Tor As Fast As Possible

Поделиться
HTML-код
  • Опубликовано: 18 апр 2016
  • The Tor network has become popular with people who want to stay hidden online. How does it work, and what are its limitations?
    TunnelBear message: TunnelBear is the easy-to-use VPN app for mobile and desktop. Visit tunnelbear.com/linus to try it free and save 10% when you sign up for unlimited TunnelBear data.
    Follow: / linustech
    Join the community: linustechtips.com
    License for image used in this video: creativecommons.org/licenses/...
  • НаукаНаука

Комментарии • 1,3 тыс.

  • @matt_lore
    @matt_lore 8 лет назад +2327

    Linus tech tips as fast as possible

  • @BobBobson
    @BobBobson 8 лет назад +130

    Fun fact: The Internet wasn't designed for privacy. It was designed for trusted computer to trusted computer connections. That's why it's so hard to try to be anonymous. And even with Tor, you can be tracked. It only takes one tiny piece of malware to report back outside of Tor and whoever wants to has your public IP.

    • @aleksaristic8278
      @aleksaristic8278 Год назад +2

      No

    • @guccihorsepiss2406
      @guccihorsepiss2406 Год назад

      You have a clear lack of knowledge in the fiels of lineair algebra and ICT. One doesn't just decode a fkn matrix at random with malware thats the whole point of encryption. (at least not without a quantum computer) edit: before I get blasted, there ofc are multiple techniques usually layered. often there will be one of these involved.

    • @MakerManX
      @MakerManX 11 месяцев назад

      ​@@aleksaristic8278non?

    • @mrdryw
      @mrdryw 10 месяцев назад +1

      What do u mean in non nerd

    • @mrdryw
      @mrdryw 10 месяцев назад

      Do you mean say ur on tor then u get a email then someone can access ur ip through that even tho its bouncing?

  • @TheHoaxHotel
    @TheHoaxHotel 8 лет назад +319

    I prefer to use 8-bit encryption. Faster debugging and I can route it through my Nintendo's memory card.

    • @georgek4416
      @georgek4416 3 года назад +2

      Lol

    • @agaveboy
      @agaveboy 2 года назад +8

      I prefer to call my webpages using assembly code, bypassing the drivers. It only takes me 5 days for debugging.

  • @ace7997
    @ace7997 8 лет назад +510

    “Whoever is in control of the exit nodes is also in control of the traffic, which makes me the one in control”
    - Mr. Robot

    • @truthbeyonddarkness4444
      @truthbeyonddarkness4444 8 лет назад

      +Arthur C yess

    • @brianboucher4248
      @brianboucher4248 6 лет назад

      Elliot.............. ET phone home....

    • @smellcaster
      @smellcaster 5 лет назад +4

      So why don't i have a TOR Exit Node running ? maybe because i'm lazy as Hell. OK most Traffic will be HTTPS but i stil can see where it goes. A hidden Service may also be nice.

    • @namz2k11
      @namz2k11 4 года назад +3

      Is there any truth to that quote?

    • @TerryGilsenan
      @TerryGilsenan 3 года назад +1

      @@namz2k11 Yep.

  • @iceeblister
    @iceeblister 8 лет назад +437

    Linus's web browsing history as fast as possible

    • @iceeblister
      @iceeblister 8 лет назад

      +Kendai Ren they already created such a thing you're thinking

    • @UniverseGOD2525
      @UniverseGOD2525 8 лет назад

      +iceeblister he didn't say that it's something "new"...

    • @Unicarn5279
      @Unicarn5279 7 лет назад +3

      It's nice not having to clear my browser cache, because I don't save anything in there to begin with.

    • @Lucifer3230
      @Lucifer3230 6 лет назад +1

      Incognito Mode FTW!

  • @iLOLZU42
    @iLOLZU42 8 лет назад +48

    "I got a feeling, that somebodys watching meeeee, got no privacy!"

    • @malachipg7576
      @malachipg7576 4 года назад +2

      Safing how to give away your IP address^

  • @IAMN0TGAY
    @IAMN0TGAY 6 лет назад +74

    3:59 thats the lady from the jealous girlfriend meme

  • @OneStepForwardOneStepForward
    @OneStepForwardOneStepForward 8 лет назад +125

    That segue at the end was 10/10

  • @knvern
    @knvern 8 лет назад +3

    how am I just finding your vlogs?
    just subscribed to you this week. love your videos, keep up the great work man 👌👍

  • @CocoaNutCakery
    @CocoaNutCakery 8 лет назад +759

    TOR was developed by the US government. You forgot to mention that. Specifically, it was put together by the US military, which explains why it was a government program that didn't completely suck.

    • @JamesDavern12
      @JamesDavern12 8 лет назад +2

      Yup

    • @laharl2k
      @laharl2k 8 лет назад +51

      no it wasnt. it was started by the navy and then funded. but iirc not they dont accet money from any gobernment or big corporation that could compromise the project's economic independence.
      You should hear applebaun talking. he makes it very clear they are there to give people tools to resist the nsa and such.

    • @CocoaNutCakery
      @CocoaNutCakery 8 лет назад +44

      Laharl Krichevskoy I never said that it is currently a project that the government is involved in, merely that it was developed by... I believe it was naval intelligence. It's since been handed over to a non-profit organization for updates and continued development.

    • @lululala4752
      @lululala4752 8 лет назад +3

      U.S. Navy

    • @robbliss7999
      @robbliss7999 8 лет назад +6

      +CocoaNutCakery If I remember right, they mentioned this in the Dark/Deep Web video, and as it isn't majorly important info, they probably decided that once is enough

  • @MultiRobotnik
    @MultiRobotnik 4 года назад +29

    Do _not_ torrent over Tor. A peer-to-peer connection, by definition, has to know your IP address. Torrents will reveal your real IP address to the trackers and peers. That’s why torrenting over Tor defeats the purpose.

    • @ARose47
      @ARose47 4 года назад

      So what's the alternative?

  • @saintintrovert
    @saintintrovert 6 лет назад +67

    One very important note, even though this video is dirt old dy now, is the fact that the US government are the main founders of the Tor network. It's mainly a network for spies and other intel gathering operations and it has to, in nature, be totally anonymous or else would ruin the cover hence why the Tor project exists. In order for the government to be completely invisible they have to melt in with the rest of the people using Tor. I feel like this is an important thing to note since I've seen a lot of people being afraid of using Tor because they think it's a bait, but as I said, in order to keep their spies hidden they must blend them in with the rest of the anonymous userbase because (even how weird this sounds) if a criminal on the Tor network isn't hidden, then there's also no guarantee that the person undercover isn't hidden either.

    • @dabbopabblo
      @dabbopabblo Год назад

      Thats like making a drink and saying" Because I want my drink to make people fly, it now makes them fly." Just because the Government may want and had designed tor to be as anonymous as possible does NOT meant bad actors cant exploit its weaknesses. There has never and most likely will never be anything that is unexploitable. The only way you can keep some form of information secure or private is by only storing it in one place. Your head. And even then your just a biological machine that one day very soon with the likes of technologies like neural links your mind will be able to be read just like a harddrive

  • @420BulletSponge
    @420BulletSponge 8 лет назад +49

    Watching this video gets you on the "list", welcome my "listed" brethren.

  • @seamusfrederick2927
    @seamusfrederick2927 8 лет назад +35

    I want to meet the guy that said "dang" in the background. He's gotta be cool

  • @9-11-01
    @9-11-01 8 лет назад +156

    Speaking of aggressive advertisers.... :P

    • @ericokompatzki7110
      @ericokompatzki7110 8 лет назад +2

      Was thinkin the same haha....at least it was tunnelbear and not ting

    • @cIownzone
      @cIownzone 8 лет назад +1

      +Erico Kompatzki
      HEIL SQUARESPACE
      E
      I
      L
      S
      Q
      U
      A
      R
      E
      S
      P
      A
      C
      E

    • @ericokompatzki7110
      @ericokompatzki7110 8 лет назад +1

      +Generic Throwaway you should.

    • @SikConVicTioN
      @SikConVicTioN 5 лет назад +2

      I wonder if Linus ever has or will make a video on using tunnel bear and explain that Canada is a 5 eyes country..

    • @adamschwartz9135
      @adamschwartz9135 3 года назад

      @@SikConVicTioN
      What That means ??

  • @Ashley_Dale
    @Ashley_Dale 8 лет назад +81

    You missed a bit in the video, you can be even more secure if you use a tor bridge. Tor bridges can be used as exit nodes but the operator of the node can't see your information at all. Plus tor bridges are not publicly listed unlike tor servers.

    • @JoonKimDMD
      @JoonKimDMD 5 лет назад +10

      Tor bridge is already added to the tor browser by default, no?

    • @Lord_Vertice
      @Lord_Vertice 2 года назад +3

      Some bridges are public, but you can request a private one. They're not necessarily more secure, the reason they exist is to get around networks that block normal entry nodes

    • @kipchickensout
      @kipchickensout Год назад

      can be used as exit nodes?

  • @martontichi8611
    @martontichi8611 8 лет назад +13

    The neighbor keeps 100 pounds of salmon in their garage.... Died laughing:))

  • @antdonkop
    @antdonkop 8 лет назад +7

    That was the best opportunity he has ever had for a great transition and he just did his normal "speaking of..." thing.

  • @marcus8player
    @marcus8player 8 лет назад +8

    The feeling when the sponsor at the end actually fits the video ^^

  • @karthibalaji3817
    @karthibalaji3817 6 лет назад +6

    Your videos and tutorials are very helpful to me bro, I think I could learn a lot from you ....cheers👍

  • @laBomba994
    @laBomba994 6 лет назад +7

    "as fast as possible" *proceeds to make jokes every 5 seconds*

  • @emptyskullify
    @emptyskullify 8 лет назад +24

    Tunnel Bear Linus link is broken

  • @sambalpark888
    @sambalpark888 8 лет назад +2

    Thanks LMG for featuring my suggestion on Tor Onion Routing AFAP! :D

  • @NIHALSINHA
    @NIHALSINHA 8 лет назад +1

    Techquickie is very nice , one can have full knowledge about that thing in less time . love this Linus

  • @ps3forthewinftw
    @ps3forthewinftw 8 лет назад +101

    I find it funny and kinda scary, that my ISP is literally called "Skynet".

  • @Temax6
    @Temax6 8 лет назад +8

    Hey why is the LTT techquickie playlist always 8 months behind? +Techquickie

  • @runescapefan0001
    @runescapefan0001 8 лет назад +19

    3:52 yea, "stuff" ;)

  • @jaredmulconry
    @jaredmulconry 8 лет назад +29

    In Australia, I've known someone who had their computer held by police specifically because Tor was installed on it. The assumption being that it is only used for hiding criminal activity.

    • @Gigachad-mc5qz
      @Gigachad-mc5qz 2 года назад +2

      pathetic lmao

    • @matthew8184
      @matthew8184 2 года назад +2

      I will never go to Australia

    • @BulletESV
      @BulletESV Год назад +1

      @U.S Department of the Treasury lmao

    • @jakelomas
      @jakelomas Год назад

      Are you sure the computer want running an exit node? Exit nodes are where the internet requests exit and if your IP address has been seen accessing illegal drug websites while you’re just running an exit node then their computer would be seized by the government since they probably didn’t know that the exit node on tor works like that.

    • @vocaloidsrock6987
      @vocaloidsrock6987 3 месяца назад

      Thanks for the protip!

  • @jacob4904
    @jacob4904 8 лет назад +36

    Hey Linus, nice shirt man!!!

  • @elliotmason5694
    @elliotmason5694 6 лет назад +5

    Best of all. you can set your exit node to a specific area.
    Like, i can set my exit node to someplace in australia. or someplace in China.

  • @Katuulu
    @Katuulu 7 лет назад +1

    Is tor completely safe to use if you only do regular stuff what u would do on a regular browser?

  • @NomyNomyNomNom
    @NomyNomyNomNom 8 лет назад +2

    Holy VRAM! A relevant end video ad!

  • @mdante6236
    @mdante6236 7 лет назад +4

    What you could do is get a flash drive with Linux, specifically the tails version. Have it as a live boot drive on your PC. On Linux tails get a VPN, a VM use together and then in the VM you can use tor.

  • @izy409
    @izy409 8 лет назад +3

    Can you please explain TPM and give a general overview of how it works and what all it does? Don't just say it enables BitLocker because that's the only think I know about it.

  • @eessppeenn001
    @eessppeenn001 6 лет назад +6

    One thing I'm curious about is how a computer knows what to do. Like, what happens if you press a key on the keyboard.
    Like: Is a value sent from the keyboard sent to a certain port in the processor (Let's say "Ctrl + C"). And then how would the processor analyze this value and determine that value is an order and not a letter. And then how would it move over to look for marked text in an open window and read the value (text and pictures that make up the marked content written in binary) there and symoltaniously write this value to it's own section in the memory (the clipboard).
    This was just an example with the "Copy to clipboard" command, but I'd like to know how the processor determines how to do one task over another. Move, copy, add, etc. data. How it knows what values to add together, and not everything stored in the memory.

  • @jensenex9270
    @jensenex9270 7 лет назад +1

    Thanks for sharing the Tunnel bear with us

  • @shrikantraut3864
    @shrikantraut3864 8 лет назад +32

    Apparently the videos are getting something like :
    1. This comes from this -- which you can learn from this video.
    2. Because of this -- which you can learn from this video.
    3. That leads to this -- which you can learn from this video.
    4. And results into that -- which you can learn from this video.
    5. Shave with DollarShaveClub, Make your website in squarespace, learn your shit from lynda.com and listen to those damn books from audible you piece of shit!
    like it if you liked it....
    Not complaining, I still love it though. Don't stop making'em.

  • @techtron2376
    @techtron2376 8 лет назад +5

    I don't understand how CMOS can both be a camera sensor AND a data storage chip. Anyone who knows a lot about electronics, could you please explain me how?

  • @patrickhebenstreit3824
    @patrickhebenstreit3824 3 года назад

    Thank you; Linus!

  • @SanatanSeekh1
    @SanatanSeekh1 3 года назад

    Getting Linus's pulseway ad on linus video 😂😂...The real tech OG🔥🔥🙌🙌

  • @optionalcoast7478
    @optionalcoast7478 8 лет назад +15

    Techquickie as fast as possible

  • @Freddie1980
    @Freddie1980 8 лет назад +13

    Linus gives some examples of who might want to use TOR and there are some noble reasons why an individual would want to but facts are facts - according to a recent report 80% of internet traffic on the Dark web is child abuse material so if anyone feels cynical about why someone is using TOR they have every right to IMO.

    • @MaZEEZaM
      @MaZEEZaM 7 лет назад

      Freddie1980 I was wondering about Tor in relation to using Torrent sites for the content I can't get in my country as our government is about to block access to them. Tor feels to dodgy for my liking 😨

    • @vocaloidsrock6987
      @vocaloidsrock6987 3 месяца назад

      Thanks for the information!

  • @assassin132132
    @assassin132132 7 лет назад +2

    i was waiting for the TunnelBear ad :D

  • @Someone-wall
    @Someone-wall 6 лет назад +1

    i was listening to this in the background and i thought it was an add segment until Linus started taking about
    tunnel bear

  • @TheFilledk
    @TheFilledk 8 лет назад +48

    Linux as fast as possible!

    • @vwestlife
      @vwestlife 8 лет назад +5

      Comment flame wars as fast as possible!

  • @marcusmellor9424
    @marcusmellor9424 8 лет назад +9

    I always thought it was a router from The Onion.

  • @theodoros_1234
    @theodoros_1234 8 лет назад +17

    What's safer? Should I make a VPN server and install Tor on it, or should I install Tor on my computer and then connect to the VPN server?

    • @as505gaming
      @as505gaming 8 лет назад +12

      +Theodoros Nicolaou If you want a secure way to browse the web, ask nigerians. They provide the best security, as long as you pay them a small fee, and prove that you are real by giving them ssomething like your credit card info. Safe browsing! ^^

    • @theodoros_1234
      @theodoros_1234 8 лет назад +1

      +as505 Yeah, sure! They're not gonna steal my money when I give them my credit card.

    • @as505gaming
      @as505gaming 8 лет назад

      Theodoros Nicolaou exactly!! ^^ safe browsing!

    • @MegaHappyzombie
      @MegaHappyzombie 8 лет назад

      +Theodoros Nicolaou Connect to your vpn first, then tor

    • @brianboucher4248
      @brianboucher4248 6 лет назад

      Nord VPN, promo price to sign up for 2 yrs for $79. > $3.29/month

  • @themike97_58
    @themike97_58 7 лет назад +3

    A lot of nodes are monitored by the NSA so just because your packets are encrypted doesn't mean the NSA can't keep track of packet movement.

  • @Kireddo
    @Kireddo 8 лет назад +3

    The sound is really weird. There are echo and some kind of white-noise as if the microphone is too sensitive.
    And I only get this with LinusTechtips and TechQuickie. I'm using an Audio Technica ADG1X with en external soundcard and do professional work with it, so its not on my side.
    Edit: There are some popping aswell.

    • @MisplacedSloth52
      @MisplacedSloth52 8 лет назад +1

      +Odd-Erik Bakkebø I'm hearing the same thing, but this is the first video I've really been able to notice it on

  • @JohnJaggerJack
    @JohnJaggerJack 5 лет назад +3

    The moment you download tor you've already been caught, because lets use common scene here, if the "authorities" go into your network traffic, provided by law from your ISP, and isolate that one file you downloaded from the tor website your name is already in some list. Best option is to get a flash drive from someone else with the installation file in it.

  • @thetrancebytes
    @thetrancebytes 8 лет назад +2

    I'm using it for years already. It used to be pretty private for government, army and such.

  • @Miska_Blue
    @Miska_Blue 7 лет назад

    Please do a review on this:
    Thermaltake Versa C22 RGB ATX Mid-Tower Chassis
    I am wondering if this is a good case

  • @KevinVandyTech
    @KevinVandyTech 8 лет назад +383

    system 32 virus as fast as possible

    • @MimOzanTamamogullar
      @MimOzanTamamogullar 6 лет назад +10

      Kevin Vandy I hope you are joking

    • @TheRealFrankWizza
      @TheRealFrankWizza 6 лет назад +12

      delete it

    • @Raghavddude
      @Raghavddude 6 лет назад +1

      Shift delete it

    • @nikkcade4481
      @nikkcade4481 6 лет назад +9

      if you cant understand sarcasm...
      you're probably reading this comment and have replied to the same comment I have replied to.

    • @et0474
      @et0474 5 лет назад +1

      System 32 isn't a virus

  • @NarcoticVibes
    @NarcoticVibes 8 лет назад +5

    I use Tunnel Bear for Spotify :3

  • @sam-ir8wx
    @sam-ir8wx 3 года назад +1

    I'm unable to understand what is the exit nodes problem, is it when someone on your same network use wireshark?

  • @JDaTopo
    @JDaTopo 7 лет назад

    What if you're not trying to enter any personal info, you're just trying to get to a website that you can't get to on a regular ip? Or if you're not forcing any apps to use it? Will it still leak info?

  • @yud5410
    @yud5410 5 лет назад +4

    Me : watches this video
    My brain :
    *YEAH SCIENCE!!!*

  • @theorangefly9754
    @theorangefly9754 4 года назад +6

    Downloaded TunnelBear, and it is actually awesome. I also like the little pictures of the bear when you travel to a new location!

  • @Apocryphon368
    @Apocryphon368 8 лет назад +1

    Explain 5G and M2M next, would love to hear more. Or even SDN (Software Defined Network)

  • @andrewworkman6943
    @andrewworkman6943 8 лет назад

    audio interfaces? what should i get for my first one?? please help!

  • @datachu
    @datachu 6 лет назад +34

    a. Honestly, I'd trust a TOR exit node more than I'd trust a consumer-available VPN service.
    b. Using both TOR and VPN is pointless, as the VPN can still see everything anyway.
    I don't have to worry about that though, 'cause I set up my own VPN! Plus, I can run it through TOR as well.
    Gotta feel sorry for those loosers who actually pay for a VPN service like Tunnel Bear.

    • @Shadow77999
      @Shadow77999 5 лет назад +19

      How do you do that oh wise hackerman?

    • @andrewsampton
      @andrewsampton 4 года назад

      Tunnelbear is FREE🤦‍♂️

    • @unknown-ge1ik
      @unknown-ge1ik 3 года назад

      @Nigel YING It is TOR because it comes from The Onion Router.

    • @vocaloidsrock6987
      @vocaloidsrock6987 3 месяца назад

      And what makes you think the Tor exit node cannot steal the data you are sending over it?

  • @UntouchedWagons
    @UntouchedWagons 8 лет назад +6

    LVM and/or ZFS as fast as possible.

  • @kingunicorn7353
    @kingunicorn7353 8 лет назад

    wow this time the ad spot goes kinda well with the subject

  • @DerWLANKabelVerband
    @DerWLANKabelVerband 8 лет назад +2

    So when somebody does something criminal on Tor:
    -What happens to the one on the "End-Node"?

  • @hence0182
    @hence0182 8 лет назад +6

    Well basically anything you send, shouldn't give away who you are.(Like writing a message with your name in it). Other than that its basically inpenetrable encryption. Im actually amazed how smart this is and sad for how evil its users are(mostly)

  • @gladyszryan
    @gladyszryan 7 лет назад +10

    anyone else get a random push notification for this today, November 3rd,2016?

  • @arzoo_singh
    @arzoo_singh 5 лет назад +1

    Exactly that is what I was looking for "Anyone could run an exit Nodes , infact they could drive all yore traffic through certain nodes" . This is where they are playing for sure .

  • @v4nd4lizm403
    @v4nd4lizm403 8 лет назад +1

    Can you do a techquickie on tails (the amnesic incognito live system)

  • @uncleirohfan3930
    @uncleirohfan3930 5 лет назад +6

    I can trust my vpn. I checked on the logs file and it only logged me connecting to a sever and what time

  • @Lord_Vertice
    @Lord_Vertice 2 года назад +3

    Idk man, Tor + HTTPS is basically fully secure. Yes you can do some really fancy stuff to still find people, but that takes a lot of ressources and you must've made some big governments very mad to be afraid of that happening. Other than that, as long as you make sure all websites use HTTPS (the plugins make sure of that by default) you're literally fine and nobody can read your stuff, exit node or not.

  • @glw607
    @glw607 4 года назад

    Would the use of TOR combined with a VPN be secure enough for things like online banking or buying/selling crypto (with a hardware wallet)?

  • @CatWithoutAHat901
    @CatWithoutAHat901 8 лет назад

    Hey Linus, what is with tails? The Linux OS that you can install on a USB Stick and boot from it.Is Tor on this safer than on Windows?

    • @cldream
      @cldream 8 лет назад

      It's relatively more tightened in security to prevent leaks. But it still depends on the apps you use and your browsing habits.

  • @geardd
    @geardd 5 лет назад +3

    You forgot to mention how Tor is a project of the US Military

  • @patrickkeller2193
    @patrickkeller2193 7 лет назад +4

    You shoulkd have titled it "Tor EXPLAINED as fast as possible" I thought this was a video about improving Tor Performance

  • @kylez0
    @kylez0 8 лет назад +2

    TOR also means Tornado Warning in weather world, too lol

  • @32th
    @32th 8 лет назад +1

    With Tor you can also browse blocked webpages at school and work computers and networks

  • @austinflavio3457
    @austinflavio3457 8 лет назад +8

    Onions are MOIIISSSSSSSTTT

  • @jjfav2231
    @jjfav2231 8 лет назад +22

    I should not have clicked on this video. Now a bunch of Deep/Dark Web videos came up and im super scared

    • @jjfav2231
      @jjfav2231 8 лет назад

      *****
      The internet is so scary so now im listening to the dog theme from undertale and im happy again

    • @subi5086
      @subi5086 6 лет назад +3

      lol listen to it´s raining tacos XD

    • @Chris_Cross
      @Chris_Cross 5 лет назад

      Watch out for the Noir, Lukas, and The Dollmaker...

    • @Bluedragon2513
      @Bluedragon2513 5 лет назад

      Uh..sorry, three years later, but.. clicking on this video just made the algorithm recommend you more videos of this topic. Nothing too scary.

  • @michaelphillips7017
    @michaelphillips7017 8 лет назад

    I want to see TunnelBear in a Mario game. Seems like he'd fit right in.

  • @OfficialMarlow2000
    @OfficialMarlow2000 8 лет назад

    Could you make an episode on wall power, and how it can impact a pc, cause I cant find no information about this topic ENYWHERE!

  • @TheRealKing44
    @TheRealKing44 8 лет назад +5

    question do you ever do giveaways? I really need a new processor for my pc, just wondering.

    • @TheRealKing44
      @TheRealKing44 8 лет назад +1

      +Jonathan Christensen I can afford that, and ram.

    • @Peter-lt3ey
      @Peter-lt3ey 8 лет назад +3

      Lol you have like a 1/1000000000 chance of winning anyways lol

    • @scoutdrago4
      @scoutdrago4 8 лет назад +1

      +NickCraft Productions Check out his other channels. Go to this channel's page and look at the "My Other Channels" tab. He does a good amount on those. And NCIX does some as well (and Linus works there, I believe).

    • @EpicSuccessESG
      @EpicSuccessESG 8 лет назад +1

      Buy one

  • @countys32
    @countys32 5 лет назад +6

    So another advertisement disguised as helpful information

  • @MrtinVarela
    @MrtinVarela 8 лет назад +2

    I already saw that add coming before clicking on the video.

  • @gw10758
    @gw10758 4 года назад

    Good info. Thanks

  • @MultiAlessndro98
    @MultiAlessndro98 8 лет назад +3

    1:44 Perspective.

  • @System-br1tx
    @System-br1tx 6 лет назад +7

    "??so i should uninstall chrome and use "tor"

    • @unbe0
      @unbe0 3 года назад

      If you really value privacy, yes. If you value speed over privacy, then no.

  • @AFTstorm
    @AFTstorm 7 лет назад

    i created a type of network for a chat application that uses this protocol aswell as an end2end encryption on top of it. It was a nice school project

  • @RizviRab
    @RizviRab 8 лет назад +2

    Tor feels great to use though! I used it the first two days I had it but started missingmy chrome extensions and mow it's just taking up space on my desktop...
    Why did I install it on my desktop?

    • @wesofx8148
      @wesofx8148 8 лет назад +1

      Uninstall it, brah!

    • @itsFiftyy
      @itsFiftyy 8 лет назад

      +Rizvi Rab You didn't use windows did you?

    • @RizviRab
      @RizviRab 8 лет назад

      FiftyPercentHealth I did, but for some reason, the installer defaulted to the desktop for the location :P I just uninstalled it :D

    • @itsFiftyy
      @itsFiftyy 8 лет назад +1

      Never use windows with Tor

  • @ciyaresh2070
    @ciyaresh2070 8 лет назад +32

    Here's the shorter version.
    Tor: placebo effect.

    • @diegofu1
      @diegofu1 8 лет назад +3

      In what way does the placebo affect apply?

    • @svenhoek
      @svenhoek 8 лет назад +8

      +diegofu1 Users think they are safe, when in reality, they are not. NSA GHCQ run many exit nodes themselves, and private exit nodes are easily compromised. Let's not even get into traffic analysis.

    • @Tb0n3
      @Tb0n3 8 лет назад

      +Mark Z It's only a problem if they keep scaring away those who operate exit nodes. The more there are the safer and faster the network is.

    • @svenhoek
      @svenhoek 8 лет назад +3

      Tb0n3 You don't know who is operating the exit nodes. That is the point. Could be private, could be NSA, FSB, GHCQ. If you are willing to roll the dice, go for it.

  • @Gigaheart
    @Gigaheart 8 лет назад +7

    The Tor Network never used to be slow. It's slow because little idiots are using Bitorrent over it, thinking they are protected, when they aren't.

    • @UniverseGOD2525
      @UniverseGOD2525 8 лет назад

      I can't access normal sites with tor.. Only deep sites are accessible.

    • @Shadow77999
      @Shadow77999 5 лет назад

      That doesnt make sense. You can browse almost any site..

  • @andrewkoch4213
    @andrewkoch4213 7 лет назад

    Linus you're my hero

  • @calvesman.willem
    @calvesman.willem 8 лет назад

    history of linus as fast as possible please

  • @21minute
    @21minute 6 лет назад +6

    Has there ever been an improvement on Tor’s data speed? For almost a decade I keep hearing that it’s super slow and it’s not ideal for video streaming or downloading.

    • @Lord_Vertice
      @Lord_Vertice 2 года назад +3

      The speed is suitable for everything but those two things. In fact, some nodes in the network actively throttle connections that try to download a lot of data. Keep in mind that the network was made for people who need to get around censorship to gain access to unbiased daily news or research, as well as journalists and military to communicate securely. The network isn't supposed to provide single high speeds, but it's spread out by design, even to places that naturally have slower connection speeds. Visiting twitter or sending emails works just fine, but downloads and videos put a HUUUGE strain on the entire network, disturbing all other users and making the whole thing slower for everyone.
      So it's not just not ideal for those things, you _really should not do them at all_ to make sure the network stays accessible for those who need it.

  • @Kletterhaus
    @Kletterhaus 8 лет назад +6

    Every pc at my school has toor.

    • @Kletterhaus
      @Kletterhaus 8 лет назад

      tor

    • @vapenation7061
      @vapenation7061 8 лет назад +24

      cool

    • @mika2666
      @mika2666 8 лет назад +1

      +Mountainpixels at our school we have a proxy server which blocks certain sites, so tor solves our problems :)

    • @Kletterhaus
      @Kletterhaus 8 лет назад

      Mikat our School is smal 70 People we dont have someting like this

    • @Lucids
      @Lucids 8 лет назад +1

      +Mountainpixels cool

  • @shuma_puffington3809
    @shuma_puffington3809 8 лет назад +2

    The last time I was this early, was probably like a week ago.

  • @antargaming1619
    @antargaming1619 4 года назад

    Can anyone help me with sending a program through tor network? I can't find answers online and most of the programs that did this don't work or are gone.

  • @mtrmx2621
    @mtrmx2621 8 лет назад +3

    ogres are like onions, onions have layers ogres have layers

    • @rich1051414
      @rich1051414 8 лет назад

      +MTRREMX Yep, and just like onions, all the layers stink.

    • @mtrmx2621
      @mtrmx2621 8 лет назад

      Richard Smith lol nice

  • @silaseacret6441
    @silaseacret6441 5 лет назад +3

    "Or maybe even me..." hahahhahahahahah. Is there anyone at Linus Media Groups that could get access and decrypt my data? I doubt it.

  • @TheAlchemistDavid
    @TheAlchemistDavid 2 года назад +1

    This guy is still around? 🤣🤣🤣. I remember watching him long ago. He’s so funny.

  • @hoteit123
    @hoteit123 8 лет назад +1

    It's lile Techquickie knows what I've been having questions about...