Are you using Tor or a traditional VPN? Comment below to share which one you're using for your needs or if you have more questions about which one will best fit your needs. Don't forget to like and subscribe to All Things Secured UA-cam: ▶ Try Tor: www.torproject.org/ ▶ Recommended VPN: www.allthingssecured.com/yt/expressvpn ▶ Recommended dVPN: www.allthingssecured.com/yt/mysterium
I have a query, which CA is issuing TLS certificates to onion urls? All I know is entire onion urls are unofficial in this case how they get TLS certificate from trusted CA.
@@vgwarelearning4057 No, that's not what he said - he's talking about a tech that combines the 2, not "connecting to a vpn and then use Tor). In fact, Tor actually states on their website NOT to use a VPN and then use Tor.
@@LC-hd5dc I guess I missed something, because I'm pretty sure he said DON'T use Tor+VPN at some point in this video, and like I said their own website states not using a VPN is the better option.
You are the one channel I actually recommend when it comes to layman cybersecurity. My friend had an identity theft episode because he didn't take his security seriously and after extensive research (which began before his episode) I recommended to him chiefly two things: That he use 2-factor authentication (most important IMO) and that he also not reuse passwords. I remember he shared with me his Hulu password and it was only five characters and also his first name. That's when I knew he needed help... The only channel I've ever recommended to others about their online security is yours. Because you've earned it. And I thank you for that.
This is the greatest video on the subject VPN vs TOR i've seen. Clear, simplified, you explain what each is and their differencies, in less than 10 min. Perfect thanks !
Romans 6:23 For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord. Come to Jesus Christ today Jesus Christ is only way to heaven Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void Heaven and hell is real cone to the loving savior today Today is the day of salvation tomorrow might be to late come to the loving savior today John 3:16-21 16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God. Mark 1.15 15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel. 2 Peter 3:9 The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance. Hebrews 11:6 6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him. Jesus
I like the pace and tone of voice he used to speak. I like his balanced assessment of the uses of both tools. I like that he provided other alternatives, but most of all... MOST OF ALL, I liked that he didnt tell us to like and subscribe before we even understood the value and incentive of his work. I appreciate that. Logged in just to say that and like 👍🏾
Jesus Christ is the only hope in this world no other gods will lead you to heaven There is no security or hope with out Jesus Christ in this world come and repent of all sins today Today is the day of salvation come to the loving savior Today repent and do not go to hell Come to Jesus Christ today Jesus Christ is only way to heaven Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void Heaven and hell is real cone to the loving savior today Today is the day of salvation tomorrow might be to late come to the loving savior today Holy Spirit Can give you peace guidance and purpose and the Lord will John 3:16-21 16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God. Mark 1.15 15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel. 2 Peter 3:9 The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance. Hebrews 11:6 6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him. Jesus
Great explanation I've tried VPN and Tor at the same time and my download speeds using torrents was 20% of bandwidth. With a VPN only (fastest server) I got 75% bandwidth. Without any protection I got 60%
@@AllThingsSecured I know some of the vpn providers optimize servers for torrent traffic, while not using a vpn your speed can be throttled by the isp when downloading torrents.
Another good alternative is TAILS, which is used on a Flash drive and boots up on your computer - nothing is on your computer, and everything is on your Flash drive or external HDD if you want. It comes with TOR, THUNDERBIRD, an OFFICE to use, Keypass, and a few other items. It is free and not difficult to install on a flash drive. A good video explaining the differences between VPN and TOR and when they should be used.
@@machoprotegido5607 I don't know, I know that TOR works on Redmi - an Android - Haven't tried it on my iPhone but I believe TOR would work. Not sure about the OS though.
VPN might actually also help on ISP spying. They (ISP) can't see the content of a secure page but they sure can see the URLs of the pages that you visit and also the protocols that you are using. Plus they (all of them) have direct access and monitoring on your local network through the pre-compromised backdoor (aka service) accounts that are invisible and preinstalled on you free ISP router. That alone is a good reason for VPN usage and that is what most of people mean when they are talking about VPN privacy.
@@ORION-ir5dx I agree about ISP: They can see anything trough the router. Some time ago, i put some "barriers" to minimize the exposition: Firewall (physical) between the router and my network. Also, behind of firewall, i put an enterprise grade core switch with VLANS and multiple network segments. Nothing is 100% secure but its better than nothing :)
They can't see protocol for sure beyond IP which is fundamental for routing. UDP and TCP packets could be identified but ports are used, and protocol is not guaranteed. Sure some simple heuristics are right 99% of the time, but these generic protocols can be used however you program them to.
I mainly use a VPN to securely connect to my home network from the outside to access my NAS, website, domotics/IoT, printer, etc. Similarly also use a VPN for accessing any websites securely while on a public Wifi. I would add that to the advantages of a VPN, although "normal" usage of a VPN would be from your home to a defined "outside" securely for indicated reasons as in the video. Tor usage maybe nice for safe but slow browsing from home. using Tor over VPN is interesting for sure. DVPN: I will look into this one. Thanks for the clear explanation and distinction of it all.
Very complete and correct information, hope it helps clarifying false claims. Also... uh... never thought of routing TOR through a VPN but the video has a point there. As for TOR, it's prolly invincible, for most if not all practical purposes, tracking it is just beyond difficult.
I just found your channel! I've been asking myself so many of these quotations about how secure or private are these services. Thank you so much for making these videos!!!
We sell a VPN service to individuals (and offices), but the key advantage of our service besides encryption is that it places the user behind a next-generation firewall. That can be our data center or in their own home (permitting them to appear to be using the Internet from their home even when traveling). This provides essential protection from many forms of hacking and malware.
I just found your channel via this video. Very educational on Tor & VPN strengths & weaknesses. When you pointed out that ppl handling their keys to commercial VPNs, it confirmed my suspicion on why I didn’t get a VPN yet & I’m gonna use the Tor/VPN solution that you suggested since I just downloaded Tor today.
@@jim-7965 If you run a VM and connect to a VPN and Tor inside it, even if someone manages to find your data it belongs to the VM and not your actual device. To put it simply, think of a VM like a garbage bag: even if you fill it with garbage, your home stays clean. After it's full, you just replace it with a new bag. Thats basically how a VM can act for your device. Basically it creates a virtual computer that runs through an app instead of hardware. If you configure a VM properly on a network level, you can avoid getting your device fingerprinted (ID'd) since the VM will get fingerprinted instead your host device. Any system data collected is isolated from your physical device and belongs to the VM, which you can restart (Just like any garbage you collect is seperate from your home and belongs in the garbage bag, which you can just replace). That's also how VMs protect you from malware. Any malware downloaded will only affect the VM and not your actual device. So if you're worried about suspicious files just use a VM to test first.
"I'm not talking about illegal activity" - proceeds to describe illegal activities in lots of countries around the world. Let's face it, we are all criminals in some part of the world and our daily activities would get severely punished by some authoritarian regime. And it's not like our democracies can't become authoritarian - just look at what's going on these days with individual freedom and how much information our governments want to know for the least justified reasons. We all need privacy and we shouldn't have to justify it.
Very professionally made video, clear and concise, and looks like you spent some time editing this. I learned something, since I use express vpn, but not a tor router.
Excellent presenter. Content and delivery are spot on. Production quality is not the most sophisticated... but the content and the strength of the presenter steal the show. Liked. Subscribed.
Your video is presented so well for someone like me that has nothing to hide but needs geo axsess to tv viewing but the way you explain it makes me want to learn more and to learn from advancing technology thanks for this so easy to understand and learn from
I agree with you on your points and technical remarks; it must be said is much easier to access your data from your provider, than ask them to a vpn service located in a different country, so it’s an additional strong bureaucratic barrier.
Another good video, brief and to the point. Well explained without amateur dramatics or childish cartoons. I am a recent subscriber to your channel based on your simplistic approach to the topic. I like the explanation for TOR and the good supposition as to who owns/pays for the data throughput on it's servers and exit nodes. Thank you.
4:47 There is a third option, in being to be able to use it as part of a server-client configuration to force a specific routing. Since the infrastructure is run on AS and BGP (paraphrased) your ISP throws your traffic a certain way and from there it gets taken over by the nodes owned by the company who set it up, which in turn they (aka the localized network) decides which way your traffic should go to reach a cetain destination. And sometimes that "order of last resort" method is resulting in a less than optimal path, causing higher packet loss and latency.
@@GuyBehindAComputer The main risk is that any other user of that wifi hotspot may read all data that is transferred over the wifi. Secondary is that an attacker could impersonate that hotspot and not just read but also manipulate that data. Third is that the legit operator of that hotspot may be an attacker. It would be trivial for my to set up a wifi named "MacInternet" on my laptop that injects some ransomware into each and every email and unencrypted webpage that's loaded over it and then sit down for a prolonged meal in a McDonalds. Or one that tells you it's free, it "just" needs you cc number to verify but promises not to charge your card.
Trying to use TOR to access any sites in Japan is phenomenally difficult - out of 30-40 attempts to login to Pixiv art community I accessed it twice after endless rounds of Captcha verifications....very, very frustrating....been using Express vpn for about 6 months and I'd give it a 10 out of 10.
@@AllThingsSecured I had a bad computer, so that added to it. But trying Tor today, it seems everything I search on it comes back at a potential security risk and refuses to let me advance.
Thanks a million. The algorithms based on demographics and historical data are subjective. The inaccurate and “intuitive” results from various streaming services, social media sites, and search engine history are inconsistent, divisive, and dangerous . I just want objective results without being labeled.
Thanks for the video. I live in China and just want to browse the web, Facebook , WhatsApp etc. The problem is with VPN is is that they are targeted by the censorship authorities. No matter what these companies claim they don't often work especially on windows . I've tried all the big ones over the last ten years. It's blatantly miss selling and everytime you contact customer service that just say the VPN "temporarily" is not working in China. Nord VPN and Express VPN have been down for near 6 months now. I'm using Android and a 3rd VPN to post this comment but I really need to use windows in my daily job and access Google servers
I think if you're running an exit node, it should always be on top of a VPN connection. Exit nodes are often targets, you don't want to advertise your real IP.
@@AllThingsSecured There's not that much to worry about. If you're on a VPN to start with, you won't be getting all sorts of letters from your ISP. And if you do get an attack, it's mostly DDoS types, which switching VPN server sort of solves. If no one ran exit nodes, the network wouldn't work.
Josh, thanks for another great video-- really enjoying your channel and the privacy tech you discuss. I wonder if you're aware of any tools that help protect against browser fingerprinting? If so, any chance we could see a video on this? After all, any other methods of privacy are a whole lot less effective if your browser is screaming out "Hey- this is who I am!" Thanks again
I got so sick of getting hundreds of emails,mostly worthless ads about ED and other male related performance enhancing products, to all out porn sites. I'm a newbie when it comes to anything related to computers, but i really enjoy watching YT, especially history stories or military weapons. Because i might've clicked on an ad to learn a little bit about medical problems that i can relate to, it doesn't mean they have the right to harass tf out of me with nonstop, endless ads. They give you the "option" of unsubscribing, but they'll just send it through a different address. I've changed my number twice, I've downloaded Tor and DuckDuckgo, as well as orbot. Now I'm looking for even more apps and I've done some research.
I use a VPN to avoid streaming caps by my mobile data provider. They cap my streaming speeds at 480P even though I have unlimited data but the second I turn on my VPN I can stream 4K if I really wanted it but I normally stream with 1080P.
yesss. when I try to watch youtube on my phone with mobile data videos buffer forever even in 144p. as soon as I turn on a VPN I can watch 4k without any buffering
Thank you for the easy to understand explanation! I will follow for more! I do have a question (sorry for the long question)...Let's say Im working remotely for a big bank. They provide me with a company laptop, VPN and a Yubikey (which allows access to their system each day). Per their policy I'm NOT allowed to log into there network if I'm outside of the US but I need to travel outside of US at some point. Their VPN DOES support the country I'm traveling to but regardless of that I'm "not allowed" to. I obviously can't install any personal VPN to their computer (and it already had the company VPN installed) BUT I can purchase a router from Express VPN (for example) and connect to it as if it were WIFI without an issue. Now I'd be using double VPN to maintain my location private. I know my speed would probably be impacted
Would I have any issues? Are there any risks of them finding out that I am in fact outside of US. Do you have any recommendation or suggestions? I know that banks have better security and can probably bypass certain things but I am unsure. I don't want to lose my job! Thank you in advance! Keep the videos coming!
TWO thank you's! (1) for great content, I'm smarter today because of this video; (2) for using correct grammar! These days a growing number of content providers (usually millennials) are learning more about being woke and far less about how the English language is structured.
Yes, a VPN is generally better for 3rd party apps like Filmplus and Cinema HD. VPNs provide faster speeds and better compatibility with these apps compared to Tor.
Hello, we were pleased to follow you, and thank you for this clarification, and we hope that all your upcoming videos will be translated into Arabic with the title, and thank you 👌👍🛎
I mostly use TOR to get access to various sites which are normally blocked. For example z library. I want to use vpn and see how it works. Can you suggest some good vpn services?
Are you using Tor or a traditional VPN? Comment below to share which one you're using for your needs or if you have more questions about which one will best fit your needs. Don't forget to like and subscribe to All Things Secured UA-cam:
▶ Try Tor: www.torproject.org/
▶ Recommended VPN: www.allthingssecured.com/yt/expressvpn
▶ Recommended dVPN: www.allthingssecured.com/yt/mysterium
when you used TOR does our internet service provider (IPS) know what we r doing or we using tor browser.
Fake News, I'm on Google incognito mode and I am completely private.
@@CB-ly4uj chrome incognito is just deleting cookies and browser data it does not hide ip adress isp hacking etc. And is not private
I have a query, which CA is issuing TLS certificates to onion urls? All I know is entire onion urls are unofficial in this case how they get TLS certificate from trusted CA.
@@matejpoljsak511 he's just trolling
.
Finally I found a channel worth watching.
I lift my hat for the integrity and comprehensiveness of material illustrated.
Thank you very much.
Thank you for the kind words!
Why the dot at the first line ? Mind explaining ?
same thing i said. very good content sir
It found you
People: "Tor vs VPN, which should I use?"
Security experts: "Yes"
The guy who said "Good luck, I'm behind 7 proxies" probably ran Tor over a VPN, lol.
@@vgwarelearning4057 No, that's not what he said - he's talking about a tech that combines the 2, not "connecting to a vpn and then use Tor). In fact, Tor actually states on their website NOT to use a VPN and then use Tor.
@@davel9514 also rewatch 7:02, tor over vpn is literally just using tor+vpn
@@LC-hd5dc I guess I missed something, because I'm pretty sure he said DON'T use Tor+VPN at some point in this video, and like I said their own website states not using a VPN is the better option.
These comments are so cringe.
You are the one channel I actually recommend when it comes to layman cybersecurity. My friend had an identity theft episode because he didn't take his security seriously and after extensive research (which began before his episode) I recommended to him chiefly two things: That he use 2-factor authentication (most important IMO) and that he also not reuse passwords. I remember he shared with me his Hulu password and it was only five characters and also his first name. That's when I knew he needed help... The only channel I've ever recommended to others about their online security is yours. Because you've earned it. And I thank you for that.
What are your thoughts on Braxman?
Was his name Steve? I bet it was Steve
You explained this issue better in one video than anyone else I’ve yet heard
Thanks so much!
This is the greatest video on the subject VPN vs TOR i've seen. Clear, simplified, you explain what each is and their differencies, in less than 10 min. Perfect thanks !
Tor project number one donator is U.S government, google it ahahah
Romans 6:23
For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord.
Come to Jesus Christ today
Jesus Christ is only way to heaven
Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void
Heaven and hell is real cone to the loving savior today
Today is the day of salvation tomorrow might be to late come to the loving savior today
John 3:16-21
16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God.
Mark 1.15
15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel.
2 Peter 3:9
The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance.
Hebrews 11:6
6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him.
Jesus
I like the pace and tone of voice he used to speak. I like his balanced assessment of the uses of both tools. I like that he provided other alternatives, but most of all... MOST OF ALL, I liked that he didnt tell us to like and subscribe before we even understood the value and incentive of his work. I appreciate that. Logged in just to say that and like 👍🏾
I appreciate that 👍🏻
Actually HE DID say like and sub @ 1:20 sorry
This is an amazingly put together video. Thank you for taking your time to teach us a thing or two about internet security.
My pleasure!
Jesus Christ is the only hope in this world no other gods will lead you to heaven
There is no security or hope with out Jesus Christ in this world come and repent of all sins today
Today is the day of salvation come to the loving savior Today repent and do not go to hell
Come to Jesus Christ today
Jesus Christ is only way to heaven
Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void
Heaven and hell is real cone to the loving savior today
Today is the day of salvation tomorrow might be to late come to the loving savior today
Holy Spirit Can give you peace guidance and purpose and the Lord will
John 3:16-21
16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God.
Mark 1.15
15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel.
2 Peter 3:9
The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance.
Hebrews 11:6
6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him.
Jesus
Great explanation I've tried VPN and Tor at the same time and my download speeds using torrents was 20% of bandwidth. With a VPN only (fastest server) I got 75% bandwidth. Without any protection I got 60%
So in your experience, your download speeds were higher with a VPN? While not impossible, it’s not very common.
@@AllThingsSecured I know some of the vpn providers optimize servers for torrent traffic, while not using a vpn your speed can be throttled by the isp when downloading torrents.
Another good alternative is TAILS, which is used on a Flash drive and boots up on your computer - nothing is on your computer, and everything is on your Flash drive or external HDD if you want. It comes with TOR, THUNDERBIRD, an OFFICE to use, Keypass, and a few other items. It is free and not difficult to install on a flash drive. A good video explaining the differences between VPN and TOR and when they should be used.
That's awesome. Does it work on an android phone via usb c otg?
@@machoprotegido5607 I don't know, I know that TOR works on Redmi - an Android - Haven't tried it on my iPhone but I believe TOR would work. Not sure about the OS though.
That was an EXCELLENT simple explanation of TOR.
Thank you!
This was great information. I had a great understanding but this helps put it into real world terms. Thanks.
My pleasure, John!
VPN might actually also help on ISP spying. They (ISP) can't see the content of a secure page but they sure can see the URLs of the pages that you visit and also the protocols that you are using. Plus they (all of them) have direct access and monitoring on your local network through the pre-compromised backdoor (aka service) accounts that are invisible and preinstalled on you free ISP router. That alone is a good reason for VPN usage and that is what most of people mean when they are talking about VPN privacy.
You mean without VPN, ISP can see the contents of secure page such as an email inbox?
This statement is not unconfusing
@@ORION-ir5dx I agree about ISP: They can see anything trough the router. Some time ago, i put some "barriers" to minimize the exposition: Firewall (physical) between the router and my network. Also, behind of firewall, i put an enterprise grade core switch with VLANS and multiple network segments. Nothing is 100% secure but its better than nothing :)
The question is if DNS goes through the VPN or not. If it does, its encrypted and the ISP cannot see it. Otherwise you must find a way to secure DNS.
They can't see protocol for sure beyond IP which is fundamental for routing. UDP and TCP packets could be identified but ports are used, and protocol is not guaranteed. Sure some simple heuristics are right 99% of the time, but these generic protocols can be used however you program them to.
I mainly use a VPN to securely connect to my home network from the outside to access my NAS, website, domotics/IoT, printer, etc. Similarly also use a VPN for accessing any websites securely while on a public Wifi. I would add that to the advantages of a VPN, although "normal" usage of a VPN would be from your home to a defined "outside" securely for indicated reasons as in the video. Tor usage maybe nice for safe but slow browsing from home. using Tor over VPN is interesting for sure. DVPN: I will look into this one. Thanks for the clear explanation and distinction of it all.
As a novice working to enter cybersecurity this has to be the most succinct video on tor vs vpn I’ve seen, thank you!
Very complete and correct information, hope it helps clarifying false claims. Also... uh... never thought of routing TOR through a VPN but the video has a point there. As for TOR, it's prolly invincible, for most if not all practical purposes, tracking it is just beyond difficult.
It would be very difficult to track, that’s for sure.
Thank you for explaining in simple terms the difference between a TOR network and a VPN
My pleasure!
I just found your channel! I've been asking myself so many of these quotations about how secure or private are these services.
Thank you so much for making these videos!!!
Thanks, Tyler!!
We sell a VPN service to individuals (and offices), but the key advantage of our service besides encryption is that it places the user behind a next-generation firewall. That can be our data center or in their own home (permitting them to appear to be using the Internet from their home even when traveling). This provides essential protection from many forms of hacking and malware.
An accurate and factually correct report, very nice.
Thanks for watching and commenting.
You did a great job breaking things down and not being sensational about things, I appreciate that.
I just found your channel via this video. Very educational on Tor & VPN strengths & weaknesses. When you pointed out that ppl handling their keys to commercial VPNs, it confirmed my suspicion on why I didn’t get a VPN yet & I’m gonna use the Tor/VPN solution that you suggested since I just downloaded Tor today.
For an extra layer you could run tor/vpn combo inside a VM (Virtual Machine)
@@Tosmasta00 how does this work ?
@@jim-7965 If you run a VM and connect to a VPN and Tor inside it, even if someone manages to find your data it belongs to the VM and not your actual device.
To put it simply, think of a VM like a garbage bag: even if you fill it with garbage, your home stays clean. After it's full, you just replace it with a new bag. Thats basically how a VM can act for your device. Basically it creates a virtual computer that runs through an app instead of hardware.
If you configure a VM properly on a network level, you can avoid getting your device fingerprinted (ID'd) since the VM will get fingerprinted instead your host device. Any system data collected is isolated from your physical device and belongs to the VM, which you can restart (Just like any garbage you collect is seperate from your home and belongs in the garbage bag, which you can just replace).
That's also how VMs protect you from malware. Any malware downloaded will only affect the VM and not your actual device. So if you're worried about suspicious files just use a VM to test first.
"I'm not talking about illegal activity" - proceeds to describe illegal activities in lots of countries around the world.
Let's face it, we are all criminals in some part of the world and our daily activities would get severely punished by some authoritarian regime. And it's not like our democracies can't become authoritarian - just look at what's going on these days with individual freedom and how much information our governments want to know for the least justified reasons. We all need privacy and we shouldn't have to justify it.
Am an Aussie , we like things explained simply which you have done beautifully!! Subbed and liked 👌😊
Ha! Thanks!
I hit the "like" button and subscribed because of the info you provided. It was clear and simple, therefore easy to follow and understand. Thanks.
Awesome, thank you!
Very professionally made video, clear and concise, and looks like you spent some time editing this. I learned something, since I use express vpn, but not a tor router.
Good channel thanks.I like speed of delivery and no distracting music plus good information.
Awesome, thank you!
Excellent presenter. Content and delivery are spot on. Production quality is not the most sophisticated... but the content and the strength of the presenter steal the show. Liked. Subscribed.
Thanks. Quality gets better with every video, I hope.
Thank you very much for this video, for this topic. Yes, it really does take time and money to make a very good video. Thumbs up!
Glad it was helpful! And thanks for the thumbs up/comment :)
Thank you for the concise, straightforward ‘yes or no’ answer right from the start.
Your video is presented so well for someone like me that has nothing to hide but needs geo axsess to tv viewing but the way you explain it makes me want to learn more and to learn
from advancing technology thanks for this so easy to understand and learn from
I agree with you on your points and technical remarks; it must be said is much easier to access your data from your provider, than ask them to a vpn service located in a different country, so it’s an additional strong bureaucratic barrier.
Another good video, brief and to the point. Well explained without amateur dramatics or childish cartoons. I am a recent subscriber to your channel based on your simplistic approach to the topic. I like the explanation for TOR and the good supposition as to who owns/pays for the data throughput on it's servers and exit nodes.
Thank you.
Me Too!
4:47 There is a third option, in being to be able to use it as part of a server-client configuration to force a specific routing. Since the infrastructure is run on AS and BGP (paraphrased) your ISP throws your traffic a certain way and from there it gets taken over by the nodes owned by the company who set it up, which in turn they (aka the localized network) decides which way your traffic should go to reach a cetain destination. And sometimes that "order of last resort" method is resulting in a less than optimal path, causing higher packet loss and latency.
Huh? The average persons response. Which is why we are all fair game to the world of CROOKED
I only use VPNs when traveling, any public Wifi is a risk.
Mind suggesting the risk factors involved? Just for learning purposes ofc.
@@GuyBehindAComputer The main risk is that any other user of that wifi hotspot may read all data that is transferred over the wifi. Secondary is that an attacker could impersonate that hotspot and not just read but also manipulate that data. Third is that the legit operator of that hotspot may be an attacker.
It would be trivial for my to set up a wifi named "MacInternet" on my laptop that injects some ransomware into each and every email and unencrypted webpage that's loaded over it and then sit down for a prolonged meal in a McDonalds. Or one that tells you it's free, it "just" needs you cc number to verify but promises not to charge your card.
@dingus nugget Haa, I am just finishing CCNA and having hands on right now on Wireshark. Very cool tool for monitoring packets. Thanks !
You're the first youtuber that talks about dvpn nice
I’m sure I’m not the first, but thanks!
Trying to use TOR to access any sites in Japan is phenomenally difficult - out of 30-40 attempts to login to Pixiv art community I accessed it twice after endless rounds of Captcha verifications....very, very frustrating....been using Express vpn for about 6 months and I'd give it a 10 out of 10.
I had wondered why I did stop using Tor, until you said that it was slow. Oh boy, I remember now.
Oh yea, very slow.
@@AllThingsSecured I had a bad computer, so that added to it. But trying Tor today, it seems everything I search on it comes back at a potential security risk and refuses to let me advance.
This so straight to the point and informative. Top quality channel here on security, hands down.
Thanks 🙏
Very clear to understand. Thanks ! Subbed.
Thanks Jafer! 🙏
Thanks a million. The algorithms based on demographics and historical data are subjective. The inaccurate and “intuitive” results from various streaming services, social media sites, and search engine history are inconsistent, divisive, and dangerous . I just want objective results without being labeled.
In that case, you should also consider using a private search engine: ua-cam.com/video/ZKMw4uEIFlA/v-deo.html
Thanks for the video. I live in China and just want to browse the web, Facebook , WhatsApp etc. The problem is with VPN is is that they are targeted by the censorship authorities. No matter what these companies claim they don't often work especially on windows . I've tried all the big ones over the last ten years.
It's blatantly miss selling and everytime you contact customer service that just say the VPN "temporarily" is not working in China. Nord VPN and Express VPN have been down for near 6 months now.
I'm using Android and a 3rd VPN to post this comment but I really need to use windows in my daily job and access Google servers
Yea, China has always cracked down on VPNs and made it hard. Have you ever tried Shadowsocks?
@@AllThingsSecured no, i haven't . Will have a look. Thanks
shadowsocks之类直接上路由器或者软路由,或者clash,surge用电脑或者安卓手机。VPN早就不靠谱了
I think if you're running an exit node, it should always be on top of a VPN connection. Exit nodes are often targets, you don't want to advertise your real IP.
You have to really know what you’re doing to be a Tor exit node.
@@AllThingsSecured There's not that much to worry about. If you're on a VPN to start with, you won't be getting all sorts of letters from your ISP. And if you do get an attack, it's mostly DDoS types, which switching VPN server sort of solves.
If no one ran exit nodes, the network wouldn't work.
Nothing is secure. But this was a superb video!
Thanks, Melis!
Great Explanation, this really helped me to understand better between VPN and TOR
This video earned you my subscription.
Glad to hear it 👍🏻
I always learn anything new from your vids
Glad to hear it!
Great channel, great info in a layman's explanation yet covered in a professional manner, Thanks and Glad i Subbed
Josh, thanks for another great video-- really enjoying your channel and the privacy tech you discuss. I wonder if you're aware of any tools that help protect against browser fingerprinting? If so, any chance we could see a video on this? After all, any other methods of privacy are a whole lot less effective if your browser is screaming out "Hey- this is who I am!" Thanks again
Great suggestion, Joe! I’ll add it to the list.
2:15 that’s a good analogy of the TOR network
Thanks! I’m glad it’s helpful.
This dude is awesome, great vids!
Amazing video my amigo, cheers from Venezuela.
First time on this channel, great info. subscribed and liked.
Thanks "All things secured" for the explaining. This subjects generally are confused.
Josh, thank you for such a good video.
My pleasure!
which one puts you in easier warzone lobbies?
dude! specify you are talking about the video game warzone! hehehe
Since The Patriot Act, security is very difficult.
I got so sick of getting hundreds of emails,mostly worthless ads about ED and other male related performance enhancing products, to all out porn sites. I'm a newbie when it comes to anything related to computers, but i really enjoy watching YT, especially history stories or military weapons. Because i might've clicked on an ad to learn a little bit about medical problems that i can relate to, it doesn't mean they have the right to harass tf out of me with nonstop, endless ads. They give you the "option" of unsubscribing, but they'll just send it through a different address. I've changed my number twice, I've downloaded Tor and DuckDuckgo, as well as orbot.
Now I'm looking for even more apps and I've done some research.
I hope you’re able to find what you’re looking for, Fernando!
Very informative, nice contents explain both in a way that a newbie also understands it.
Thanks for such a lucid explaination! Subscribing your channel man
Thank you!
WOW! This was expertly presented. You have a new subscriber!
Thanks, Elijah!
Thoughtfully composed narration. Well done.
Thanks 🙏
I use a VPN to avoid streaming caps by my mobile data provider. They cap my streaming speeds at 480P even though I have unlimited data but the second I turn on my VPN I can stream 4K if I really wanted it but I normally stream with 1080P.
yesss. when I try to watch youtube on my phone with mobile data videos buffer forever even in 144p. as soon as I turn on a VPN I can watch 4k without any buffering
That analogy and simple explanation was amazingly well said for someone kind of slow like me
Glad to hear it, Adrian!
Thanks dude this really helped me a lot I did the steps that's you did thanks man!
I feel more comfortable using TOR over VPN. It is slower but I'm fine with it.
ah that was very helpful, simple, and informative. Subbed & Thanks
Thanks for the sub!
This video was perfect perfect perfect keep up the good work and I'm subscribed for life.👍
Very nice explanation. Thanks
Thanks, Rafal!
I learned something new again. Thanks
Glad to hear it! You’re welcome 😎
@drew_hacks01 on Telegram helped me with good and strong VPN thanks for your time
👍👍👍Thank you, learnt something new today. 🙂
My pleasure, Bob!
Now that Twitter is banned here in Brazil, Tor for me is the best option
Mysterium 👍
I’ve been enjoying their service! What do you like about it?
Have been using mysterium also
I can't thank you enough... hands down the best video for beginnners
Great video!
What if you already have a corporate VPN? Does using a personal VPN or Tor make sense in that case?
Layering them on top of each other might not work, but when you’re on a personal device, it would be helpful.
Great information thanks for the review.
My pleasure! Thanks for watching and commenting 👍🏻
@drew_hacks01 on Telegram helped me with good and strong VPN thanks for your time
U gotta make it look so easy, thx bro!
Thank you for the easy to understand explanation! I will follow for more! I do have a question (sorry for the long question)...Let's say Im working remotely for a big bank. They provide me with a company laptop, VPN and a Yubikey (which allows access to their system each day). Per their policy I'm NOT allowed to log into there network if I'm outside of the US but I need to travel outside of US at some point. Their VPN DOES support the country I'm traveling to but regardless of that I'm "not allowed" to. I obviously can't install any personal VPN to their computer (and it already had the company VPN installed) BUT I can purchase a router from Express VPN (for example) and connect to it as if it were WIFI without an issue. Now I'd be using double VPN to maintain my location private. I know my speed would probably be impacted
Would I have any issues? Are there any risks of them finding out that I am in fact outside of US. Do you have any recommendation or suggestions? I know that banks have better security and can probably bypass certain things but I am unsure. I don't want to lose my job! Thank you in advance! Keep the videos coming!
Did you get fired yet?
Thank you for detailed information.
My pleasure, Ake!
vpn is a good option if you setup your own that is...and ofcourse booby-trapped case...just to make sure logs are completely erased ;)
Thx .Nice easy beginners guide. helped plenty!
Your videos are very top-quality stuff. thanks.
Thanks 🙏
TNice tutorials video really helped! Thank you ❤
what protects me from criminals and the government, is what im trying to find out
Tor would be good for governments and criminals. Trust me.
Informative. Thanks for sharing.
Very informative. Thanks.
youtube suggestion done right! subscribed
Glad to hear it!
Amazing content as always
Glad you enjoyed it!
Thanks for the info, I found it very helpful.
Excellent breakdown 💯
helped so so much this is a greatly put together video
Glad to hear it.
TWO thank you's! (1) for great content, I'm smarter today because of this video; (2) for using correct grammar! These days a growing number of content providers (usually millennials) are learning more about being woke and far less about how the English language is structured.
I’ve never been complimented on my grammar before. Thanks. 😂
thanks for the info. retired and can't afford cell phone internet. what are your thoughts?😕
Lovely video! Thank you very much!
thanks a lot for the informative video 👍👍
Very good video Josh.. I'm newly subscribed.. Is a VPN better for 3rd party apps over tor? Filmplus, Cinema HD etc..
Yes, a VPN is generally better for 3rd party apps like Filmplus and Cinema HD. VPNs provide faster speeds and better compatibility with these apps compared to Tor.
Hello, we were pleased to follow you, and thank you for this clarification, and we hope that all your upcoming videos will be translated into Arabic with the title, and thank you 👌👍🛎
At least this one is telling you the truth not like other who are promoting and selling us out dy.
I mostly use TOR to get access to various sites which are normally blocked. For example z library. I want to use vpn and see how it works. Can you suggest some good vpn services?
Nice tutorial Micheal, great video to get us started. May you tell - how do I link two or more channels (in the rack channel) as to share the sa