TOR Hidden Services - Computerphile

Поділитися
Вставка
  • Опубліковано 9 лют 2025
  • The Dark web allows users to hide services using TOR, but how? Dr Mike Pound explains.
    Onion Routing: • How TOR Works- Compute...
    The Perfect Code: • The Perfect Code - Com...
    Max's Deep Web Video : • Web vs Internet (Deep ...
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscom...
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

КОМЕНТАРІ • 735

  • @EddyGurge
    @EddyGurge 7 років тому +926

    The thing I like about this guy is that I get it, and it all makes sense in one pass. He's got a gift.

  • @xPROxSNIPExMW2xPOWER
    @xPROxSNIPExMW2xPOWER 7 років тому +2141

    Can this guy just take over the channel, I think its about time...

    • @cheeseguy7269
      @cheeseguy7269 7 років тому +13

      agreed xd

    • @xPROxSNIPExMW2xPOWER
      @xPROxSNIPExMW2xPOWER 7 років тому +2

      still does't mean he can't take over the channel lol

    • @SteveUrlz
      @SteveUrlz 7 років тому +2

      ++

    • @endrigolloshi493
      @endrigolloshi493 7 років тому +49

      He can't. He has knowledge for some things, but not all.

    • @xPROxSNIPExMW2xPOWER
      @xPROxSNIPExMW2xPOWER 7 років тому +17

      having a PhD in Computer Scince, aren't you required to know pretty much everything and keep yourself updated on the new theories and papers since he is doing research, or am I mistaken

  • @huw008
    @huw008 7 років тому +59

    Every time I see Dr Mike Pound in my subscription feed, I have watch the video

  • @dralfonzo24
    @dralfonzo24 4 роки тому +43

    These professors on Computerphile are just amazing. I wish I would have had the oportunity to learn from people like these when I was in uni.

  • @Kazrael
    @Kazrael 6 років тому +1307

    "Facebook is trying to protect their customer" - *laughs in 2018*

  • @davidashford6091
    @davidashford6091 6 років тому +68

    Just stumbled on this channel. Really like the way this guy explains things. Really clear, really concise. Also really like that he draws things out on mainframe printer paper. Takes me back.

  • @Pax_Veritas
    @Pax_Veritas 6 років тому +14

    This dude is my favourite on Computerphile. He's one step away from being a criminal mastermind

  • @JustPlainRob
    @JustPlainRob 6 років тому +255

    "It's Facebook, we know where their server is. Their business is protecting their customers."
    AHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA

    • @Cynderfan35
      @Cynderfan35 5 років тому +15

      "wait you are serious?" *bender laughs even harder*

    • @ClassifiedPerson
      @ClassifiedPerson 4 роки тому

      I am the product😑

    • @jessicablack5306
      @jessicablack5306 3 роки тому

      Since I downloaded Tor the browser has links saying that people should stop using Facebook and other similar apps. Again that came from a few places on Tor.

    • @MrTylersmash
      @MrTylersmash 3 роки тому +1

      @@jessicablack5306 well yeah everyone should be saying that, Facebook is horrible with how invasive they are, in Australia there's already videos up of police with papers in their hands and those pages have the persons Facebook information they're using it to justify arrests now. Also if you use any Amazon products like Alexa, hook up your Alexa to your computer and browse the files, you might not know it but there's numerous files being made of recordings of you, even when it's off.

  • @MCcoolj360
    @MCcoolj360 7 років тому +140

    I don't even use TOR, but damn, it's design is clever and interesting. Good job on the videos!

    • @kezzyhko
      @kezzyhko 3 роки тому +1

      @@MattInIllinois many people don't mind that, or even like that

    • @Filipcorobivblenderi
      @Filipcorobivblenderi 3 роки тому

      @@MattInIllinois so just dont use google, you dont need tor.

    • @jesse1511
      @jesse1511 2 роки тому

      What do you use instead of tor ?

  • @PleasestopcallingmeDoctorImath
    @PleasestopcallingmeDoctorImath 7 років тому +880

    _uses two colors_
    well im out of colors, so im going to use a third color, orange.
    oh, ok

    • @Houdini111
      @Houdini111 7 років тому +64

      That orange was a highlighter. The others were markers.

    • @carrotman
      @carrotman 7 років тому +40

      *colour

    • @PleasestopcallingmeDoctorImath
      @PleasestopcallingmeDoctorImath 7 років тому +19

      Carrotman no. im canadian and its or for me. has saved and will continue to save countless seconds

    • @lubomirsalgo7638
      @lubomirsalgo7638 7 років тому +5

      Doctor Robotnik, I like your use of countless :)

    • @carrotman
      @carrotman 7 років тому +19

      You're quoting an English man.
      So would it count as a translation?

  • @astropgn
    @astropgn 7 років тому +275

    You guys should make a video telling people how you can be identified even if you are trying to be anonymous. He talked about data trafficking correlation, but there are other things that can identify you. Something very mundane, like the resolution you use, the browser etc.

    • @heyandy889
      @heyandy889 7 років тому +7

      Marcos Vinícius Petri and third party scripts

    • @Nautilus1972
      @Nautilus1972 4 роки тому +7

      You must protect your entry into the TOR network and your exit from it - you are vulnerable at both points e.g. with a VPN as another layer.

    • @michaelarlen7805
      @michaelarlen7805 4 роки тому +57

      Nautilus1972 Using VPN with tor actually decreases anonymity. Tor project doesn’t recommend it. VPN server IP addresses are known, so you have a known exit point when using them.

    • @SmellyLegend
      @SmellyLegend 4 роки тому +3

      Meta data. contact lists. You are identified by your associations you make through most app/servers

    • @prakharmishra3000
      @prakharmishra3000 4 роки тому +3

      Watch the hated one. He makes vids about that

  • @thenerdyouknowabout
    @thenerdyouknowabout 7 років тому +192

    "Stuff happens here, encrypted stuff..."

  • @TechXSoftware
    @TechXSoftware 7 років тому +39

    All these onions are making me cry

  • @yesim18duh14
    @yesim18duh14 7 років тому +9

    You guys should do a video on some of the weakness of TOR that have come out in the past year!

  • @b3b3chaud
    @b3b3chaud 5 років тому +15

    He is right; i found Onion cookies recipe in the deep&dark web. Excellent video, thank you

  • @Bakipll
    @Bakipll 7 років тому +84

    An episode about firewalls would be awesome.

    • @obfuscated3090
      @obfuscated3090 6 років тому

      Or your could read about them and get far more detail.

    • @austinmcpeak1926
      @austinmcpeak1926 6 років тому +3

      Bakipll you mean virtual broken condom.

    • @exactzero
      @exactzero 4 роки тому +10

      @@obfuscated3090 Booo...

  • @benjaminbrady2385
    @benjaminbrady2385 7 років тому +105

    Seven words:
    Professor Brailsford, Tom Scott and Mike Pound
    Like if you agree!

    • @johnnyblack612
      @johnnyblack612 4 роки тому

      Who are them?

    • @Fleurlean4
      @Fleurlean4 4 роки тому +2

      That’s eleven words.

    • @Marjannuel
      @Marjannuel 4 роки тому +1

      Tom Scott! My teacher

    • @rz2374
      @rz2374 4 роки тому +1

      @YASH TRIVEDI He has his own channel, just put Tom Scott into youtube

  • @Aemilindore
    @Aemilindore 7 років тому +7

    the best feature of tor hidden services to me is NAT punching. it basically allows a user to have a pc behind a NAT and still have a .onion address to SSH it. this is amaizing.

  • @leelinden8107
    @leelinden8107 5 років тому +29

    What I want to to know is where this dude got the nostalgic stripy green fanfold tractor-feed paper that doesn't even look yellowed?? I remember when "backup" meant dumping your data onto 137 boxes of that stuff. [cough wheeze creak]

    • @Abby_Liu
      @Abby_Liu 4 роки тому +1

      from the storage room in this university I'd imagine.

  • @ChupachuGames
    @ChupachuGames 4 роки тому +6

    It seems like the main drawback is that an attacker with large servers could populate the node list with thousands or more of nodes, track down regular users, and hit them with a denial of service for a short window to control all traffic passing through the network, and easily sniff users out.

    • @dr.winner2516
      @dr.winner2516 2 роки тому

      That is why Tor is better with more legit nodes, they make Tor more resilient

  • @Dusk-MTG
    @Dusk-MTG 4 роки тому +5

    I'm not an informatic and I won't ever know how to actually make all the things he says, but just understanding all of this is very fun and informative.

  • @spaceman2142
    @spaceman2142 7 років тому +6

    I'd love a video on the fall of silk road and transaction malleability. Keep up the great videos!

  • @ElagabalusRex
    @ElagabalusRex 7 років тому +23

    I think it's interesting how Facebook is embracing Tor users while other sites deny service to them altogether.

    • @heyandy889
      @heyandy889 7 років тому

      ElagabalusRex yes we are lucky Alec Muffett is in the organization.

    • @ChunkyWaterisReal
      @ChunkyWaterisReal 6 років тому +11

      Why the would you use Facebook on tor anyways? I mean...seems counterintuitive, cause anonymity.

    • @ChunkyWaterisReal
      @ChunkyWaterisReal 6 років тому

      Oh wait.. firewalls and such I
      Imagine.

    • @exactzero
      @exactzero 4 роки тому +3

      @@ChunkyWaterisReal because you have some activities you do there, or clients you do for. It's a big network and you don't necessarily have to use your real personal information to use their services.

  • @radu9568
    @radu9568 6 років тому +2

    Been wondering how it worked for some time now and was too lazy to search. This video is gold

  • @lukebutler00
    @lukebutler00 Рік тому

    This channel provides a better education than my computer science degree smh

  • @chromaticvisionstudio5489
    @chromaticvisionstudio5489 5 років тому +46

    I’m so sick of Facebook and that’s why I deleted my account. I couldn’t be happier and should’ve done it years ago.

  • @utkarshpandey3299
    @utkarshpandey3299 4 роки тому +1

    I just installed Tor on my phone and now getting this video recommendation.

  • @isiuiki
    @isiuiki 7 років тому +20

    Is there any way that you can open the auto-captions in videos? Sometimes it is harder to understand with the accent if you are not the native speaker.

  • @yoimborat
    @yoimborat 7 років тому +43

    Does this guy have his own channel?

  • @death-disco
    @death-disco 4 роки тому +49

    "is TOR worth the criminality that is on there and so on" is the same argument governments make eroding fundamental rights in the name of terrorism. If your moral compass is based on legalities I'd suggest you have chosen a poor foundation. Let me re-frame your statement: is it worth letting the law diminish your fundamental right to choose how to live your life (non aggression principle withstanding)?

    • @death-disco
      @death-disco 4 роки тому +1

      @@MintyLime703 not sure your counterpoint makes sense. because a government agency developed the first onion routing protocol references, government should not be questioned? I was also referencing the tone and questions raised in the video.

  • @MikeOxlong-
    @MikeOxlong- 4 роки тому +2

    It’s a crying shame that with the way things are going with device and software manufacturers, web services and trackers, and all out privacy invasion from government entities these days that in order to even get a resemblance of privacy and security, one actually needs to go down this rabbit hole to even start protecting their rights and dignity... A crying shame...

  • @8w494
    @8w494 7 років тому +34

    Shout-out to Ross Ulbricht

    • @greyfox67xx
      @greyfox67xx 7 років тому +2

      Shout out? Just email him...he likes to post his email apparently...and takes terrible photos. Unless he was practicing for prison..then yea ok

  • @grace-ok5dp
    @grace-ok5dp 3 роки тому

    I literally fell asleep to this. not in a bad way at all. it calms me

  • @MikCish
    @MikCish 5 років тому +1

    this guy has the most soothing voice

  • @pauldowling2160
    @pauldowling2160 4 роки тому

    0:53 I haven't seen that paper in a long time. Great explanation. Thanks,

  • @marcin_pisz
    @marcin_pisz 7 років тому +33

    Wonder if they ever will do episode on computerphile of why Tor browser suggests it not be opened to full screen or it can be tracked. How can opening the tor browser to full window be possibly be used to track someone?

    • @jaym1045
      @jaym1045 7 років тому +19

      Martin Pisz it's to do with mouselogging. Basic keyloggers will take mouse location and click points. People who log into Bank Account using on-screen keyboards may be keylogged via positions. Obviously the are other ways to mouselog but basic ones dont bother

    • @nopenoperson9118
      @nopenoperson9118 7 років тому +29

      Martin Pisz In addition, browser window resolution is information used in producing a browser fingerprint for the purpose of identifying a user.

    • @MrDmnk93
      @MrDmnk93 7 років тому +19

      Sites (or anybody sniffing around hard enough) can see your browsers dimensions (in full-screen your screen dimensions) and it might prove useful in finding you. There might be other reasons but this what I know of. If anybody has more info, your contribution would be appreciated.

    • @jangxx
      @jangxx 7 років тому +35

      Just disable JavaScript inside the TOR Browser, then it doesn't matter. No hidden service worth anything actually requires JavaScript to work, some even explicitly tell you to turn it off.

    • @whuzzzup
      @whuzzzup 7 років тому +26

      IF(!) you have JavaScript enabled (which is a very very very very bad idea when you want anonymity), a script can detect your resolution/browser size. This does not mean that thousands of others might have the same one, but it's one puzzle piece for identifying someone. You should google panopticlick and/or browserleaks.TorBrowser is a hardened Firefox, with lots of stuff disabled or tweaked to make identifying someone harder. But the biggest problem is JavaScript - as proven by some FBI hack some years ago.

  • @mallickpriyanshuOG
    @mallickpriyanshuOG 4 роки тому +1

    This video when over my head.

  • @d3sphil
    @d3sphil 7 років тому +6

    I am not an expert in cryptograph/security, but I am quiet well versed in distributed systems. It would seem to me that the key to hidden services is that the server hosting the service operates using TOR cells (packets? not sure on nomenclature here). Since the cells are all the same size and encrypted, it becomes infeasible using simple/traditional means to correlate data packets at the destination to those from a client origin. Without hidden services the destination servers will have traditional IP packets that are susceptible to correlation using data size and timing techniques. Is this a correct interpretation of hidden services?
    The introduction points, DHT, onion address, etc. all seem like a cryptographic replacement of DNS with a method to bridge two TOR circuits. That, in itself, doesn't seem like it provides the extra anonymity of the hidden service.

  • @aaron_martin
    @aaron_martin 7 років тому +18

    I see you found something to do with those reams of dotmatrix paper... :)

    • @btcsys
      @btcsys 6 років тому

      I think I still have a case of that stuff somewhere in my office

    • @moralesriveraomar233
      @moralesriveraomar233 5 років тому

      Send me those boxes! This is extremely cool, I was wondering what was that paper

  • @biocuts
    @biocuts 7 років тому +3

    As for 01:09, even if someone is sniffing A and B, they can't prove that B is A because B's source IP is of some machine the the TOR network. Unless you follow through all the nodes A used to B, you can't show they are connected. Correct me if I'm wrong.

    • @danya023
      @danya023 4 роки тому +2

      They can't prove that with certainty, but they can with some degree of confidence. If A puts in a packet, then after a semi-constant delay it comes out on the other side, and it's happened a lot of times in sequence already, then it's probable that B is relaying A's traffic.

  • @ahsanashraf4385
    @ahsanashraf4385 6 років тому +1

    Thank you for all the services you provide free of cost and it is not even hidden :P

  • @Yodplods
    @Yodplods 6 років тому +3

    Who captioned this? 10:18 is complete garbage.

  • @Lysergesaure1
    @Lysergesaure1 7 років тому +9

    Another amazing video. Do you know the details about how Silk Road was taken down?

    • @Elyseon
      @Elyseon 3 роки тому +1

      Worse, he was using that account to advertise the site. Also he used the same username on several such accounts.

  • @Leonardo_The_Vinci
    @Leonardo_The_Vinci 11 місяців тому

    Had no clue this much was going on with Tor. Didn’t really know what was going on at all before this.

  • @aenorist2431
    @aenorist2431 7 років тому +80

    All of that is a debate based on nonsensical assumptions.
    "Is Anonymity worth Criminality?" makes no sense, you cannot get rid of the criminality anyway.

    • @rikwisselink-bijker
      @rikwisselink-bijker 7 років тому +14

      You can't get rid of it (well..), but that's no reason to make it easy.
      Every system can be changed to make surveillance possible. If half of the population works for the police, it is possible to eliminate 'normal' criminality. It is just that everybody outside of North Korea agrees that it is not worth it. You can allow or remove anonymity, which will have an effect on how difficult crime becomes.
      (to be clear: I'm for TOR staying legal)

    • @HanBurritoz
      @HanBurritoz 7 років тому +9

      "You can not save all lives, so it is noth worth it to save any lives."
      Shitty argument.

    • @p_serdiuk
      @p_serdiuk 7 років тому +10

      Rik Wisselink Basically, any surveillance just moves the problem up. What prevents criminals from abusing it? I mean, any system can be broken into.

    • @kisielthe1st
      @kisielthe1st 7 років тому +15

      Followed by a shitty analogy I guess.
      If I take away your guns you're going to stab someone with a knife. If I take your knives you'll club someone to death with a stick. Making tor illegal will just spurt out other services that do the same thing. Take away my tool to achieve anonymity, i'll look for something else.

    • @aenorist2431
      @aenorist2431 7 років тому +6

      "You cannot save a single live, so you better not use that as an argument to also beat every second persons face in."
      Would be more aedequate a phrasing.
      I am not saying "you cannot get rid of it completely", i am saying "it would not make a cents worth of difference, hence its not an argument."

  • @EnduranceT
    @EnduranceT 7 років тому +2

    W00t thanks for this follow-up as we requested!!!

  • @austingriff5905
    @austingriff5905 5 років тому +3

    This was really well articulated thank you

  • @sofianealloui
    @sofianealloui 3 роки тому +1

    What I study in college: 00:01 - 09:24 .
    My answer in exams: 09:25 !

  • @paveltikhonov8780
    @paveltikhonov8780 7 років тому +43

    Onionymous services

  • @Iftikharyk
    @Iftikharyk 6 років тому

    Awesome channel, especially this guy do explanation so easy.

  • @___aZa___
    @___aZa___ 7 років тому +3

    i love this channel.

  • @dennisvaningen3827
    @dennisvaningen3827 7 років тому +29

    clear video👌

  • @jean-naymar602
    @jean-naymar602 3 роки тому

    You can deduce the video's progress just by measuring the amount of marker there is on Dr Mike's hands

  • @IMAXXHEW
    @IMAXXHEW 5 років тому +15

    00:17
    "A lot of what happens... is illegal"
    Yeah, like entrapment❗

  • @Goldwelp
    @Goldwelp 4 роки тому +2

    Does that hidden server cycle its introduction points inside of this onion cloud? Or does it not need to?
    And are they manually picking these points or is it part of the TOR protocols? Are they able to pick them?

    • @DaffyDaffyDaffy33322
      @DaffyDaffyDaffy33322 10 місяців тому +1

      I'm not 100% sure so take this with a grain of salt, but when you create an onion service, the only thing you store locally is the public and private key and the hostname (the .onion address itself). There's no information stored locally about the descriptor or introduction points, so I assume they're determined every time tor is restarted

  • @zoltan1953
    @zoltan1953 6 років тому +2

    I'm not sure if you guys do this or not, but could you do a video about Kali Linux/Kali Nethunter and penetration testing, and perhaps a video about DNS queries and how OSs like TAILS and Whonix allegedly prevent DNS leakage? I know I'm asking for quite a bit of content here... Just thought I'd ask and see what I get. Lol. Thanks for all the great videos. They've been greatly informative as I endeavor to learn more about networking and programming.

  • @kvelez
    @kvelez 2 роки тому +4

    1:08
    Sniffing
    1:28
    Hidden Service
    3:33
    Onion routers
    4:03
    Connections
    5:57
    Request.
    7:08
    Connection.
    7:51
    Final circuit.

  • @YaketyYakDontTalkBack
    @YaketyYakDontTalkBack 7 років тому +1

    So could a hidden service become so popular, it become un-hidden but still provide anonymity.

    • @Abdega
      @Abdega 7 років тому +1

      Yakntoro Udoumoh
      "It's a secret to everybody!"

    • @Larwood.
      @Larwood. 7 років тому +6

      It would still be hidden. It's not a secret, people know WHAT it is, the hidden part is that nobody knows WHERE it is.

  • @jonwinder6622
    @jonwinder6622 3 роки тому

    An easier way to break down what this guy is saying. A client(the user on a computer) makes a request to send packets to a server over the internet. Lets say there is three routers(A,B,C) that the packets have to go thru in order to get to the service. Client -> Router A(Router A knows the packets came from the client. Now Router A will "peel back the information that the packets came from the client"). Now the packets are at Router B(Now Router B will "peel back the information that the packets came from A"). Then router C does the next thing. These routers are picked completely at random in the Tor network. The whole time that the packets are traveling to the service, none of the routers have the ip address destination of the service. In addition, the nodes(aka the routers) do not record the path that the packets traveled in , adding to its anonymity. An Onion address is how the packet gets there.

  • @daisybssh7741
    @daisybssh7741 3 роки тому +2

    "It's Facebook, we know where the servers are" that did not age well (4th of october, 2021)

  • @Athenas_Realm_System
    @Athenas_Realm_System 7 років тому +2

    With the in→out thing be possible to counteract by random padding going in that is dropped at the last node before being sent out, making it harder to correlate the two?

  • @sudokode
    @sudokode 7 років тому +2

    Somewhere out there someone is having a fit because the title says TOR instead of Tor.

  • @cuuboid478
    @cuuboid478 7 років тому +1

    I like the ghost cube up on the shelf.

  • @Laayekthar
    @Laayekthar 7 років тому +12

    Please make a video about h265 and h264.
    I understand that h265 is more efficient? and should give a better quality at the same bitrate..
    but which has better quality 2.6GB h264 1080p or 580MB h265 1080p?

  • @phoenix2464
    @phoenix2464 7 років тому +7

    best books for networking and cloud computing ?

    • @afonsohipolito6983
      @afonsohipolito6983 5 років тому +1

      phoenix go to hidden wiki and search for library links

  • @joyalmathew2156
    @joyalmathew2156 5 років тому +3

    Is there something in place that prevents the IP and the RP from being the same router?

  • @Tiesproductions
    @Tiesproductions 7 років тому +1

    Maybe I didn't get this right, but with the single union facebook example you described, coulnt someone theoreticaly still sniff at the entry node and exit node to do a corilation based attac, since the exit node can know the identity of the server?

    • @heyandy889
      @heyandy889 7 років тому +3

      Tiesproductions yes this is an issue with tor in general - a sufficiently powerful adversary with global knowledge of the network could (theoretically) correlate all the network's input and output messages to identify the users and their destinations. however this is already the situation of the internet without tor, so by using tor you are increasing an adversary's effort by a significant margin.

  • @CodeCommand
    @CodeCommand 7 років тому

    create your own channel Dr Pound!

  • @levitatingbusinessman2560
    @levitatingbusinessman2560 2 роки тому +1

    So when do we get an I2P video?

  • @Evanski
    @Evanski 6 років тому +2

    How can the dark web be so bad if people are just sharing "cookies"?

  • @hicknopunk
    @hicknopunk 7 років тому

    I love your videos Mike! *hugs*

  • @tedchirvasiu
    @tedchirvasiu 7 років тому +3

    5:30 - Until recently? So it means now there's an easy way of finding secret services?

  • @qm3ster
    @qm3ster 4 роки тому +1

    Where can I read more about Facebook's integration?
    Is this just something an `.onion` service can choose to do - connect directly to rendezvous node?

  • @noway2831
    @noway2831 6 років тому +2

    Could you randomly divide the traffic (every 8,16 or 24 bits) between 3 different, unconnected circuits?

  • @TheSam1902
    @TheSam1902 7 років тому +7

    The more I think about hidden services and the more it appears that it's in effect a virtual drug dealer network. There are people trying to buy (clients), people producing and selling (servers), people that redistribute the drug (dealers, here introduction points), and then rendez-vous places where to buy the drug. It's really amazing to see it that way, it makes perfect sense lol.

    • @boboften9952
      @boboften9952 5 років тому +1

      Yes , the dealer is trying to stop you seeing the supplier.

    • @simmisvans
      @simmisvans 3 роки тому

      @@boboften9952 ææp 8 8kg lo

  • @KutWrite
    @KutWrite 6 років тому +1

    Funny to see continuous computer paper again!

    • @deafuchihahockminhyuk5543
      @deafuchihahockminhyuk5543 4 роки тому

      Nanti faham bodoh siapa orange bodoh
      Nanti aku i mati hahah hati faham oh what hahhaa sad oh hati hahaha faham cuba? Ah hahaha ape ape ape? benci bodoh okay saying cuba faham okay bodoh hati failmy sad aku maaf untuk oh nangis kau bagus tahu maaf saying i aku mati nanti faham saying along and angel marah oh what really siapa hahaha marah why mati aku said what marah oh oh nanti faham cuba siapa tipu lelaki orange lelaki nice hati hehehe yeat 👊👊👊👊👊👊👊😡😡😡😡😡😡
      😪😪😪😪😪😪😪
      🍂🍂🍂🍂🍂🍂🍂
      🔞🔞🔞🔞🔞🔞🔞
      💔👉💡A + B nanti mati 💡👈💔
      (i,r) 💘🙊🖕👊🖕🍂😡
      👉fakarruddin cinta i tahu hati sekolah bagus hati sad nanti oh tahu suka orange perepamnu sad really rindu hmm mana i aku nanti mati sad hati faham oh siapa?👈💡🙊🐶🐱🐹🐰🐭🦊🐻🐼🐷🐮🦁🐯🐤🐥🦅🐺🐗🐒
      🍂😒🔞😞😰👫🙊🍂👼👉hati Malaysia said and Kalau Terengganu sad and my Dungun,Terengganu said and Malaysia K.L said?
      👊👊👊👊👊💔💔💔💔🔞🔞🔞🔞🍂🍂🍂🍂🍂👼👼👼🔞😒😒😒😒
      🍂👉No end
      🍂👉No Dad
      What nanti baik faham okay bodoh okay cuba hati suka🍂😪🖖👉 fatah and hafiz hahahah hehehe hati faham nangis maaf aku tak cinta aku gila aku maaf boom him call marah nanti ape ape ape marah bodoh me me me. Call kenp nice hahahahahaha sad nanti cis benci him tipu 🖕👊🍂👉hayati and fakaruddin and siapa orange lelaki hehehe nice hati bodoh maaf aku oh what maaf kenp siapa nanti allah nanti failmy nangis tahu maaf aku saying hmm mana i aku mati saying along and angel 3,2,1,4 nangis hati nanti rumah dalam nanti mati baik baik benci bodoh faham benci bodoh cuba salah call cis benci bodoh kau fatah and hafiz aku tak cinta hahahaha nangis nice gila aku sad marah hahahaha me me call sad boom kenp oh nanti nangis boom oh kenp mati hati sad malaysia bagus tahu boom sad cis hahahahaaaaaaaa! nanti sad marah benci cis? bodoh okay hati sad nanti siapa 🖖😡🔞🙈😈👊😡👊😡🖕🖕👉mana fakaruddin and hayati maaf aku fahma oh aku maaf cakp him siape bodoh benci orange lelaki nice hahhahaha gila aku suka nice aku mls solat hahahaha oh cis benci okay bodoh okay my oh i said like really like why haahah why no no no a and b hati nangis perepmanu orange ibu ank rindu hmmm really mana i aku hahahaha sad tak cinta aku oh what oh marah said why siapa nice oh jangan oh kan?? aku siapa name? Perepmanu orange? ape like no no no 😈 orang saying maaf suka mana i aku mati nanti baik said😡😡😡😡😡🍁🍁🍁🍁🍁🍁😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪
      😭😰🍂my like said why like why like my said like?👉🇲🇾🇺🇸🇯🇵🇰🇷🇧🇳🏳️‍🌈🇺🇳🏳‍⚧
      😡👊🖖🖕💋🖕😡👊oh hati tegok tahu oh👉🇮🇳🇨🇮🇮🇪vs🇮🇩vs🇲🇦vs🇻🇳vs🇹🇭vd🇳🇵
      Said what nice boom sad oh siapa nice sad okay hati suka what kenp bodoh really kenp siapa what oh nice nanti sad faham jangan🍂😪🖖👉 failmy sad macam hati nangis rindu hati ada nanti oh hmmmm sad rindu mana i aku mati kenp siapa nice?? 😡🍁👊👊👊💔💔💔🍁🍁🍁🍁
      ⏳🍂 hati macam cuba nice malaysia sad? hati?👉🅰 and 🅱👈💢💢⚠💡💡
      said said said hati aku jnagan hahahaha bodoh cuba faham sama 😪🍂👉failmy huhu nangis sad hmmmm jangan rindu hmmm mana i aku mati sad ape ape ape ape baik
      hahahahahahaaaaa ape ape ape ape oh what oh kenp?😡😡😡🍂🍂🍂👊👊👊👊👊👊👊💔💔💔💔💔💔🍂🍂🍂🍂🍂🍂🍂🍂🍂🍂🍂👼🔞🔞🔞🔞😒😒😒😒
      😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕

    • @deafuchihahockminhyuk5543
      @deafuchihahockminhyuk5543 4 роки тому

      Nanti faham bodoh siapa orange bodoh
      Nanti aku i mati hahah hati faham oh what hahhaa sad oh hati hahaha faham cuba? Ah hahaha ape ape ape? benci bodoh okay saying cuba faham okay bodoh hati failmy sad aku maaf untuk oh nangis kau bagus tahu maaf saying i aku mati nanti faham saying along and angel marah oh what really siapa hahaha marah why mati aku said what marah oh oh nanti faham cuba siapa tipu lelaki orange lelaki nice hati hehehe yeat 👊👊👊👊👊👊👊😡😡😡😡😡😡
      😪😪😪😪😪😪😪
      🍂🍂🍂🍂🍂🍂🍂
      🔞🔞🔞🔞🔞🔞🔞
      💔👉💡A + B nanti mati 💡👈💔
      (i,r) 💘🙊🖕👊🖕🍂😡
      👉fakarruddin cinta i tahu hati sekolah bagus hati sad nanti oh tahu suka orange perepamnu sad really rindu hmm mana i aku nanti mati sad hati faham oh siapa?👈💡🙊🐶🐱🐹🐰🐭🦊🐻🐼🐷🐮🦁🐯🐤🐥🦅🐺🐗🐒
      🍂😒🔞😞😰👫🙊🍂👼👉hati Malaysia said and Kalau Terengganu sad and my Dungun,Terengganu said and Malaysia K.L said?
      👊👊👊👊👊💔💔💔💔🔞🔞🔞🔞🍂🍂🍂🍂🍂👼👼👼🔞😒😒😒😒
      🍂👉No end
      🍂👉No Dad
      What nanti baik faham okay bodoh okay cuba hati suka🍂😪🖖👉 fatah and hafiz hahahah hehehe hati faham nangis maaf aku tak cinta aku gila aku maaf boom him call marah nanti ape ape ape marah bodoh me me me. Call kenp nice hahahahahaha sad nanti cis benci him tipu 🖕👊🍂👉hayati and fakaruddin and siapa orange lelaki hehehe nice hati bodoh maaf aku oh what maaf kenp siapa nanti allah nanti failmy nangis tahu maaf aku saying hmm mana i aku mati saying along and angel 3,2,1,4 nangis hati nanti rumah dalam nanti mati baik baik benci bodoh faham benci bodoh cuba salah call cis benci bodoh kau fatah and hafiz aku tak cinta hahahaha nangis nice gila aku sad marah hahahaha me me call sad boom kenp oh nanti nangis boom oh kenp mati hati sad malaysia bagus tahu boom sad cis hahahahaaaaaaaa! nanti sad marah benci cis? bodoh okay hati sad nanti siapa 🖖😡🔞🙈😈👊😡👊😡🖕🖕👉mana fakaruddin and hayati maaf aku fahma oh aku maaf cakp him siape bodoh benci orange lelaki nice hahhahaha gila aku suka nice aku mls solat hahahaha oh cis benci okay bodoh okay my oh i said like really like why haahah why no no no a and b hati nangis perepmanu orange ibu ank rindu hmmm really mana i aku hahahaha sad tak cinta aku oh what oh marah said why siapa nice oh jangan oh kan?? aku siapa name? Perepmanu orange? ape like no no no 😈 orang saying maaf suka mana i aku mati nanti baik said😡😡😡😡😡🍁🍁🍁🍁🍁🍁😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪😪
      😭😰🍂my like said why like why like my said like?👉🇲🇾🇺🇸🇯🇵🇰🇷🇧🇳🏳️‍🌈🇺🇳🏳‍⚧
      😡👊🖖🖕💋🖕😡👊oh hati tegok tahu oh👉🇮🇳🇨🇮🇮🇪vs🇮🇩vs🇲🇦vs🇻🇳vs🇹🇭vd🇳🇵
      Said what nice boom sad oh siapa nice sad okay hati suka what kenp bodoh really kenp siapa what oh nice nanti sad faham jangan🍂😪🖖👉 failmy sad macam hati nangis rindu hati ada nanti oh hmmmm sad rindu mana i aku mati kenp siapa nice?? 😡🍁👊👊👊💔💔💔🍁🍁🍁🍁
      ⏳🍂 hati macam cuba nice malaysia sad? hati?👉🅰 and 🅱👈💢💢⚠💡💡
      said said said hati aku jnagan hahahaha bodoh cuba faham sama 😪🍂👉failmy huhu nangis sad hmmmm jangan rindu hmmm mana i aku mati sad ape ape ape ape baik
      hahahahahahaaaaa ape ape ape ape oh what oh kenp?😡😡😡🍂🍂🍂👊👊👊👊👊👊👊💔💔💔💔💔💔🍂🍂🍂🍂🍂🍂🍂🍂🍂🍂🍂👼🔞🔞🔞🔞😒😒😒😒
      😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡😡🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🔞🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕🖕

  • @ImSoldat1
    @ImSoldat1 6 років тому +1

    2:22 and there goes a tree, "Timber!"

  • @mattf3531
    @mattf3531 2 роки тому

    as someone watching a lot of these videos in 2022, are these videos and the information provided still applicable now?

    • @GammaFn.
      @GammaFn. Рік тому

      It's 2023 now, and yes, it still is. There are some details which have changed (like the key length), but Mike didn't cover those details anyway.

  • @Jacob-Vivimord
    @Jacob-Vivimord 7 років тому +1

    I know next to nothing going into this, so forgive my ignorance with this question.
    You've said that if someone had control of the initial entry point into the network and the final exit node, that they could decode the information they wanted (right?).
    Some quick Google-fu leads me to believe there are less than 1000 exit nodes currently in operation.
    What's to stop, say, the NSA from generously starting up another 1000 exit nodes of their own, giving them a 50% chance of having control over any given exit node? Thereby effectively eliminating that second requirement and leaving them only with a need to sniff around at the initial entry point.
    Again, forgive me if I've completely misunderstood something (or several things).

    • @heyandy889
      @heyandy889 7 років тому

      Jacob Harrison yes this is a worrisome future, in fact the FBI employed such a measure in attempt to track activity of tor users.

  • @alejandrobueno8819
    @alejandrobueno8819 5 років тому

    Dr Mike Pound video? like it before watching it

  • @ayb100
    @ayb100 3 роки тому +1

    I would love to watch this guy have a conversation about TOR with Eli the computer guy. That would be interesting :)

  • @ss3lman40
    @ss3lman40 7 років тому

    Does Tor have one Master server that handles assigning the circuits of clients on initial setup or is that all done automatically? Like how does it know that this server is a circuit?
    Does the first circuit you connect to know your IP?

  • @jclad5145
    @jclad5145 7 років тому +1

    would it be possible to follow a trail of physical locations where each node is to link the server and the client?

    • @ruben307
      @ruben307 7 років тому

      they probably don't store their data.

    • @jclad5145
      @jclad5145 7 років тому

      What about cache, there has to be some sort of cache

    • @techmage89
      @techmage89 7 років тому +1

      Rovert2001 The network is designed to prevent this sort of thing. If you control two nodes involved, though, you can start to identify the nodes between them, but that's difficult given the randomness and number of nodes available.

  • @garrettgoucher9074
    @garrettgoucher9074 4 роки тому

    Is this the guy who looks through our webcams

  • @hobojoe1046
    @hobojoe1046 2 роки тому +1

    I would like to see a video about pluggable transports and how they work

  • @AdamRyman
    @AdamRyman 7 років тому +3

    What if the introduction point is compromised?

    • @Jojo_clowning
      @Jojo_clowning 5 років тому

      it won't matter because the communication is encrypted with public encryption, think of it like TLS.

  • @ValverdeHD
    @ValverdeHD 7 років тому +1

    You made a small mistake ._.
    The RP doesn't connect to one of the introduction points, it only
    receivces the one time secret at the beginning. Afterwards the client
    sends the one time secret and the address of the RP to an introduction
    point, encrypted with the public key of the server, through a tor
    circuit. The introduction point sends the package to the server, which
    connects through a new circuit, but with the same Guardian Node to the
    RP and tells it the secret.
    The rest of the video should be correct.
    (check the torproject docs, if you don't believe me)

  • @andywilson5677
    @andywilson5677 7 років тому +2

    How does the introduction point send a message back to the server if it doesn't know it's IP address?

    • @heyandy889
      @heyandy889 7 років тому +2

      Andy Wilson this is key insight of tor. it allows client and server to communicate without knowing each other's identity or location. broadly the concept is the same as using a proxy - obscures info about the client from the server. definitely check out FAQ on the Tor website and also how-to's from the EFF

    • @andywilson5677
      @andywilson5677 7 років тому

      Thanks. I didn't know the TOR circuit remained open between the server and the introduction point.

    • @heyandy889
      @heyandy889 7 років тому

      No prob. Yeah, initially the circuit remains open. Once the rendezvous point is established, then the Introduction Point is out of the picture - just client, hop hop rendezvous, hop hop server.

  • @Twisted_Code
    @Twisted_Code 5 років тому

    5:10 or a pastebin document publishing a big fat list of them (but usually only sharing the doc with a certain group), as is the case for some services

  • @dopplereffect7325
    @dopplereffect7325 6 років тому +1

    thanks. exited with the content of your channel , am a big fan.
    ....please i wish to ask ,are websites on the dark web coded with normal web languages???.

  • @coolfrisbee
    @coolfrisbee 5 років тому +1

    Unrelated, but I think it's very interesting that he writes left-handed, but uses a mouse in the right hand. Most likely this isn't his desk or office, but if any lefties out there have any insight or reasoning to this, reply! I'm curious. (also note the amount of fingerprints on the right side of the monitor, egregious as touching a screen may be)

  • @HarvardHeinous
    @HarvardHeinous 7 років тому +15

    onion rooters!

    • @Abby_Liu
      @Abby_Liu 4 роки тому

      onion is a root

    • @christopherellis2663
      @christopherellis2663 4 роки тому

      @@Abby_Liu a bulb, the roots are the little hairy bits on the end

    • @pauldowling2160
      @pauldowling2160 4 роки тому

      I say tomayto , you say tomato. I say potayto, you say potato

  • @phoenix2464
    @phoenix2464 7 років тому

    never have i smashed the like button so fast

  • @frodo279
    @frodo279 7 років тому +1

    Can you make a video explaining the math behind onion routing?

  • @Che8t
    @Che8t 7 років тому +29

    The FBI raided my house and I spent 100 years in jail because I forgot to clear my browser history

    • @nihlesten5753
      @nihlesten5753 7 років тому +3

      why is the fbi here

    • @theothersauce2569
      @theothersauce2569 7 років тому

      Why is the CIA hear

    • @lksw42439
      @lksw42439 6 років тому +3

      Who cares about your browser when your ISP sees everything you do

    • @dwalters98
      @dwalters98 6 років тому +6

      @@lksw42439 and that's where you realize people know nothing about the dark web and hacking if they claim to do it on their home network XD you take a junk laptop, a usb wifi card, and go to a mcdonalds 10 miles down the road and then do what you need to do.

    • @bkshr1172
      @bkshr1172 5 років тому +1

      @@dwalters98 that actually makes sense thanks

  • @masonmackall0
    @masonmackall0 6 років тому +1

    If the routers are publicly listed can someone actually go to the introduction router and demand that they give them the address they forward the messages to and keep doing that along the 3 nodes until the reach the server? Also is a vpn just a 1 router onion router?

    • @rationalism_communism
      @rationalism_communism Рік тому +1

      theres thousends of connections and are random, this is only works with clear net, traffic corelation only works in the clearnet, when using tor.

  • @dsbaidwan007
    @dsbaidwan007 4 роки тому

    That seemed safe with so many layers of anonymity and encryption. Unlike to what happens on a normal web. We would be throwing out much more info on a normal web than on dark web then why is it so that dark web is considered to be much more unsafe to browse than normal web?

    • @zachb1706
      @zachb1706 4 роки тому

      It’s mainly the content, tor has much more illegal stuff than the normal web

  • @Soraviel
    @Soraviel 7 років тому +1

    I love Tor for stuff that i can't gain access to (10 percent), while (95percent) of the stuff i reguarly have access to on the daily i use my other daily browsers are my Chrome browser and MSFT Edge.

  • @44Kokoloko
    @44Kokoloko 3 роки тому

    I know I'm late, but trying my hand here...
    Once the RP is set, how is the connection any more anonymous than usual, except for the added nodes? How is the traffic monitoring on both ends any harder?

    • @Treddian
      @Treddian 3 роки тому +1

      My understanding is that only the server will know when the message has reached the final hop. Anyone watching could just think that the server is another router in the chain.

  • @damiencallaghan9389
    @damiencallaghan9389 5 років тому +1

    The only cookie i know is the cookie monster from Sesame Street