is it necessary to make the TOR network works ???
@lukebutler00
@lukebutler00 3 ай бұрын
This channel provides a better education than my computer science degree smh
@Mernom
@Mernom 4 жыл бұрын
Won't the router node see the messages? It has to finish decrypting the layers from the sender, and start wrapping the layers for the reciever.
@MikCish
@MikCish 5 жыл бұрын
this guy has the most soothing voice
@SuviTuuliAllan
@SuviTuuliAllan 7 жыл бұрын
Maybe talk about Hyperboria/CJDNS next?
@forestmoss5225
@forestmoss5225 10 ай бұрын
So hidden sites have their ip addresses hidden but you can still use a common address to connect to the site using TOR. If I had the hidden sites direct IP address, could I theoretically just connect directly through something like google? If not I guess I just don't understand.
@andywilson5677
@andywilson5677 7 жыл бұрын
How does the introduction point send a message back to the server if it doesn't know it's IP address?
@heyandy889
@heyandy889 7 жыл бұрын
Andy Wilson this is key insight of tor. it allows client and server to communicate without knowing each other's identity or location. broadly the concept is the same as using a proxy - obscures info about the client from the server. definitely check out FAQ on the Tor website and also how-to's from the EFF
@andywilson5677
@andywilson5677 7 жыл бұрын
Thanks. I didn't know the TOR circuit remained open between the server and the introduction point.
@heyandy889
@heyandy889 7 жыл бұрын
No prob. Yeah, initially the circuit remains open. Once the rendezvous point is established, then the Introduction Point is out of the picture - just client, hop hop rendezvous, hop hop server.
@mallickpriyanshuOG
@mallickpriyanshuOG 3 жыл бұрын
This video when over my head.
@lordominios
@lordominios 7 жыл бұрын
uu i think he has the same keyboard that i have at my work! thou probably different layout. nice vid btw
@8w494
@8w494 7 жыл бұрын
Shout-out to Ross Ulbricht
@greyfox67xx
@greyfox67xx 6 жыл бұрын
Shout out? Just email him...he likes to post his email apparently...and takes terrible photos. Unless he was practicing for prison..then yea ok
@ritveekavashistha5705
@ritveekavashistha5705 7 жыл бұрын
Computerphile can you please add subtitles? English is not my first language and I find some of your videos tough to comprehend.
@cheeseguy7269
@cheeseguy7269 7 жыл бұрын
well, it's gonna take a while. the viewers are the people who end up creating the subtitles
@hobojoe1046
@hobojoe1046 Жыл бұрын
I would like to see a video about pluggable transports and how they work
@cuuboid478
@cuuboid478 7 жыл бұрын
I like the ghost cube up on the shelf.
@dennisvaningen3827
@dennisvaningen3827 7 жыл бұрын
clear video👌
@santangelx1573
@santangelx1573 5 жыл бұрын
Hey guys, I don't really get it, the client is going to send a request, and the server is going to get one from the IP and then send an answer through the rendez vous point. Won't there be an issue if someone knows the weight or frequency of the request ? I know some client sent 3 packages and a server received 3 packages one second later so I know they're talking, or something like that.
@alleneth1485
@alleneth1485 4 жыл бұрын
What was said before hashtable?
@toniroberts648
@toniroberts648 4 жыл бұрын
mspy can be installed without the target device remotely
@mattf3531
@mattf3531 Жыл бұрын
as someone watching a lot of these videos in 2022, are these videos and the information provided still applicable now?
@GammaFn.
@GammaFn. 7 ай бұрын
It's 2023 now, and yes, it still is. There are some details which have changed (like the key length), but Mike didn't cover those details anyway.
@HShango
@HShango 7 жыл бұрын
I love Tor for stuff that i can't gain access to (10 percent), while (95percent) of the stuff i reguarly have access to on the daily i use my other daily browsers are my Chrome browser and MSFT Edge.
@russellmorland7382
@russellmorland7382 3 жыл бұрын
Could an attacker DDos the introduction points if given an onion address? Would that break the server?
@Treddian
@Treddian 2 жыл бұрын
The server has to express a desire to accept the connection. So, I think it really depends on how the server is configured.
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
i guess that happens all the time. Also DDoS the IP nodes would be an attack vector.
@paveltikhonov8780
@paveltikhonov8780 7 жыл бұрын
Onionymous services
@aenorist2431
@aenorist2431 7 жыл бұрын
All of that is a debate based on nonsensical assumptions. "Is Anonymity worth Criminality?" makes no sense, you cannot get rid of the criminality anyway.
@rikwisselink-bijker
@rikwisselink-bijker 7 жыл бұрын
You can't get rid of it (well..), but that's no reason to make it easy. Every system can be changed to make surveillance possible. If half of the population works for the police, it is possible to eliminate 'normal' criminality. It is just that everybody outside of North Korea agrees that it is not worth it. You can allow or remove anonymity, which will have an effect on how difficult crime becomes. (to be clear: I'm for TOR staying legal)
@HanBurritoz
@HanBurritoz 7 жыл бұрын
"You can not save all lives, so it is noth worth it to save any lives." Shitty argument.
@p_serdiuk
@p_serdiuk 7 жыл бұрын
Rik Wisselink Basically, any surveillance just moves the problem up. What prevents criminals from abusing it? I mean, any system can be broken into.
@kisielthe1st
@kisielthe1st 7 жыл бұрын
Followed by a shitty analogy I guess. If I take away your guns you're going to stab someone with a knife. If I take your knives you'll club someone to death with a stick. Making tor illegal will just spurt out other services that do the same thing. Take away my tool to achieve anonymity, i'll look for something else.
@aenorist2431
@aenorist2431 7 жыл бұрын
"You cannot save a single live, so you better not use that as an argument to also beat every second persons face in." Would be more aedequate a phrasing. I am not saying "you cannot get rid of it completely", i am saying "it would not make a cents worth of difference, hence its not an argument."
@Jacob-Vivimord
@Jacob-Vivimord 7 жыл бұрын
I know next to nothing going into this, so forgive my ignorance with this question. You've said that if someone had control of the initial entry point into the network and the final exit node, that they could decode the information they wanted (right?). Some quick Google-fu leads me to believe there are less than 1000 exit nodes currently in operation. What's to stop, say, the NSA from generously starting up another 1000 exit nodes of their own, giving them a 50% chance of having control over any given exit node? Thereby effectively eliminating that second requirement and leaving them only with a need to sniff around at the initial entry point. Again, forgive me if I've completely misunderstood something (or several things).
@heyandy889
@heyandy889 7 жыл бұрын
Jacob Harrison yes this is a worrisome future, in fact the FBI employed such a measure in attempt to track activity of tor users.
@hicknopunk
@hicknopunk 7 жыл бұрын
I love your videos Mike! *hugs*
@IMAXXHEW
@IMAXXHEW 4 жыл бұрын
00:17 "A lot of what happens... is illegal" Yeah, like entrapment❗
@tedchirvasiu
@tedchirvasiu 7 жыл бұрын
5:30 - Until recently? So it means now there's an easy way of finding secret services?
@johnharvey5412
@johnharvey5412 7 жыл бұрын
Ted Chirvasiu there are lists of them that you can find on the regular internet, but if somebody wants to keep their service hidden (and just give it out to select few people) then they can keep it that way
@aljazperc
@aljazperc 7 жыл бұрын
How was Silk Road 2 server found?
@maxpayne438
@maxpayne438 7 жыл бұрын
Norest knock knock, who's there? -Silky Roadie 2.0. - :o
@nyx211
@nyx211 7 жыл бұрын
Norest The FBI paid Carnegie Mellon University $1 million to hack Tor. So they set up a bunch of relays to record .onion addresses with the associated IP addresses and handed them over to the feds.
@aljazperc
@aljazperc 7 жыл бұрын
Thx nyx211
@baumkuchen6543
@baumkuchen6543 7 жыл бұрын
And this is how FBI started to sell drugs online...
@DynoosHD
@DynoosHD 7 жыл бұрын
Why you need 3 nodes between RP and S? 2 nodes would work as well, didnt it?
@Treddian
@Treddian 2 жыл бұрын
Less chance that the Chinese government could own all of the nodes involved, as one example.
@freeman1884
@freeman1884 6 жыл бұрын
Why is a rendezvous point needed, and where is the hash table stored?
@jamesferrarelli1873
@jamesferrarelli1873 5 жыл бұрын
Was Facebook's Involvement with TOR a cause of the sort of recent lawsuit?
@Seegalgalguntijak
@Seegalgalguntijak 7 жыл бұрын
Facebook is a website that requires a login (and even requests copies of passports or something alike, if they're not sure the user is logged in with their real name), so what would even be the point in using this site anonymously???
How TOR Works- Computerphile
14:19
Computerphile
Рет қаралды 1,7 МЛН
Cookie Stealing - Computerphile
16:12
Computerphile
Рет қаралды 1,1 МЛН
Зу-зу Күлпәш. Стоп. (1-бөлім)
52:33
ASTANATV Movie
Рет қаралды 244 М.
Taki Taki Tutorial💃 Where’re you from?🔥
00:14
Diana Belitskay
Рет қаралды 6 МЛН
Who enjoyed seeing the solar eclipse
00:13
Zach King
Рет қаралды 109 МЛН
How AI 'Understands' Images (CLIP) - Computerphile
18:05
Computerphile
Рет қаралды 117 М.
VPN & Remote Working - Computerphile
13:38
Computerphile
Рет қаралды 211 М.
Has Generative AI Already Peaked? - Computerphile
12:48
Computerphile
Рет қаралды 164 М.
Taming Kerberos - Computerphile
16:06
Computerphile
Рет қаралды 317 М.
Have You Been Pwned? - Computerphile
10:59
Computerphile
Рет қаралды 476 М.
2FA: Two Factor Authentication - Computerphile
12:34
Computerphile
Рет қаралды 499 М.
Exploring the Latest Dark Web Onion Sites
13:15
John Hammond
Рет қаралды 571 М.
How To Access The Dark Web (Using Tor)
11:29
Mental Outlaw
Рет қаралды 702 М.
Зу-зу Күлпәш. Стоп. (1-бөлім)
52:33
ASTANATV Movie
Рет қаралды 244 М.