1 00:00:04,240 --> 00:00:07,960 Speaker 1: Get in touch with technology with tex Stuff from dot 2 00:00:07,960 --> 00:00:14,920 Speaker 1: com either and welcome to tex Stuff. I'm Jonathan Strich 3 00:00:15,040 --> 00:00:19,600 Speaker 1: and we have a special person joining us this week. 4 00:00:20,239 --> 00:00:23,079 Speaker 1: Special persons. That makes it sound a little bit well, 5 00:00:23,120 --> 00:00:26,120 Speaker 1: he's a special guest. There you go. And he is special. 6 00:00:26,320 --> 00:00:28,960 Speaker 1: He's very special. He is he is our good friend 7 00:00:29,120 --> 00:00:32,800 Speaker 1: and yours. Uh. He's the guy who tells you the 8 00:00:32,840 --> 00:00:39,360 Speaker 1: stuff that they don't want you to know. Mr. Been Both. Hey, guys, thanks, 9 00:00:39,680 --> 00:00:41,920 Speaker 1: thanks so much for having me on the show. I've 10 00:00:41,960 --> 00:00:46,880 Speaker 1: got news from my co host Matt Frederick. Unfortunately, Matt 11 00:00:47,040 --> 00:00:51,000 Speaker 1: is diligently working. Uh and right now he said he 12 00:00:51,280 --> 00:00:54,720 Speaker 1: is here in spirit, um, but he can't be in 13 00:00:54,720 --> 00:00:57,920 Speaker 1: here in person, right he he is. Actually, he had 14 00:00:57,960 --> 00:00:59,760 Speaker 1: planned on joining us and this would have been a 15 00:01:00,240 --> 00:01:04,679 Speaker 1: crazy four person podcast, something that has never been attempted 16 00:01:04,800 --> 00:01:08,560 Speaker 1: ever in the history of the Internet. I'm not sure 17 00:01:08,600 --> 00:01:11,720 Speaker 1: if that's but yeah, no, very impressive, yes, at least 18 00:01:12,440 --> 00:01:16,080 Speaker 1: the history of tech stuff at anywhere. So but unfortunately, 19 00:01:16,160 --> 00:01:18,560 Speaker 1: as he is, he has slammed. He of course is 20 00:01:18,600 --> 00:01:21,200 Speaker 1: also a video editor and uh, you guys might not 21 00:01:21,360 --> 00:01:24,760 Speaker 1: know this. Uh, that takes some time. So but the 22 00:01:24,760 --> 00:01:27,080 Speaker 1: reason we decided to bring Ben in is because you 23 00:01:27,120 --> 00:01:30,199 Speaker 1: may remember if you listen to this show often. Back 24 00:01:30,240 --> 00:01:33,240 Speaker 1: in April, Lauren and I did an episode about tour 25 00:01:33,560 --> 00:01:36,640 Speaker 1: and the Deep Web, and at the end of the 26 00:01:36,640 --> 00:01:39,160 Speaker 1: show we said, hey, guys, would you like to learn 27 00:01:39,240 --> 00:01:41,880 Speaker 1: more about how you can actually surf the web anonymously? 28 00:01:42,319 --> 00:01:45,480 Speaker 1: And all of you said yes, every single life. In fact, yeah, 29 00:01:45,520 --> 00:01:48,840 Speaker 1: some of you voted more than once, which we appreciate 30 00:01:48,880 --> 00:01:52,040 Speaker 1: the enthusiasm. So we have been trying to find the 31 00:01:52,120 --> 00:01:54,680 Speaker 1: right time to to get together and have a discussion 32 00:01:54,720 --> 00:01:58,800 Speaker 1: about what exactly it takes to really serve the web 33 00:01:58,880 --> 00:02:03,040 Speaker 1: anonymously and and Ben, as we have all discovered, it's 34 00:02:03,080 --> 00:02:05,920 Speaker 1: it's not it's not just a simple thing that you 35 00:02:06,000 --> 00:02:08,000 Speaker 1: hit a little switch in your browser and you're good 36 00:02:08,000 --> 00:02:12,440 Speaker 1: to go. Yeah. It's a situation where we quickly learn 37 00:02:12,520 --> 00:02:15,800 Speaker 1: the difference between the concept of something being possible and 38 00:02:15,840 --> 00:02:19,840 Speaker 1: the concept of something being plausible. Yeah, it is possible 39 00:02:20,400 --> 00:02:25,799 Speaker 1: two access the web anonymously finger quotes if you're very, 40 00:02:25,880 --> 00:02:27,480 Speaker 1: very careful and you take a lot of time and 41 00:02:27,520 --> 00:02:30,119 Speaker 1: you do some things that we're going to talk about today. Uh, 42 00:02:30,160 --> 00:02:32,920 Speaker 1: it is not plausible that you will succeed. It's not 43 00:02:33,040 --> 00:02:37,959 Speaker 1: plausible certainly the more frequently you access the web, absolutely right, Yeah, 44 00:02:38,000 --> 00:02:40,120 Speaker 1: because the more times you need to do it, the 45 00:02:40,200 --> 00:02:43,600 Speaker 1: harder it's going to become for you to to to 46 00:02:43,639 --> 00:02:46,200 Speaker 1: sustain that anonymity, and the more you want to do. 47 00:02:46,320 --> 00:02:48,680 Speaker 1: If you're doing like one thing, that's fine. If you're 48 00:02:48,720 --> 00:02:51,639 Speaker 1: trying to browse Netflix, it's not really Yeah, if you're 49 00:02:51,680 --> 00:02:55,040 Speaker 1: logging into your Netflix account, really, uh, we have some 50 00:02:55,120 --> 00:02:58,200 Speaker 1: bad news for you. Anything that involves the user name 51 00:02:58,240 --> 00:03:03,240 Speaker 1: password probably not really the most anonymous of activities. But first, 52 00:03:03,480 --> 00:03:05,799 Speaker 1: just as an overview, Yeah, there are a lot of 53 00:03:05,880 --> 00:03:10,200 Speaker 1: different reasons why someone might want to serve the web anonymously. 54 00:03:10,680 --> 00:03:14,200 Speaker 1: Some are even completely legit. Yeah, there we can get 55 00:03:14,200 --> 00:03:17,160 Speaker 1: the the the ones, the shady ones out of the way. 56 00:03:17,200 --> 00:03:20,480 Speaker 1: I mean, obviously if you're planning on doing something that 57 00:03:20,680 --> 00:03:28,320 Speaker 1: is you know, not strictly speaking legal. Yeah, Like, uh, Lauren, Jonathan, 58 00:03:29,040 --> 00:03:31,960 Speaker 1: you and I Matt decide that it's finally time that 59 00:03:32,040 --> 00:03:34,080 Speaker 1: we robbed that bank, and then we say, okay, there 60 00:03:34,080 --> 00:03:36,040 Speaker 1: are a couple of things we need to learn about 61 00:03:36,080 --> 00:03:40,000 Speaker 1: banks and security cameras and escape routes and stuff like that. 62 00:03:40,200 --> 00:03:44,320 Speaker 1: We would want to serve the web anonymously, but that is, 63 00:03:44,800 --> 00:03:46,880 Speaker 1: as you said, just something we need to get away 64 00:03:46,880 --> 00:03:52,240 Speaker 1: from at the top, because there are so many legitimate 65 00:03:52,320 --> 00:03:55,120 Speaker 1: reasons that people not just in the United States, but 66 00:03:55,160 --> 00:03:59,240 Speaker 1: around the world especially would have to serve the web anonymously. Right. So, 67 00:03:59,320 --> 00:04:01,000 Speaker 1: for example, one of the one of the ones that 68 00:04:01,040 --> 00:04:04,640 Speaker 1: you hear over and over our journalists reporters, right, people 69 00:04:04,720 --> 00:04:08,280 Speaker 1: who perhaps have to communicate with a source and that 70 00:04:08,400 --> 00:04:12,119 Speaker 1: source needs to remain anonymous in order for this this 71 00:04:12,360 --> 00:04:15,200 Speaker 1: uh information exchange to happen, or to protect their own 72 00:04:15,200 --> 00:04:18,080 Speaker 1: safety exactly. Yeah, we could be talking about someone who's 73 00:04:18,120 --> 00:04:22,320 Speaker 1: giving a very high level security leak kind of information 74 00:04:22,360 --> 00:04:25,599 Speaker 1: that really has the potential to affect millions of people. 75 00:04:25,839 --> 00:04:30,279 Speaker 1: This is kind of like that Snowden situation, Edward Snowden, 76 00:04:30,520 --> 00:04:34,080 Speaker 1: So you would definitely want to maintain that person's anonymity 77 00:04:34,120 --> 00:04:36,760 Speaker 1: as well as you know, the communications that are going 78 00:04:36,760 --> 00:04:39,279 Speaker 1: on between you until you are ready to publish a 79 00:04:39,320 --> 00:04:42,479 Speaker 1: full story. Now, you know, responsible journalists are going to 80 00:04:42,480 --> 00:04:44,800 Speaker 1: be doing things like making sure that the information they 81 00:04:44,839 --> 00:04:48,479 Speaker 1: get is as verifiable as possible before moving forward. So 82 00:04:48,560 --> 00:04:50,839 Speaker 1: it's not like we're just saying, you know, this is 83 00:04:50,880 --> 00:04:53,880 Speaker 1: a way for people to spread misinformation, although that does happen, 84 00:04:54,520 --> 00:04:58,280 Speaker 1: but is totally cromulent for journalists to want to have 85 00:04:58,320 --> 00:05:01,320 Speaker 1: this kind of level of an emity when trying to 86 00:05:01,320 --> 00:05:04,240 Speaker 1: to to coordinate the source of stuff. Sure, also in 87 00:05:04,279 --> 00:05:06,880 Speaker 1: the tech sector, for example, if you're developing a new 88 00:05:07,279 --> 00:05:10,200 Speaker 1: a new piece of technology, or a new iteration of 89 00:05:10,240 --> 00:05:13,039 Speaker 1: a technology and you don't want other companies to know 90 00:05:13,120 --> 00:05:15,680 Speaker 1: what you're up to, Yeah, yeah, I mean you know 91 00:05:15,760 --> 00:05:19,400 Speaker 1: we how many times have we seen leaks from things 92 00:05:19,400 --> 00:05:23,360 Speaker 1: like a supply chain where we learn about upcoming as 93 00:05:23,480 --> 00:05:26,480 Speaker 1: Apple is probably the best example of this, right because 94 00:05:26,520 --> 00:05:30,600 Speaker 1: everyone is so invested in learning what Apple's next product 95 00:05:30,720 --> 00:05:34,320 Speaker 1: is that you've got an intense level of scrutiny on 96 00:05:34,360 --> 00:05:37,720 Speaker 1: the entire supply chain from the point where they're building 97 00:05:37,760 --> 00:05:41,240 Speaker 1: the chips to the screens to assembling the whole piece together, 98 00:05:41,880 --> 00:05:44,599 Speaker 1: so that you can have security totally locked down at Apple, 99 00:05:45,000 --> 00:05:47,599 Speaker 1: and somewhere else along the chain there might be a leak. Well. 100 00:05:47,640 --> 00:05:50,240 Speaker 1: Even that that extends even to just the research and 101 00:05:50,279 --> 00:05:52,880 Speaker 1: development phase where people are using the Internet for for 102 00:05:53,040 --> 00:05:56,800 Speaker 1: legitimate purposes and they don't want that information getting out there. 103 00:05:56,839 --> 00:05:59,000 Speaker 1: They want to have as much secrecy there as possible, 104 00:05:59,080 --> 00:06:02,520 Speaker 1: especially if people are aware like Hey, you know Jem 105 00:06:02,640 --> 00:06:04,800 Speaker 1: down the street. Did you know that Jem is like 106 00:06:04,839 --> 00:06:07,920 Speaker 1: the head of product development for Apple's I phone. That 107 00:06:07,960 --> 00:06:13,040 Speaker 1: would be like people, Oh, you don't say exactly, which 108 00:06:13,120 --> 00:06:15,920 Speaker 1: is good that they're using such a non suspicious voice 109 00:06:16,160 --> 00:06:21,400 Speaker 1: to to play it off. The news about Jim certainly 110 00:06:21,440 --> 00:06:25,680 Speaker 1: should not be twirling your mustache. So there there are 111 00:06:25,720 --> 00:06:30,000 Speaker 1: a number of other reasons as well, and in many 112 00:06:30,040 --> 00:06:35,839 Speaker 1: cases these are these are things that might sound overly dramatic, 113 00:06:35,880 --> 00:06:38,719 Speaker 1: but it really does happen. Internet access is not created 114 00:06:38,720 --> 00:06:42,600 Speaker 1: equally by any means, and we're gonna explore some things 115 00:06:42,600 --> 00:06:45,400 Speaker 1: that might sound foreign to a lot of viewers or 116 00:06:45,520 --> 00:06:48,600 Speaker 1: excuse me, a lot of listeners who are not who 117 00:06:48,600 --> 00:06:51,880 Speaker 1: are not acquainted with this. And one of the one 118 00:06:51,920 --> 00:06:55,640 Speaker 1: of the biggest reasons that people would need anonymous internet 119 00:06:55,680 --> 00:06:59,719 Speaker 1: access is something that's kind of um personally important to 120 00:06:59,760 --> 00:07:01,760 Speaker 1: me for people to have this right. If you're in 121 00:07:01,800 --> 00:07:07,039 Speaker 1: a country where government descent is not allowed, or where 122 00:07:07,279 --> 00:07:09,840 Speaker 1: you can be penalized for going on you know, the 123 00:07:09,920 --> 00:07:13,280 Speaker 1: Chinese version of Twitter or some short uh, then you 124 00:07:13,400 --> 00:07:16,640 Speaker 1: need to be able to have some sort of safe 125 00:07:16,640 --> 00:07:20,680 Speaker 1: way to do this, and um, unfortunately, many countries there's 126 00:07:20,800 --> 00:07:24,520 Speaker 1: not really a legal way to do this. Sure, Yeah, 127 00:07:24,800 --> 00:07:29,480 Speaker 1: so we have a like, let's let's take the definition 128 00:07:29,480 --> 00:07:32,720 Speaker 1: of human rights as say, would be defined by the 129 00:07:32,760 --> 00:07:35,680 Speaker 1: United Nations. Okay, there are some countries out there that 130 00:07:35,840 --> 00:07:40,480 Speaker 1: have have policies that kind of go against a lot 131 00:07:40,520 --> 00:07:44,880 Speaker 1: of those definitions. And if you if you believe that 132 00:07:45,280 --> 00:07:48,960 Speaker 1: humans actually possess these rights, whether they belong to one 133 00:07:49,000 --> 00:07:52,040 Speaker 1: country or another, then you probably also believe that they 134 00:07:52,080 --> 00:07:55,960 Speaker 1: need to have this kind of ability to remain anonymous 135 00:07:56,000 --> 00:08:00,400 Speaker 1: and yet voice their concerns, their thoughts, to be able 136 00:08:00,480 --> 00:08:04,360 Speaker 1: to assemble at least virtually, and be able to to 137 00:08:04,440 --> 00:08:06,800 Speaker 1: tell that they are not a lone person in a 138 00:08:07,000 --> 00:08:10,280 Speaker 1: sea of darkness. This kind of it does sound like 139 00:08:10,280 --> 00:08:13,880 Speaker 1: we're going dramatic, but this is the Arab spring work. Yeah, 140 00:08:14,160 --> 00:08:16,560 Speaker 1: this is a literal situation that happens. You know, being 141 00:08:16,600 --> 00:08:20,320 Speaker 1: able to share your ideas and also access information is 142 00:08:20,360 --> 00:08:23,720 Speaker 1: so important and is denied to too many citizens of 143 00:08:23,800 --> 00:08:26,840 Speaker 1: this world, and for those of us who live who 144 00:08:26,880 --> 00:08:28,920 Speaker 1: are fortunate enough to live in places that at least 145 00:08:28,920 --> 00:08:32,800 Speaker 1: ostensibly protect those human rights. Um, you know, there's still 146 00:08:32,800 --> 00:08:35,680 Speaker 1: other things that we could become victim to. For example, 147 00:08:35,760 --> 00:08:39,480 Speaker 1: just people who want to cause midschief or hackers who 148 00:08:39,480 --> 00:08:42,800 Speaker 1: want to target you for one reason or another. Um 149 00:08:42,840 --> 00:08:44,520 Speaker 1: and it may not even be that they want to 150 00:08:44,559 --> 00:08:47,920 Speaker 1: target you specifically, but you just kind of want to 151 00:08:47,960 --> 00:08:50,880 Speaker 1: avoid all of that and cut down on all that possibility. 152 00:08:50,880 --> 00:08:53,400 Speaker 1: You may just want to serve the web anonymously because 153 00:08:53,440 --> 00:08:55,480 Speaker 1: they're there are only certain things you want to have 154 00:08:55,520 --> 00:08:58,640 Speaker 1: access to. You don't care about everything else out there. 155 00:08:59,440 --> 00:09:00,840 Speaker 1: So it's not like you're gonna go on YouTube and 156 00:09:00,840 --> 00:09:03,120 Speaker 1: watch a billion videos. It's not like you're gonna go 157 00:09:03,160 --> 00:09:05,559 Speaker 1: on Facebook and update your status profile. All you want 158 00:09:05,600 --> 00:09:08,400 Speaker 1: to do is be able to research something, read up 159 00:09:08,440 --> 00:09:11,880 Speaker 1: on something, whatever, and that's it. You might want to 160 00:09:11,880 --> 00:09:14,400 Speaker 1: be able to serve the web anonymously just to avoid 161 00:09:14,559 --> 00:09:17,959 Speaker 1: the possibility that you're going to run into, you know, troublemakers. 162 00:09:19,200 --> 00:09:21,880 Speaker 1: But here's the question then, right, and I think we've 163 00:09:21,880 --> 00:09:25,080 Speaker 1: done a great job showing this, uh, this need and 164 00:09:25,160 --> 00:09:30,880 Speaker 1: this legitimate interest in anonymous web us. Why is it 165 00:09:31,120 --> 00:09:35,280 Speaker 1: so difficult? Why is it possible but not plausible? Okay? Well, 166 00:09:35,440 --> 00:09:38,600 Speaker 1: first of all, just the way the internet works makes 167 00:09:38,640 --> 00:09:42,400 Speaker 1: it really really hard, right, because in order for you 168 00:09:42,480 --> 00:09:45,360 Speaker 1: to be able to get any information to your computer, 169 00:09:46,400 --> 00:09:49,520 Speaker 1: that information has to has nowhere to go, right. It 170 00:09:49,559 --> 00:09:52,000 Speaker 1: has to know what pathway to take so that it 171 00:09:52,040 --> 00:09:55,640 Speaker 1: gets from the server where it lives on to your 172 00:09:55,679 --> 00:09:57,920 Speaker 1: computer so you can see it. Now. This is no 173 00:09:57,960 --> 00:10:00,400 Speaker 1: matter what kind of service you're using on the internet, 174 00:10:00,440 --> 00:10:02,160 Speaker 1: if you're trying to access something, as long as you're 175 00:10:02,200 --> 00:10:05,440 Speaker 1: not just pushing stuff out and you're expecting to get 176 00:10:05,520 --> 00:10:10,480 Speaker 1: something back, it has to know where to go. Uh. 177 00:10:09,360 --> 00:10:12,439 Speaker 1: The thing I was thinking, I was imagined like you 178 00:10:12,480 --> 00:10:14,760 Speaker 1: are trying to send a message to somebody, and I, 179 00:10:14,920 --> 00:10:18,520 Speaker 1: you know, like I want to get a note specifically 180 00:10:18,559 --> 00:10:21,160 Speaker 1: to Lauren. And Lauren has happened to take a trip 181 00:10:21,200 --> 00:10:24,120 Speaker 1: where she's all the way out in California. And the 182 00:10:24,120 --> 00:10:26,320 Speaker 1: way I've chosen to get the message to her is 183 00:10:26,360 --> 00:10:29,599 Speaker 1: I've written the messaging code and I've left no identifying 184 00:10:29,600 --> 00:10:32,480 Speaker 1: information on it whatsoever. I've even I've even used my 185 00:10:32,679 --> 00:10:35,000 Speaker 1: right hand instead of my left hand to right the code, 186 00:10:35,000 --> 00:10:39,160 Speaker 1: so my handwriting is disguised. I then wrapped that that 187 00:10:39,200 --> 00:10:41,800 Speaker 1: message up in a little ribbon, tie it to a 188 00:10:41,800 --> 00:10:46,040 Speaker 1: helium balloon, let it go, and hope that somehow the 189 00:10:46,080 --> 00:10:48,800 Speaker 1: balloon finds its way to Lauren, that she is able 190 00:10:48,840 --> 00:10:52,560 Speaker 1: to decode the message, able to decipher despite the fact 191 00:10:52,559 --> 00:10:55,320 Speaker 1: that I've left no identifiable information in there about who 192 00:10:55,320 --> 00:10:57,679 Speaker 1: sent the message, who it was, who wrote it, and 193 00:10:57,720 --> 00:11:00,400 Speaker 1: then in turn be able to respond in a in 194 00:11:00,440 --> 00:11:02,560 Speaker 1: a similar way and send that message back to me 195 00:11:02,600 --> 00:11:05,840 Speaker 1: where it just magically makes its way to me. Clearly, 196 00:11:06,000 --> 00:11:09,520 Speaker 1: that scenario is impossible, right, yeah, Yeah. The the real 197 00:11:09,559 --> 00:11:11,160 Speaker 1: way that the Internet works is more like if the 198 00:11:11,160 --> 00:11:15,520 Speaker 1: postal system was made entirely of clear boxes and and 199 00:11:15,800 --> 00:11:18,679 Speaker 1: everyone passing the box along the route from you to 200 00:11:18,840 --> 00:11:20,960 Speaker 1: whoever you're sending it to, you can see exactly what's 201 00:11:21,000 --> 00:11:23,160 Speaker 1: going on in it unless you've taken some kind of 202 00:11:23,200 --> 00:11:27,040 Speaker 1: step to you or to encrypted. Right, So, if if 203 00:11:27,040 --> 00:11:29,280 Speaker 1: you have an encrypted message, let's say, then you've got 204 00:11:29,280 --> 00:11:32,160 Speaker 1: a clear box which inside of it is a a 205 00:11:32,160 --> 00:11:34,480 Speaker 1: an opaque box. So you know that there's a box, 206 00:11:34,720 --> 00:11:37,840 Speaker 1: you know approximately how much information is there, and you 207 00:11:37,840 --> 00:11:40,000 Speaker 1: know where it's coming from, and you know where it's 208 00:11:40,040 --> 00:11:42,280 Speaker 1: going to because you have to have that address or 209 00:11:42,320 --> 00:11:44,760 Speaker 1: else the data just doesn't go anywhere. It would just 210 00:11:45,040 --> 00:11:48,000 Speaker 1: would you, It would go to that first stop on 211 00:11:48,200 --> 00:11:50,880 Speaker 1: the internet, and then there'd be nowhere to go because 212 00:11:50,880 --> 00:11:53,840 Speaker 1: you wouldn't have any information saying hey, send this message 213 00:11:53,880 --> 00:11:57,040 Speaker 1: to this destination. So, because you have to have these 214 00:11:57,080 --> 00:12:00,400 Speaker 1: IP addresses so that information can actually go to where 215 00:12:00,400 --> 00:12:02,000 Speaker 1: it needs to go and get back to where it 216 00:12:02,000 --> 00:12:04,920 Speaker 1: needs to get back to, that limits how anonymous you 217 00:12:04,920 --> 00:12:08,120 Speaker 1: can be. Right now, that IP address can be assigned 218 00:12:08,120 --> 00:12:10,600 Speaker 1: by an Internet service provider and it doesn't have to 219 00:12:10,840 --> 00:12:13,920 Speaker 1: have anything to do with whatever machine you're on, right, 220 00:12:14,000 --> 00:12:16,520 Speaker 1: the computer you're using does not necessarily it's not going 221 00:12:16,559 --> 00:12:18,600 Speaker 1: to have the same IP address all the time. Yeah, 222 00:12:18,640 --> 00:12:21,840 Speaker 1: it's not like tattooed with barcode or something like that, 223 00:12:22,040 --> 00:12:25,000 Speaker 1: but well, I mean probably it literally is. Barcode is 224 00:12:25,040 --> 00:12:28,280 Speaker 1: not its IP address, right, right, So the that IP 225 00:12:28,400 --> 00:12:31,560 Speaker 1: address is going to at least have a general idea 226 00:12:31,600 --> 00:12:35,480 Speaker 1: of the geography that you are in, uh and based 227 00:12:35,520 --> 00:12:40,280 Speaker 1: upon your habits what you use the Internet for, that 228 00:12:40,360 --> 00:12:43,520 Speaker 1: might be enough. Just the general geography and and your 229 00:12:43,600 --> 00:12:46,200 Speaker 1: pattern of using the Internet, that could be enough to 230 00:12:46,320 --> 00:12:50,200 Speaker 1: identify who is using the Internet, because the way eyebrows 231 00:12:50,240 --> 00:12:52,840 Speaker 1: the Internet could be extremely different from the way say 232 00:12:52,920 --> 00:12:56,319 Speaker 1: Lauren does, and I highly suspect it is, I imagine, 233 00:12:56,400 --> 00:12:59,200 Speaker 1: so aside from when we're researching the same topic. In 234 00:12:59,200 --> 00:13:01,800 Speaker 1: that case, we think we find literally all the same articles. 235 00:13:01,800 --> 00:13:04,840 Speaker 1: I am pretty sure that I watch a lot more 236 00:13:05,000 --> 00:13:08,240 Speaker 1: YouTube videos about family surprising their kids with trips to 237 00:13:08,280 --> 00:13:11,319 Speaker 1: Disney than Lauren does. I think you guys are about 238 00:13:11,480 --> 00:13:14,880 Speaker 1: one for one on Corgy videos though. Corgy videos, yes, 239 00:13:14,960 --> 00:13:17,800 Speaker 1: or I mean they rank highly on both sides, but 240 00:13:18,200 --> 00:13:21,439 Speaker 1: they're they're sure there are anomalies. If you're only looking 241 00:13:21,440 --> 00:13:24,040 Speaker 1: at Corgy video activity, then you might not be able 242 00:13:24,080 --> 00:13:26,560 Speaker 1: to determine whether it's Lauren or whether which. Which is 243 00:13:26,559 --> 00:13:30,000 Speaker 1: a great point because it goes back to earlier. We 244 00:13:30,040 --> 00:13:32,959 Speaker 1: can all recall hearing the big stink in the United 245 00:13:33,000 --> 00:13:38,200 Speaker 1: States about um the government tracking metadata, and people would say, well, 246 00:13:38,240 --> 00:13:41,199 Speaker 1: you know, metadata is not a big deal. It's just 247 00:13:41,720 --> 00:13:45,160 Speaker 1: stuff like the address and the time, and and it's 248 00:13:45,200 --> 00:13:52,000 Speaker 1: more the it's more like the measurement of the pages 249 00:13:52,080 --> 00:13:55,600 Speaker 1: of a book than the description of the story. However, 250 00:13:56,440 --> 00:13:59,360 Speaker 1: from that, the reason it's important is exactly what you're saying, Johnathan, 251 00:13:59,440 --> 00:14:03,800 Speaker 1: because it is possible to build um, not just a 252 00:14:03,800 --> 00:14:06,760 Speaker 1: profile of a person, but to find the actual person. Yeah, 253 00:14:07,000 --> 00:14:09,680 Speaker 1: from enough of that metadat Yeah, And and it doesn't 254 00:14:09,720 --> 00:14:13,800 Speaker 1: take that much really, especially for particular types of meta data. 255 00:14:13,880 --> 00:14:16,600 Speaker 1: For example, if you have like a zip code and 256 00:14:16,679 --> 00:14:20,400 Speaker 1: maybe a car make and model, well that and and 257 00:14:20,440 --> 00:14:23,080 Speaker 1: a gender, Well, then you've really got enough information to 258 00:14:23,160 --> 00:14:25,320 Speaker 1: really narrow it down to a handful of people. Because 259 00:14:25,960 --> 00:14:28,320 Speaker 1: you know that you've got a population within a zip code. 260 00:14:28,440 --> 00:14:31,160 Speaker 1: The gender will divide that essentially in half, and so 261 00:14:31,200 --> 00:14:33,080 Speaker 1: how many of those people have a two thousand and 262 00:14:33,120 --> 00:14:37,520 Speaker 1: four Yeah, and then you have essentially really narrowed it 263 00:14:37,560 --> 00:14:41,480 Speaker 1: down to a very small number of potential people. This 264 00:14:41,560 --> 00:14:45,440 Speaker 1: is why it doesn't really require that much personal identifiable 265 00:14:45,440 --> 00:14:48,520 Speaker 1: information to track it back to a specific person. Now, 266 00:14:48,520 --> 00:14:51,320 Speaker 1: there's some things on the Internet that are not necessary 267 00:14:51,400 --> 00:14:54,120 Speaker 1: for the Internet to work right or like, especially for 268 00:14:54,200 --> 00:14:58,119 Speaker 1: web browsing. So, for example, cookies. Cookies are not necessary 269 00:14:58,200 --> 00:15:00,360 Speaker 1: to make the web work, although you'll probably go to 270 00:15:00,400 --> 00:15:03,000 Speaker 1: a page occasionally that says, this website uses cookies, and 271 00:15:03,280 --> 00:15:05,880 Speaker 1: let us tell you how ye enable them so that 272 00:15:06,240 --> 00:15:09,000 Speaker 1: this website will work the way it's supposed to. Cookies 273 00:15:09,000 --> 00:15:12,920 Speaker 1: are just text files. They can include enough information that 274 00:15:12,960 --> 00:15:16,160 Speaker 1: could be useful to the person using the website to 275 00:15:16,560 --> 00:15:20,600 Speaker 1: customize your experience that the intent is so that if 276 00:15:20,640 --> 00:15:23,840 Speaker 1: you keep going back to the same website frequently, it 277 00:15:23,880 --> 00:15:27,320 Speaker 1: already knows things that you do and do not need, 278 00:15:27,520 --> 00:15:29,360 Speaker 1: and so it will load much faster. It will give 279 00:15:29,360 --> 00:15:32,400 Speaker 1: you more personalized experience, but it also means that there's 280 00:15:32,440 --> 00:15:35,000 Speaker 1: some tracking that can happen there and identification that can 281 00:15:35,000 --> 00:15:38,360 Speaker 1: happen there. So turning that off is probably something you 282 00:15:38,360 --> 00:15:40,360 Speaker 1: would want to do if you want to be anonymous. 283 00:15:40,520 --> 00:15:42,960 Speaker 1: I'll go into more about that in a bed. Oh, Jonathan, 284 00:15:43,040 --> 00:15:47,000 Speaker 1: welcome back to Amazon based on your browsing preferences. I 285 00:15:47,000 --> 00:15:50,400 Speaker 1: can't wait to hear this. Yeah, here are several calendars 286 00:15:50,440 --> 00:15:53,840 Speaker 1: of quarkies. Okay, that's fair, that's fair. Uh, that I 287 00:15:53,960 --> 00:15:55,880 Speaker 1: just recently made a purchase, so I was wanting to 288 00:15:55,880 --> 00:15:58,160 Speaker 1: see if perhaps somehow it was going to tie into 289 00:15:58,160 --> 00:16:01,680 Speaker 1: what I actually bought. But ows but not quite um 290 00:16:01,720 --> 00:16:06,920 Speaker 1: And then things like like search engines can maintain activity logs, 291 00:16:07,000 --> 00:16:09,120 Speaker 1: so and those will link back to an IP address. 292 00:16:09,320 --> 00:16:12,440 Speaker 1: So let's say that you are using a computer, You've 293 00:16:12,480 --> 00:16:15,760 Speaker 1: logged into the Internet, your computer has an IP address, 294 00:16:15,840 --> 00:16:18,600 Speaker 1: and you start searching for various terms. This kind of 295 00:16:18,600 --> 00:16:20,880 Speaker 1: goes back to that idea of the four of us 296 00:16:20,880 --> 00:16:25,280 Speaker 1: are all searching about robbing a bank. Now that that information, 297 00:16:25,360 --> 00:16:27,560 Speaker 1: if we're let's say we're all using Google because it 298 00:16:27,600 --> 00:16:28,960 Speaker 1: makes it easier if we just go ahead and use 299 00:16:28,960 --> 00:16:33,200 Speaker 1: an example, Google's maintaining this activity log of all four 300 00:16:33,240 --> 00:16:36,920 Speaker 1: of us independently using Google to research everything that is, 301 00:16:36,960 --> 00:16:41,080 Speaker 1: to research about robbing a bank, and then later on 302 00:16:41,120 --> 00:16:44,640 Speaker 1: the lawn law enforcement officials, uh subpoena Google to get 303 00:16:44,640 --> 00:16:47,360 Speaker 1: those activity logs so that they can see who it 304 00:16:47,520 --> 00:16:51,640 Speaker 1: is in this geographic region that was looking for this stuff. Um, 305 00:16:51,840 --> 00:16:54,800 Speaker 1: you know that's again that's another reason why when you 306 00:16:54,800 --> 00:16:58,000 Speaker 1: start talking about really being anonymous using the web, you 307 00:16:58,040 --> 00:17:00,520 Speaker 1: have to shy away from all the convenient says that 308 00:17:00,600 --> 00:17:03,960 Speaker 1: make the web so useful in situations where you're not 309 00:17:04,040 --> 00:17:07,280 Speaker 1: as concerned about your anonymity. Yeah, that's a really great point, 310 00:17:07,359 --> 00:17:10,960 Speaker 1: and that's something that, oddly enough, we were exploring both 311 00:17:11,000 --> 00:17:14,560 Speaker 1: on this show and on car stuff, because there's this 312 00:17:14,600 --> 00:17:18,800 Speaker 1: big idea about cars becoming connected to the cloud, right 313 00:17:18,840 --> 00:17:21,520 Speaker 1: and the whole internet of cars knowing exactly where you 314 00:17:21,560 --> 00:17:24,440 Speaker 1: are all the time, exactly exactly. And North has been 315 00:17:24,440 --> 00:17:28,679 Speaker 1: parked outside of this dance club for a really long time. 316 00:17:29,119 --> 00:17:35,200 Speaker 1: He's cutting a rug and that's how Jonathan's car would sound. Yeah, 317 00:17:35,600 --> 00:17:37,880 Speaker 1: I like to think that all my technology has has 318 00:17:37,960 --> 00:17:42,000 Speaker 1: weird affectations in its speech, I hope so, because what 319 00:17:42,080 --> 00:17:45,000 Speaker 1: else is the future would be no fun that you 320 00:17:45,040 --> 00:17:46,800 Speaker 1: couldn't do. It would just be Yeah, it could all 321 00:17:46,840 --> 00:17:49,360 Speaker 1: be like robot voice. But that gets old pretty quickly, right, 322 00:17:49,400 --> 00:17:54,040 Speaker 1: So the um, the purpose of this this great thing 323 00:17:54,320 --> 00:17:58,760 Speaker 1: called the Internet is inherently to share things that are 324 00:17:58,840 --> 00:18:04,640 Speaker 1: easily seen. It is not to hide things. So it's already, um, 325 00:18:04,920 --> 00:18:08,480 Speaker 1: it's already unsurprising if you think about it that it's 326 00:18:08,560 --> 00:18:11,720 Speaker 1: it's really difficult to participate in something that is all 327 00:18:11,720 --> 00:18:14,840 Speaker 1: about telling people's stuff in a way that doesn't it's 328 00:18:14,880 --> 00:18:18,119 Speaker 1: a communications platform, and if you're if you're trying to 329 00:18:18,200 --> 00:18:21,840 Speaker 1: be completely anonymous in a communications platform, that's tricky. I mean, 330 00:18:21,880 --> 00:18:24,760 Speaker 1: there are obviously message boards out there that allow for 331 00:18:24,880 --> 00:18:30,399 Speaker 1: complete anonymity and uh complete complete being an in air 332 00:18:30,480 --> 00:18:34,040 Speaker 1: quotes which work really well over the radio. But yeah, 333 00:18:34,040 --> 00:18:37,960 Speaker 1: it's it's it's definitely one of those things where, uh, 334 00:18:38,000 --> 00:18:43,359 Speaker 1: you know, the the anonymity kind of can inhibit a 335 00:18:43,440 --> 00:18:47,720 Speaker 1: lot of what makes the Internet so useful. So especially 336 00:18:47,720 --> 00:18:50,320 Speaker 1: in these are modern Internet times, like as the Internet 337 00:18:50,320 --> 00:18:52,920 Speaker 1: has grown in, big data has grown and and all 338 00:18:52,920 --> 00:18:56,119 Speaker 1: these things we've we've been talking about websites storing information 339 00:18:56,480 --> 00:18:58,640 Speaker 1: from you so that they can serve you better headlines 340 00:18:58,680 --> 00:19:01,040 Speaker 1: that you're more likely to want to click on. Uh, 341 00:19:01,520 --> 00:19:05,280 Speaker 1: you're you're evading the point. Yeah, yeah, yeah, that's a 342 00:19:05,440 --> 00:19:08,240 Speaker 1: that's a good way to say it. So with with this, 343 00:19:08,320 --> 00:19:11,439 Speaker 1: we've we've painted the difficulty. We've talked about the reasons 344 00:19:11,440 --> 00:19:14,560 Speaker 1: why you want to do it. So for all the 345 00:19:14,600 --> 00:19:17,679 Speaker 1: people who wrote in and voted more than once saying yes, 346 00:19:18,320 --> 00:19:21,440 Speaker 1: tell me how to surf anonymously? What? What? What would 347 00:19:21,480 --> 00:19:24,240 Speaker 1: they do? You? Guys, I'm asking for a friend. Okay, Well, 348 00:19:24,359 --> 00:19:27,639 Speaker 1: then your friend needs to know that if if your friend, 349 00:19:28,320 --> 00:19:32,000 Speaker 1: if he or she is truly determined to surf the 350 00:19:32,040 --> 00:19:36,199 Speaker 1: web anonymously, he or she should be prepared to go 351 00:19:36,320 --> 00:19:41,280 Speaker 1: to great lengths in order to do so, including if 352 00:19:41,320 --> 00:19:43,760 Speaker 1: he or she plans on doing this more than once. 353 00:19:44,400 --> 00:19:48,760 Speaker 1: Not using the same device burner, laptops, I like it, ye. 354 00:19:48,920 --> 00:19:52,159 Speaker 1: Step Step one don't use your own device ever, No, 355 00:19:53,480 --> 00:19:55,879 Speaker 1: not not connected to the internet anyway. Step one is 356 00:19:55,920 --> 00:19:58,359 Speaker 1: don't use your own device. Step two is you probably 357 00:19:58,440 --> 00:20:01,280 Speaker 1: don't want to use like a mobile device that connects 358 00:20:01,280 --> 00:20:04,560 Speaker 1: to the Internet because it's likely registered to you or 359 00:20:04,680 --> 00:20:08,280 Speaker 1: to someone you know, and most of them have some 360 00:20:08,359 --> 00:20:12,400 Speaker 1: form of way of identifying where you are. So even 361 00:20:12,400 --> 00:20:15,560 Speaker 1: if somehow you magically have a phone working where there's 362 00:20:15,600 --> 00:20:19,560 Speaker 1: not a direct link between you and the phone, the 363 00:20:19,600 --> 00:20:21,880 Speaker 1: fact that it is going to be able to determine 364 00:20:21,880 --> 00:20:26,119 Speaker 1: where it is geographically, either just cell phone towers or 365 00:20:26,280 --> 00:20:29,520 Speaker 1: it may have GPS enabled to that's going to give 366 00:20:29,560 --> 00:20:34,320 Speaker 1: it even more specific location. Sure, you can turn three 367 00:20:34,359 --> 00:20:37,000 Speaker 1: G or four G or whatever you have. You can 368 00:20:37,080 --> 00:20:39,879 Speaker 1: turn satellite service off on your phone. However, then you 369 00:20:39,920 --> 00:20:42,960 Speaker 1: need to be connected to WiFi, and you can't just 370 00:20:43,000 --> 00:20:44,760 Speaker 1: connect to you I mean, you can't just call up 371 00:20:44,920 --> 00:20:47,400 Speaker 1: Comcast and be like, hey, I'd like to get some Internet, 372 00:20:47,680 --> 00:20:52,840 Speaker 1: but anonymously never mind. Yeah, that's a really good way 373 00:20:52,840 --> 00:20:54,439 Speaker 1: to not get an account, right that, Not that I 374 00:20:54,480 --> 00:20:57,840 Speaker 1: know personally. The same thing is true about just Internet 375 00:20:57,840 --> 00:21:01,080 Speaker 1: service providers in general. Litering, Like like whether it's Comcast 376 00:21:01,200 --> 00:21:03,720 Speaker 1: or whatever, whatever the i s P is, if you 377 00:21:03,760 --> 00:21:06,320 Speaker 1: are trying to use your own, say your own setup 378 00:21:06,359 --> 00:21:11,120 Speaker 1: at home, then automatically your I s P, you know, yeah, 379 00:21:11,240 --> 00:21:13,639 Speaker 1: and know exactly they know which account it goes to 380 00:21:13,720 --> 00:21:16,880 Speaker 1: at any rate, So you know that means that it's 381 00:21:16,920 --> 00:21:20,800 Speaker 1: narrowed down who could potentially be the person actually doing 382 00:21:20,840 --> 00:21:23,359 Speaker 1: the searches. It's pretty much anyone who has access to 383 00:21:23,400 --> 00:21:25,560 Speaker 1: your household, which is why if you're really trying to 384 00:21:25,600 --> 00:21:28,480 Speaker 1: make this happen, ladies and gentlemen, you will need to 385 00:21:28,520 --> 00:21:34,040 Speaker 1: find the most public computer possible. We're talking about libraries, 386 00:21:34,440 --> 00:21:39,439 Speaker 1: cyber cafes, uh, college campuses. Yeah. Yeah, you want to 387 00:21:39,440 --> 00:21:42,960 Speaker 1: be able to use a computer where uh the real 388 00:21:43,080 --> 00:21:45,760 Speaker 1: First of all, there's a possibility that any number of 389 00:21:45,760 --> 00:21:49,520 Speaker 1: individuals could have been using that ability, right right, Yeah, 390 00:21:49,520 --> 00:21:51,320 Speaker 1: It's one of those safety and numbers kind of issues 391 00:21:51,359 --> 00:21:53,600 Speaker 1: that kind of comes up a lot in in our discussion. 392 00:21:53,640 --> 00:21:56,520 Speaker 1: I think, yeah, so that's that's one thing you're and 393 00:21:56,600 --> 00:21:58,720 Speaker 1: you don't want to use the same one twice in 394 00:21:58,760 --> 00:22:01,560 Speaker 1: a row. So if your session is over and then 395 00:22:01,600 --> 00:22:04,119 Speaker 1: you think, oh shoot, I need to go do something else, 396 00:22:04,600 --> 00:22:07,600 Speaker 1: you probably need to go to a different site. In fact, 397 00:22:07,760 --> 00:22:10,680 Speaker 1: a different site entirely, like not even on that same 398 00:22:10,720 --> 00:22:14,119 Speaker 1: network would be the best choice for you. I mean, ideally, 399 00:22:14,440 --> 00:22:17,159 Speaker 1: the scary thing is about this that the more you 400 00:22:17,200 --> 00:22:22,160 Speaker 1: think about it, uh, the larger the scale becomes. Because then, yes, 401 00:22:22,440 --> 00:22:24,400 Speaker 1: you don't want to be on the same site. Yes, 402 00:22:24,440 --> 00:22:26,520 Speaker 1: you don't want to be on the same network. Do 403 00:22:26,600 --> 00:22:28,879 Speaker 1: you want to be in the same city. Do you 404 00:22:28,920 --> 00:22:30,200 Speaker 1: want to be in the you know what I mean, 405 00:22:30,240 --> 00:22:32,600 Speaker 1: because it should be preferable to jump state borders really 406 00:22:32,600 --> 00:22:34,919 Speaker 1: at that point, which which is a heck of a 407 00:22:35,040 --> 00:22:39,480 Speaker 1: long drive just to uh, you know here in Georgia. Yeah, 408 00:22:39,520 --> 00:22:42,040 Speaker 1: maybe you should try to serve the web anominous anonymously 409 00:22:42,160 --> 00:22:48,160 Speaker 1: from Rhode Island. Uh. And also you would you would 410 00:22:48,160 --> 00:22:53,000 Speaker 1: probably want to still try and hide the IP address 411 00:22:53,040 --> 00:22:57,200 Speaker 1: you're actually using, So you probably want to use a proxy. Proxies, 412 00:22:57,280 --> 00:22:59,879 Speaker 1: by the way, come in all shapes and sizes, So 413 00:23:00,359 --> 00:23:02,840 Speaker 1: some proxies you might see and you think, oh, well, 414 00:23:02,840 --> 00:23:05,480 Speaker 1: this is perfect. I'm gonna go log into this proxy. 415 00:23:05,600 --> 00:23:11,040 Speaker 1: Then from the the perspective of anyone outside of my browser, 416 00:23:11,480 --> 00:23:14,480 Speaker 1: it's going to look as if the proxy is the 417 00:23:14,480 --> 00:23:18,120 Speaker 1: computer that's doing all the searches. Right. So, Ben, let's 418 00:23:18,119 --> 00:23:21,760 Speaker 1: say you are in our bank robbery scenario. You log 419 00:23:21,800 --> 00:23:24,920 Speaker 1: into a proxy, you start searching information because you're gonna 420 00:23:24,960 --> 00:23:27,400 Speaker 1: be the bagman. You need to know what a bagman 421 00:23:27,560 --> 00:23:29,840 Speaker 1: is because you actually don't know. You agree to it 422 00:23:30,480 --> 00:23:33,360 Speaker 1: without actually knowing what the definition of the term one. Yeah, 423 00:23:33,359 --> 00:23:35,520 Speaker 1: I just yes ended and now I'm like the intern 424 00:23:35,560 --> 00:23:38,240 Speaker 1: in this. You didn't want to admit to the other 425 00:23:38,280 --> 00:23:40,760 Speaker 1: people that you didn't know what a bagman to look 426 00:23:40,840 --> 00:23:43,240 Speaker 1: cool like, I'm like, I you about proxies. Yeah, so 427 00:23:43,280 --> 00:23:46,440 Speaker 1: now you've gone to look up the definition of bagman. 428 00:23:46,560 --> 00:23:49,280 Speaker 1: We don't have any dictionaries nearby. So you know, you're thinking, 429 00:23:49,280 --> 00:23:53,160 Speaker 1: I gotta get online. You log into a cyber cafe 430 00:23:53,760 --> 00:23:57,119 Speaker 1: and you go use a proxy, so that instead it 431 00:23:57,160 --> 00:23:59,560 Speaker 1: looks like the proxy computer is the one that's doing 432 00:23:59,600 --> 00:24:02,639 Speaker 1: the rees ur So that way, if someone ever starts 433 00:24:02,680 --> 00:24:05,159 Speaker 1: to try and trace it back, they're going to go 434 00:24:05,240 --> 00:24:07,359 Speaker 1: to this proxy, but they're not going to get to you, 435 00:24:08,560 --> 00:24:12,640 Speaker 1: at least in theory, because a proxy could very well. 436 00:24:12,680 --> 00:24:14,880 Speaker 1: I mean, first of all, they know that you are 437 00:24:14,960 --> 00:24:19,080 Speaker 1: using the service. Otherwise, again, the communication can't ultimately get 438 00:24:19,119 --> 00:24:21,840 Speaker 1: to your computer. It's just somebody else too. To Lauren's 439 00:24:21,840 --> 00:24:25,080 Speaker 1: earlier comparison, it's just somebody else carrying that clear box 440 00:24:25,160 --> 00:24:29,800 Speaker 1: for you. Yeah. So if the proxy keeps activity logs, 441 00:24:30,160 --> 00:24:34,240 Speaker 1: then there's the potential that law enforcement could trace back 442 00:24:34,280 --> 00:24:37,320 Speaker 1: to that proxy and then service subpoenas saying we want 443 00:24:37,359 --> 00:24:39,160 Speaker 1: to see all the activity logs, so we can figure 444 00:24:39,160 --> 00:24:44,040 Speaker 1: out which individual user used this proxy service to get 445 00:24:44,080 --> 00:24:47,720 Speaker 1: access to this information. And this has happened. This is 446 00:24:47,760 --> 00:24:51,920 Speaker 1: not a theoretical thing. Law enforcement has gone to VPNs 447 00:24:51,960 --> 00:24:55,560 Speaker 1: and two proxies and said, okay, give us the paperwork, 448 00:24:55,640 --> 00:24:59,680 Speaker 1: tell us who was here in the afternoons googling bagman. 449 00:25:00,040 --> 00:25:04,359 Speaker 1: There's there's no guarantee either that a proxy is going 450 00:25:04,480 --> 00:25:07,880 Speaker 1: to encrypt information for you, So it may very well 451 00:25:07,920 --> 00:25:11,399 Speaker 1: be that again that pathway leads to the proxy, but 452 00:25:11,440 --> 00:25:13,639 Speaker 1: there might be enough information anyway for them to be 453 00:25:13,640 --> 00:25:15,640 Speaker 1: able to identify that Ben in fact, was the one 454 00:25:15,680 --> 00:25:19,000 Speaker 1: doing all the searches. So vpn tends to be a 455 00:25:19,040 --> 00:25:21,800 Speaker 1: better choice because VPNs do encrypt a lot of stuff. 456 00:25:21,880 --> 00:25:24,160 Speaker 1: So the problem with VPNs, of course, is that first 457 00:25:24,160 --> 00:25:26,080 Speaker 1: of all, you've got to pay into them, so again 458 00:25:26,119 --> 00:25:29,520 Speaker 1: there's a connection between you and the vpn um and 459 00:25:29,600 --> 00:25:33,119 Speaker 1: depending upon the VPNs policy, that may end up becoming 460 00:25:33,119 --> 00:25:35,920 Speaker 1: an issue because even if we're not talking about bank rubbing, 461 00:25:35,960 --> 00:25:38,040 Speaker 1: if we're instead we're talking about Ben is in a 462 00:25:38,119 --> 00:25:40,880 Speaker 1: foreign country and he's trying to get a message out 463 00:25:40,880 --> 00:25:44,320 Speaker 1: to his family, that's a that's an issue rights for 464 00:25:44,359 --> 00:25:48,520 Speaker 1: the redeeming example that, uh, why why am I the guy? 465 00:25:48,560 --> 00:25:52,320 Speaker 1: Why can't you be in Turkmenistan? Well, because I I 466 00:25:52,359 --> 00:25:57,280 Speaker 1: don't really leave my house. I think statistically speaking, you 467 00:25:57,359 --> 00:25:59,480 Speaker 1: are of the three of us here the most likely 468 00:25:59,520 --> 00:26:02,480 Speaker 1: to did see you, like walking down Morland taking a 469 00:26:02,480 --> 00:26:05,440 Speaker 1: wrong turn and ending up there. I mean, that's true. 470 00:26:05,480 --> 00:26:09,040 Speaker 1: I have a terrible sense of direction, Like it just 471 00:26:09,320 --> 00:26:12,480 Speaker 1: hits a little wormhole and goes from goes from downtown Atlanta, 472 00:26:12,520 --> 00:26:16,840 Speaker 1: Georgia to other people. Yeah, people do have to have 473 00:26:17,160 --> 00:26:21,160 Speaker 1: UM communications that way. But even with all we've done 474 00:26:21,160 --> 00:26:25,520 Speaker 1: now is we're talking about ways to UM raise the 475 00:26:26,240 --> 00:26:31,040 Speaker 1: to make it more inconvenient. Now, if you want to 476 00:26:31,080 --> 00:26:34,840 Speaker 1: go the next step, so we're talking about you're you're 477 00:26:34,920 --> 00:26:37,879 Speaker 1: using some sort of proxy service, whether it's VPN or 478 00:26:37,920 --> 00:26:41,159 Speaker 1: an actual web proxy to hide. But let's say that 479 00:26:41,200 --> 00:26:43,320 Speaker 1: you want to go even further. One thing you've got 480 00:26:43,320 --> 00:26:45,760 Speaker 1: to be concerned about is the computer you are actually 481 00:26:45,960 --> 00:26:49,320 Speaker 1: on the device you're using at that moment. So if 482 00:26:49,320 --> 00:26:51,399 Speaker 1: you are at a public place like a library, and 483 00:26:51,440 --> 00:26:53,920 Speaker 1: you're logging into a computer, and you want to make 484 00:26:53,960 --> 00:26:56,240 Speaker 1: sure that all of your activity on that computer does 485 00:26:56,280 --> 00:26:59,280 Speaker 1: not stay there so that the you know, let's say 486 00:26:59,280 --> 00:27:01,879 Speaker 1: that they get access to the actual physical computer you used, 487 00:27:02,160 --> 00:27:04,560 Speaker 1: they could track back who you are that way, right, 488 00:27:05,160 --> 00:27:07,280 Speaker 1: So you want to be able to disable the cookies 489 00:27:07,440 --> 00:27:09,679 Speaker 1: on that browser. You don't want anything coming back. You 490 00:27:09,680 --> 00:27:13,080 Speaker 1: want to disable things like Flash and Java because these 491 00:27:13,119 --> 00:27:17,720 Speaker 1: programs can often have identifiable information sent along, stuff that 492 00:27:17,800 --> 00:27:21,720 Speaker 1: doesn't even seem to be necessary for whatever it's supposed 493 00:27:21,720 --> 00:27:24,720 Speaker 1: to be doing within the context of the web page. 494 00:27:25,440 --> 00:27:29,800 Speaker 1: Disable all that. If you really want to go super spy, 495 00:27:29,880 --> 00:27:33,439 Speaker 1: then you should also probably load a program onto like 496 00:27:33,480 --> 00:27:36,320 Speaker 1: a USB flash drive that will allow you to boot 497 00:27:36,359 --> 00:27:39,840 Speaker 1: the computer into a separate operating system than the one 498 00:27:39,880 --> 00:27:44,000 Speaker 1: the computer natively runs that is specifically geared to allow 499 00:27:44,040 --> 00:27:47,360 Speaker 1: you to log into something like tour the Onion router. 500 00:27:47,960 --> 00:27:52,040 Speaker 1: So there are such things. There are such devices that, 501 00:27:52,280 --> 00:27:55,119 Speaker 1: or such programs you can put onto a USB device 502 00:27:55,200 --> 00:27:59,800 Speaker 1: like the Amnesia Incognito Live system also known as TAIL. 503 00:28:00,680 --> 00:28:04,120 Speaker 1: That's a Linux based stripped down operating system. Really, all 504 00:28:04,119 --> 00:28:06,040 Speaker 1: it's meant to do is, you know, you would you 505 00:28:06,040 --> 00:28:07,760 Speaker 1: would turn the computer off, which is already going to 506 00:28:07,800 --> 00:28:10,639 Speaker 1: be an issue in a public library. Trust me, you 507 00:28:10,760 --> 00:28:14,000 Speaker 1: plug this USB thumb drive into the into the port, 508 00:28:14,280 --> 00:28:16,960 Speaker 1: turn the computer back on. It will boot from the USB, 509 00:28:17,119 --> 00:28:20,120 Speaker 1: so instead of running its normal boot system, it will 510 00:28:20,200 --> 00:28:23,320 Speaker 1: go to the USB for it, load the stripped down OS. 511 00:28:23,400 --> 00:28:27,280 Speaker 1: That's just launching this tour uh interface, and then you 512 00:28:27,280 --> 00:28:32,280 Speaker 1: could access what you needed. Turn everything off again, unplugged 513 00:28:32,280 --> 00:28:34,600 Speaker 1: the USB, turn it back on, and then you're gone. 514 00:28:36,880 --> 00:28:42,800 Speaker 1: Even the first idea, Yeah, you probably exfoliated thoroughly to 515 00:28:42,800 --> 00:28:50,000 Speaker 1: get rid of all possible Right. It sounds it sounds 516 00:28:50,040 --> 00:28:51,959 Speaker 1: like we're being silly, but no, if you seriously are 517 00:28:51,960 --> 00:28:56,360 Speaker 1: talking about doing everything you possibly can to preserve anonymity, 518 00:28:56,400 --> 00:28:58,280 Speaker 1: this is like the level of extreme you have to 519 00:28:58,280 --> 00:29:01,240 Speaker 1: go to because there's so many different ways to leave 520 00:29:01,240 --> 00:29:05,120 Speaker 1: behind traces. Yeah. Absolutely, And I'm really glad that you 521 00:29:05,160 --> 00:29:08,200 Speaker 1: said that, because when when we talk about this, this 522 00:29:08,360 --> 00:29:11,360 Speaker 1: booting up, in this turning off the computer and having 523 00:29:11,360 --> 00:29:14,080 Speaker 1: and turn it back on, one thing that a lot 524 00:29:14,120 --> 00:29:17,360 Speaker 1: of you are probably realizing out their listeners is that 525 00:29:17,720 --> 00:29:21,600 Speaker 1: some libraries will check for an I d uh. It's true. 526 00:29:21,720 --> 00:29:26,200 Speaker 1: We can again scale this up. Maintaining anonymity requires more 527 00:29:26,240 --> 00:29:29,760 Speaker 1: than just the use of software. Of consider a closed 528 00:29:29,800 --> 00:29:35,600 Speaker 1: circuit television, right, and this this sounds like some tinfoil 529 00:29:35,640 --> 00:29:40,360 Speaker 1: stuff to people. But uh, just for comparison, one of 530 00:29:40,440 --> 00:29:44,280 Speaker 1: the most observed populations in the world is the population 531 00:29:44,360 --> 00:29:47,280 Speaker 1: of the United Kingdom. According to the Telegraph, there's one 532 00:29:47,320 --> 00:29:50,920 Speaker 1: surveillance camera there for every eleven to fourteen people. So 533 00:29:51,320 --> 00:29:54,160 Speaker 1: that means that no matter what you do, uh, just 534 00:29:54,240 --> 00:29:56,960 Speaker 1: in your day to day walking, even if you never 535 00:29:57,080 --> 00:29:59,920 Speaker 1: leave your house. And and I should tell you that 536 00:30:01,160 --> 00:30:04,160 Speaker 1: there's a fair percentage of those cameras that aren't connected 537 00:30:04,200 --> 00:30:06,200 Speaker 1: to anything, but there are enough of them that are 538 00:30:06,320 --> 00:30:09,280 Speaker 1: connected to something that Yeah, that's a really good point. 539 00:30:09,320 --> 00:30:12,240 Speaker 1: There are dummy cameras a lot of the UK, but 540 00:30:12,280 --> 00:30:14,680 Speaker 1: that that's one of those things like if you panopticon, 541 00:30:14,760 --> 00:30:17,640 Speaker 1: it's great. Yeah, because if you think you're being watched, 542 00:30:17,640 --> 00:30:20,800 Speaker 1: then you're more likely to behave yourself. That's kind of creepy, 543 00:30:20,920 --> 00:30:23,880 Speaker 1: that's the idea, but that's totally the idea. Sure, sure, 544 00:30:23,880 --> 00:30:26,040 Speaker 1: And just because you happen to live in a country 545 00:30:26,040 --> 00:30:29,080 Speaker 1: that doesn't have such a widespread governmental program does not 546 00:30:29,160 --> 00:30:31,280 Speaker 1: mean I mean, here in the U S. They're cameras everywhere, 547 00:30:31,320 --> 00:30:34,240 Speaker 1: but they're mostly privatized, or I mean some cities do 548 00:30:34,360 --> 00:30:36,160 Speaker 1: have a lot of traffic cameras or stuff like that 549 00:30:36,200 --> 00:30:39,280 Speaker 1: in a local level. But I mean, but also the 550 00:30:39,360 --> 00:30:41,280 Speaker 1: number of cameras that are watching you every time you 551 00:30:41,320 --> 00:30:45,320 Speaker 1: step into a mall or Disney World or anything like that. 552 00:30:45,800 --> 00:30:48,040 Speaker 1: Are just a lot of cameras, just the cameras that 553 00:30:48,080 --> 00:30:50,760 Speaker 1: are owned by private citizens that aren't doing they're not 554 00:30:50,800 --> 00:30:55,000 Speaker 1: trying to observe you. They're they're they're taking selfies. Are 555 00:30:55,040 --> 00:30:58,280 Speaker 1: taking Yeah no, I'm just telling like people, there's stuff 556 00:30:58,320 --> 00:31:01,320 Speaker 1: where and this you have no idea what kind of 557 00:31:01,840 --> 00:31:04,320 Speaker 1: a security they may or may not be used. So 558 00:31:04,400 --> 00:31:08,080 Speaker 1: that information may end up becoming public publicly available because 559 00:31:08,080 --> 00:31:10,640 Speaker 1: they're uploading it to Twitter or something. Yeah. Sure, sure 560 00:31:10,720 --> 00:31:13,960 Speaker 1: if if Ben is down in internet cafe searching for 561 00:31:14,160 --> 00:31:17,040 Speaker 1: whatever bank robbery related stuff he's searching for, and Matt 562 00:31:17,080 --> 00:31:19,680 Speaker 1: across the tree across the street is taking a selfie 563 00:31:19,760 --> 00:31:23,240 Speaker 1: and it's like, oh, hey, isn't that Ben, And he's 564 00:31:23,360 --> 00:31:26,200 Speaker 1: he's and he's tagged his selfie as my bank robbing 565 00:31:26,280 --> 00:31:30,320 Speaker 1: adventure with Ben. The cat is out of the bagman. Yeah, 566 00:31:30,720 --> 00:31:33,360 Speaker 1: there we go. That's nice. But that's that is a 567 00:31:33,400 --> 00:31:36,080 Speaker 1: really good point. So if you wanted to be completely anonymous, 568 00:31:36,080 --> 00:31:38,000 Speaker 1: one of the things you would have to worry about 569 00:31:38,520 --> 00:31:40,960 Speaker 1: is your appearance, and now it would look so as 570 00:31:40,960 --> 00:31:43,760 Speaker 1: silly as it's may sound. Uh, it would be better 571 00:31:43,840 --> 00:31:46,800 Speaker 1: to vary your appearance while you're access in these different sites, 572 00:31:47,080 --> 00:31:51,160 Speaker 1: which just sounds bizarre to me. If if I had 573 00:31:51,200 --> 00:31:53,360 Speaker 1: to do that, if I had to be anonymous, if 574 00:31:53,360 --> 00:31:56,320 Speaker 1: any of us had to be that anonymous, wouldn't it 575 00:31:56,320 --> 00:31:59,400 Speaker 1: be time for us to really sit down and have 576 00:31:59,400 --> 00:32:03,440 Speaker 1: have a come to I would definitely need to start 577 00:32:03,520 --> 00:32:06,360 Speaker 1: questioning my life choices. Yeah, like what led me to 578 00:32:06,400 --> 00:32:09,680 Speaker 1: this point where I can't let anyone know that I'm 579 00:32:09,680 --> 00:32:12,400 Speaker 1: looking up a recipe for Scotch eggs? And if the 580 00:32:12,440 --> 00:32:15,280 Speaker 1: world itself had reached that point, then you sit there 581 00:32:15,280 --> 00:32:19,280 Speaker 1: and say, we have become one of those dystopian science 582 00:32:19,320 --> 00:32:22,160 Speaker 1: fiction novels that I used to love because I thought 583 00:32:22,160 --> 00:32:24,280 Speaker 1: of it as a warning for what the future could be. 584 00:32:24,360 --> 00:32:27,560 Speaker 1: And now the future is that. Then then you have 585 00:32:27,600 --> 00:32:32,640 Speaker 1: a serious like okay, what now moment? But beyond that, 586 00:32:32,760 --> 00:32:34,920 Speaker 1: I mean, you also have to think about the other 587 00:32:34,920 --> 00:32:37,680 Speaker 1: devices that you own and whether you probably don't want 588 00:32:37,680 --> 00:32:41,640 Speaker 1: to carry them with you when you're like, you don't 589 00:32:41,640 --> 00:32:44,880 Speaker 1: want to have a smartphone with you, right, You certainly 590 00:32:44,880 --> 00:32:46,880 Speaker 1: don't want to wear your fit. Now you don't want 591 00:32:46,880 --> 00:32:50,200 Speaker 1: to you don't want anything that's got Bluetooth on it. Like. Uh, 592 00:32:50,280 --> 00:32:53,040 Speaker 1: and and we didn't even mention this, but I should 593 00:32:53,040 --> 00:32:55,400 Speaker 1: go back and point this out to when you go 594 00:32:55,520 --> 00:33:00,640 Speaker 1: and you're using some other places uh internet. H. Let's 595 00:33:00,680 --> 00:33:03,720 Speaker 1: say that you do have like a super cheap notebook 596 00:33:03,760 --> 00:33:05,480 Speaker 1: and you're just going to use it this one time. 597 00:33:05,600 --> 00:33:08,000 Speaker 1: You you've planned it out, this is this is you're 598 00:33:08,040 --> 00:33:11,640 Speaker 1: you're going to send some messages. Maybe you are in 599 00:33:11,760 --> 00:33:13,920 Speaker 1: like a foreign country and you just you have to 600 00:33:13,960 --> 00:33:15,880 Speaker 1: get this information out and this is this is your 601 00:33:15,880 --> 00:33:19,120 Speaker 1: best chance. If you're going someplace that's using WiFi, then 602 00:33:19,160 --> 00:33:21,520 Speaker 1: you also have to remember there are programs that can 603 00:33:21,560 --> 00:33:25,440 Speaker 1: sniff it. Essentially, they're looking for the messages that are 604 00:33:25,440 --> 00:33:29,840 Speaker 1: going between your computer and the the the wireless router 605 00:33:30,120 --> 00:33:35,320 Speaker 1: in that business, right, you want a hard connection for better? Yeah, 606 00:33:35,520 --> 00:33:38,520 Speaker 1: hard connection is better. Or you want to have a 607 00:33:38,600 --> 00:33:42,320 Speaker 1: way of making sure that you're encrypting any information that's 608 00:33:42,360 --> 00:33:45,840 Speaker 1: coming between your computer and going to the router, Like 609 00:33:45,880 --> 00:33:49,080 Speaker 1: if it's encrypted to a point where anyone listening in, uh, 610 00:33:49,160 --> 00:33:51,200 Speaker 1: you know, they can grab the data but they can't 611 00:33:51,200 --> 00:33:53,720 Speaker 1: make sense of it, then you're better off, which is 612 00:33:53,760 --> 00:33:56,400 Speaker 1: probably realistically the best you can hope for. There are 613 00:33:56,440 --> 00:34:01,000 Speaker 1: some fantastic encryption programs out there, um, there are also 614 00:34:01,160 --> 00:34:04,720 Speaker 1: some fantastic code breaking programs out there right, and there's 615 00:34:04,760 --> 00:34:08,279 Speaker 1: some that are classified. We don't know their capability. And 616 00:34:08,320 --> 00:34:11,560 Speaker 1: it's always an arms race encryption. Yeah, yeah, it's that's 617 00:34:11,560 --> 00:34:13,880 Speaker 1: just the nature of it. It pushes encryption forward, but 618 00:34:14,000 --> 00:34:16,879 Speaker 1: also pushes hacking forward. For example, the fact that now 619 00:34:16,920 --> 00:34:20,400 Speaker 1: we have graphics processors that have multiple cores. That's well, 620 00:34:20,440 --> 00:34:22,680 Speaker 1: a lot of hackers used to try and break encryption. 621 00:34:22,800 --> 00:34:26,239 Speaker 1: They just they write up a program, or more frequently, 622 00:34:26,320 --> 00:34:29,800 Speaker 1: they download a program that someone else's written that will 623 00:34:30,080 --> 00:34:32,080 Speaker 1: do a brute force attack, but they're doing it by 624 00:34:32,160 --> 00:34:36,200 Speaker 1: dividing up the attack among multiple processor cores. So something 625 00:34:36,239 --> 00:34:39,239 Speaker 1: that would traditionally take, you know, a hundred years for 626 00:34:39,280 --> 00:34:42,200 Speaker 1: a computer to crack, because you've got other processor cores 627 00:34:42,200 --> 00:34:44,279 Speaker 1: and they can all work on it in parallel. The 628 00:34:44,320 --> 00:34:46,800 Speaker 1: more cores you have, the less time it's going to 629 00:34:46,880 --> 00:34:49,799 Speaker 1: take you to actually break that encryption. That's kind of 630 00:34:49,800 --> 00:34:52,560 Speaker 1: a scary world, but it's it's the world that's that, 631 00:34:52,719 --> 00:34:54,919 Speaker 1: you know. It's it's one of the tradeoffs of having 632 00:34:54,920 --> 00:34:58,840 Speaker 1: this amazing technology that lets me go online and get 633 00:34:58,960 --> 00:35:04,520 Speaker 1: my my avatar blown away by a sniper for thirty 634 00:35:04,600 --> 00:35:07,880 Speaker 1: second time. Hey, that guy's camping. Don't be it's a 635 00:35:07,960 --> 00:35:10,839 Speaker 1: legitimate strategy. Yeah it is, it is, but it did not. 636 00:35:11,760 --> 00:35:13,920 Speaker 1: Camping is not a legitimate strategy. Oh my gosh, are 637 00:35:13,920 --> 00:35:17,440 Speaker 1: you the sniper? Have you been anonymously? Actually, Lauren is 638 00:35:17,440 --> 00:35:20,560 Speaker 1: the sniper. She likes to go to the end of 639 00:35:20,600 --> 00:35:23,200 Speaker 1: the map and in a nice little crow's nest area 640 00:35:23,239 --> 00:35:27,799 Speaker 1: and pick people off. I circulate. Okay, well, that's that's 641 00:35:27,880 --> 00:35:31,920 Speaker 1: true sniper tactics. That sniper's work. You fire and then 642 00:35:31,920 --> 00:35:34,960 Speaker 1: you change locations, kind of off on a tall I 643 00:35:35,000 --> 00:35:37,439 Speaker 1: have something important that we we should remember to see. 644 00:35:37,480 --> 00:35:41,320 Speaker 1: And yes, that I forgot one of the biggest disadvantages. 645 00:35:41,480 --> 00:35:45,200 Speaker 1: Let's say everything works out. You have a spot on 646 00:35:45,400 --> 00:35:48,600 Speaker 1: disguise and and there you are and your poncho and 647 00:35:48,640 --> 00:35:53,640 Speaker 1: your sombrero at the library monocle and your crazy makeup 648 00:35:53,680 --> 00:35:56,439 Speaker 1: to prevent any kind of facial recognition to yah, yeah, 649 00:35:56,760 --> 00:35:58,640 Speaker 1: you just just forget eight and a half yards, right, 650 00:35:58,920 --> 00:36:00,879 Speaker 1: let's do this. If right really doing it, And there 651 00:36:00,920 --> 00:36:04,200 Speaker 1: you are checking out your your bank robbery stuff or 652 00:36:04,239 --> 00:36:08,120 Speaker 1: whatever it is Matt's doing over there, and then you say, uh. 653 00:36:08,239 --> 00:36:11,920 Speaker 1: Then then you say, oh, okay, I'm in. I have 654 00:36:12,640 --> 00:36:15,160 Speaker 1: X amount of time that I can spend here. And 655 00:36:15,239 --> 00:36:18,839 Speaker 1: that's when you realize that accessing the web anonymously it's 656 00:36:18,960 --> 00:36:23,120 Speaker 1: pretty slow. Oh yeah, yeah, because you're routing that traffic 657 00:36:23,320 --> 00:36:27,000 Speaker 1: through a proxy or VPN before it even gets to you. 658 00:36:27,760 --> 00:36:30,319 Speaker 1: That does end up adding a lot of time. So 659 00:36:30,440 --> 00:36:32,879 Speaker 1: if you're using something like Tour, if you've ever used Tour, 660 00:36:33,480 --> 00:36:36,640 Speaker 1: then you may think like, man, this is just crawling today. 661 00:36:36,680 --> 00:36:40,840 Speaker 1: But that's because yeah, the process that tour uses and 662 00:36:40,920 --> 00:36:42,719 Speaker 1: go back and listen to our Tour episode if you 663 00:36:42,800 --> 00:36:44,719 Speaker 1: if you want to learn more about it. But the 664 00:36:44,760 --> 00:36:48,480 Speaker 1: process that uses, while it is uh a pretty secure 665 00:36:49,239 --> 00:36:53,840 Speaker 1: um approach, recently we've found out that not necessarily completely 666 00:36:53,840 --> 00:36:58,319 Speaker 1: secure approach UM, but that that does take time because 667 00:36:58,520 --> 00:37:01,799 Speaker 1: instead of it going from the regular route it would 668 00:37:01,840 --> 00:37:04,280 Speaker 1: across the Internet if you were just using the surface Web, 669 00:37:04,719 --> 00:37:07,120 Speaker 1: it has to do all these jumps from one node 670 00:37:07,160 --> 00:37:09,800 Speaker 1: to the next through a circuit of nodes before it 671 00:37:09,840 --> 00:37:12,600 Speaker 1: can finally get to you. And that's on top of 672 00:37:12,760 --> 00:37:16,120 Speaker 1: just the regular traffic it would normally do well. Luckily, 673 00:37:16,160 --> 00:37:19,280 Speaker 1: you're you're not again, you're you're probably not browsing Corgy 674 00:37:19,400 --> 00:37:23,160 Speaker 1: videos viator. I hope not, because you will be waiting 675 00:37:23,280 --> 00:37:25,520 Speaker 1: far too long for the adorable nous to come and 676 00:37:25,560 --> 00:37:27,279 Speaker 1: hit you in the face. Or at least that's what 677 00:37:27,320 --> 00:37:33,520 Speaker 1: Big Corgy wants you to think. That's that's that's both 678 00:37:33,640 --> 00:37:40,200 Speaker 1: terrifying and and just absolutely you know, as it's a 679 00:37:40,239 --> 00:37:44,479 Speaker 1: slightly shorter Clifford the Red Dog. Yeah, I welcome our 680 00:37:44,480 --> 00:37:52,440 Speaker 1: our Corky overlords, cork overlords lords at any rate. The 681 00:37:52,480 --> 00:37:55,200 Speaker 1: message you have to take home here is that the 682 00:37:55,239 --> 00:38:00,640 Speaker 1: Internet is meant, like Ben said, as a communication device, 683 00:38:00,719 --> 00:38:04,400 Speaker 1: as something where people are accessing and sharing, and in 684 00:38:04,480 --> 00:38:06,040 Speaker 1: order to do that you have to give up some 685 00:38:06,719 --> 00:38:10,280 Speaker 1: anonymity in order for it to be effective and easy 686 00:38:10,320 --> 00:38:13,440 Speaker 1: to do. It doesn't mean that you absolutely must give 687 00:38:13,520 --> 00:38:17,440 Speaker 1: up all anonymity. It does not mean that you cannot, 688 00:38:17,480 --> 00:38:21,200 Speaker 1: at least upon occasion, UH do your best to cover 689 00:38:21,280 --> 00:38:25,440 Speaker 1: all of your digital tracks and have a reasonable expectation 690 00:38:25,680 --> 00:38:28,840 Speaker 1: of being you know, pretty much under the radar. But 691 00:38:29,000 --> 00:38:31,720 Speaker 1: in order to do it, as like that's the way 692 00:38:31,800 --> 00:38:35,439 Speaker 1: you access the web, it's really not practical, Yeah, it's 693 00:38:36,080 --> 00:38:40,040 Speaker 1: it's not practical. At all and for everyone listening in 694 00:38:40,040 --> 00:38:41,960 Speaker 1: this UM. First one, I say, guys, thank you so 695 00:38:42,040 --> 00:38:45,840 Speaker 1: much for having me on your show. It's always it 696 00:38:45,880 --> 00:38:48,600 Speaker 1: always makes my day. UM. And I want to special 697 00:38:48,719 --> 00:38:51,600 Speaker 1: message to any of your listeners. I hope you guys 698 00:38:51,640 --> 00:38:55,560 Speaker 1: already know this. Incognito mode just doesn't leave a trace 699 00:38:55,600 --> 00:39:01,120 Speaker 1: on your computer. Everybody knows what you're looking at. Yeah, no, 700 00:39:01,239 --> 00:39:03,560 Speaker 1: I mean yeah, because the router that your computer is 701 00:39:03,600 --> 00:39:07,120 Speaker 1: going to everything is clear. Like you know, you the 702 00:39:07,160 --> 00:39:12,120 Speaker 1: when you type in www dot corgis rob Banks dot com. 703 00:39:12,560 --> 00:39:14,840 Speaker 1: The router knows that that's the website you went to. 704 00:39:15,040 --> 00:39:18,720 Speaker 1: Your sp knows. Yeah, everyone knows, and they know which 705 00:39:18,760 --> 00:39:22,440 Speaker 1: I p which, which computer looked up that information. The 706 00:39:22,480 --> 00:39:26,000 Speaker 1: only thing that is is being white clear is your browser. Right. 707 00:39:26,120 --> 00:39:28,280 Speaker 1: That's just so that other people in your house cannot 708 00:39:28,280 --> 00:39:33,600 Speaker 1: immediately access the information. Like Jonathan's got a real corgy 709 00:39:33,640 --> 00:39:35,319 Speaker 1: problem and I'm going to prove it by looking at 710 00:39:35,400 --> 00:39:40,600 Speaker 1: search history. Oh he's been using incognito mode boiled again. Yeah, 711 00:39:40,600 --> 00:39:43,680 Speaker 1: that's the only time that works, right that machine. So 712 00:39:43,719 --> 00:39:47,040 Speaker 1: I just wanted to save anybody the trouble and also 713 00:39:47,320 --> 00:39:51,719 Speaker 1: disclaimer for anyone listening in that might be working for 714 00:39:51,840 --> 00:39:56,239 Speaker 1: a government agency. I have not planned Rabba Bank, nor 715 00:39:56,280 --> 00:39:59,400 Speaker 1: do I ever planned Rabba Bank. I do, however, have 716 00:39:59,440 --> 00:40:02,280 Speaker 1: a soft spot for quirkies, and I'll go on record 717 00:40:02,320 --> 00:40:05,040 Speaker 1: with that one. I mean, Ben actually helped produce an 718 00:40:05,080 --> 00:40:08,160 Speaker 1: episode about why you shouldn't rob banks over on brain stuff. 719 00:40:08,160 --> 00:40:17,600 Speaker 1: It's the perfect cover. You just ruin everything. Well once, 720 00:40:17,640 --> 00:40:20,040 Speaker 1: once you do learn the definition of bagman, it'll all 721 00:40:20,080 --> 00:40:23,680 Speaker 1: just kind of fall into place. Well, Ben, thank you 722 00:40:24,000 --> 00:40:28,120 Speaker 1: for for joining us. And also, guys, if you haven't 723 00:40:28,160 --> 00:40:30,440 Speaker 1: listened to stuff they don't want you to know, are 724 00:40:30,520 --> 00:40:33,799 Speaker 1: gone to see the videos and the incredible work that 725 00:40:33,840 --> 00:40:35,799 Speaker 1: Ben and Matter are doing. You definitely got to check 726 00:40:35,800 --> 00:40:38,520 Speaker 1: it out. It's some phenomenal stuff. There will be a 727 00:40:38,560 --> 00:40:42,360 Speaker 1: companion episode to this episode you're listening to right now, 728 00:40:43,160 --> 00:40:45,520 Speaker 1: on stuff they don't want you to know, which will 729 00:40:45,600 --> 00:40:49,279 Speaker 1: we will be recording almost immediately after we sign off 730 00:40:49,320 --> 00:40:52,120 Speaker 1: of this episode. So if you couldn't, if you didn't 731 00:40:52,120 --> 00:40:54,200 Speaker 1: get enough, if you thought, I have got to hear 732 00:40:54,239 --> 00:40:58,120 Speaker 1: these three people talk more about anonymity and the deep 733 00:40:58,200 --> 00:41:01,640 Speaker 1: Web and things of that nature, and Coregs will probably 734 00:41:01,719 --> 00:41:05,080 Speaker 1: somehow make an appearance. We can't promise that. Maybe we'll 735 00:41:05,120 --> 00:41:07,120 Speaker 1: have worked out the coregies in our system by then 736 00:41:07,760 --> 00:41:10,719 Speaker 1: go check that out it. Uh, you'll definitely if you 737 00:41:10,800 --> 00:41:14,560 Speaker 1: enjoyed tech stuff, there's gonna be tons of episodes on 738 00:41:14,600 --> 00:41:16,160 Speaker 1: stuff they don't want you to know that are really 739 00:41:16,160 --> 00:41:19,000 Speaker 1: going to appeal to you. Absolutely. In that next episode, 740 00:41:19,000 --> 00:41:20,960 Speaker 1: I wanted to put in we will go more into 741 00:41:21,080 --> 00:41:24,840 Speaker 1: that tour thing that we alluded to, the recent problems 742 00:41:24,880 --> 00:41:27,240 Speaker 1: that tour has had and and some of the reasons 743 00:41:27,280 --> 00:41:31,000 Speaker 1: why even using tour does not completely protect you, which 744 00:41:31,040 --> 00:41:33,719 Speaker 1: which is pretty fascinating and terrifying at the same time. Right, 745 00:41:33,760 --> 00:41:35,560 Speaker 1: So if you want to know more about that, well 746 00:41:35,600 --> 00:41:38,640 Speaker 1: then you're gonna have to subscribe to another podcast. But 747 00:41:38,680 --> 00:41:40,760 Speaker 1: that's okay, because it's an awesome podcast and you should 748 00:41:40,760 --> 00:41:42,919 Speaker 1: be subscribing to it already. But yeah, you can find 749 00:41:42,960 --> 00:41:45,439 Speaker 1: all of their content I believe at stuff they don't 750 00:41:45,440 --> 00:41:50,000 Speaker 1: want you to know dot com. Yes, absolutely excellent. Um, 751 00:41:50,120 --> 00:41:54,760 Speaker 1: and uh, their YouTube channel I believe is a conspiracy stuff. 752 00:41:54,760 --> 00:41:56,680 Speaker 1: We have like three names because we're trying to be 753 00:41:56,800 --> 00:41:59,640 Speaker 1: an anonymous show on the internet. Yeah, it does help 754 00:41:59,680 --> 00:42:02,040 Speaker 1: to be a really good on YouTube. Change your identity 755 00:42:02,040 --> 00:42:05,360 Speaker 1: every twenty or thirty minutes. Yeah, you guys know that 756 00:42:05,360 --> 00:42:09,200 Speaker 1: when people asking some publics, we say that we're YouTube. Okay, 757 00:42:09,200 --> 00:42:13,239 Speaker 1: that's fair, all right. Well then, well that's all for 758 00:42:13,280 --> 00:42:16,160 Speaker 1: our show today, guys. Thanks Ben for wrapping up. Yeah, 759 00:42:16,200 --> 00:42:18,920 Speaker 1: if you guys have any suggestions for future topics that 760 00:42:19,000 --> 00:42:21,520 Speaker 1: we can cover on tech Stuff, send us an email 761 00:42:21,560 --> 00:42:25,240 Speaker 1: that addresses tech Stuff at how stuff works dot com, 762 00:42:25,719 --> 00:42:28,040 Speaker 1: or you can drop us a line on Tumbler, Twitter, 763 00:42:28,239 --> 00:42:30,760 Speaker 1: or Facebook or handle it. All three is tech Stuff 764 00:42:31,040 --> 00:42:37,719 Speaker 1: hs W and we'll talk to you again. Released for 765 00:42:37,840 --> 00:42:40,160 Speaker 1: more on this and thousands of other topics because it 766 00:42:40,239 --> 00:42:51,040 Speaker 1: has to works dot com