1 00:00:00,320 --> 00:00:02,960 Speaker 1: Brought to you by the reinvented two thousand twelve Camray. 2 00:00:03,200 --> 00:00:08,840 Speaker 1: It's ready. Are you get in touch with technology? With 3 00:00:08,920 --> 00:00:14,600 Speaker 1: tech stuff from how stuff works dot com. Hi there, everybody, 4 00:00:14,680 --> 00:00:17,040 Speaker 1: Welcome to the podcast. My name is Chris Pillette. I'm 5 00:00:17,040 --> 00:00:19,560 Speaker 1: an editor here at how Stuff Works. Sitting next to me, 6 00:00:19,680 --> 00:00:24,040 Speaker 1: as usual, is senior writer Jonathan Strickland. Hey there, and 7 00:00:24,079 --> 00:00:27,120 Speaker 1: we were gonna talk about something, but we'll have to 8 00:00:27,200 --> 00:00:29,920 Speaker 1: do it through someone else. Yeah, yeah, we have to 9 00:00:30,440 --> 00:00:33,320 Speaker 1: have a proxy. Wouldn't you say? Yeah, I'd say so. 10 00:00:33,440 --> 00:00:36,040 Speaker 1: You had another wonderful segue. Thank you, Mr Pilette. So 11 00:00:36,640 --> 00:00:39,080 Speaker 1: this is in response to an email we received U. 12 00:00:39,400 --> 00:00:42,320 Speaker 1: Tim West wrote to us and said, I'm writing to 13 00:00:42,360 --> 00:00:44,920 Speaker 1: you on behalf of your podcast on parental controls. While 14 00:00:44,960 --> 00:00:47,159 Speaker 1: I was listening to this podcast, I noticed you were 15 00:00:47,159 --> 00:00:49,559 Speaker 1: talking about how your children would find ways to bypass 16 00:00:49,560 --> 00:00:53,600 Speaker 1: parental controls. This made me think of proxy avoidance systems. 17 00:00:54,000 --> 00:00:56,080 Speaker 1: I'm just saying that this would be an interesting podcast 18 00:00:56,080 --> 00:00:58,000 Speaker 1: to develop since I, as well as many others, are 19 00:00:58,040 --> 00:01:00,800 Speaker 1: interested in this topic. Thank you for your in formative podcast. 20 00:01:00,880 --> 00:01:02,680 Speaker 1: There joy to listen to. Well, Thank you, Tim. It's 21 00:01:02,680 --> 00:01:05,880 Speaker 1: a joy to get that kind of email. Um okay, 22 00:01:05,920 --> 00:01:07,560 Speaker 1: so let's start this off by saying we do not 23 00:01:07,640 --> 00:01:11,880 Speaker 1: recommend you use proxies to get around systems. Uh. That way, 24 00:01:12,319 --> 00:01:14,039 Speaker 1: there gout that on the table. We can move on 25 00:01:14,120 --> 00:01:21,959 Speaker 1: from there. Actually, speaking of of unusual, I guess it's 26 00:01:22,200 --> 00:01:25,360 Speaker 1: funny that we looked at this subject very differently when 27 00:01:25,360 --> 00:01:27,120 Speaker 1: we were starting to do the research on it. Yeah, 28 00:01:27,120 --> 00:01:30,080 Speaker 1: it's very true. Uh. Pallette, when he thinks of proxies, 29 00:01:30,200 --> 00:01:33,559 Speaker 1: was thinking of a kind of an administrative system that's 30 00:01:33,680 --> 00:01:37,080 Speaker 1: used to kind of, uh, well, we'll put limitations on 31 00:01:37,120 --> 00:01:40,560 Speaker 1: what you can and can't see when you access the web, 32 00:01:40,880 --> 00:01:43,960 Speaker 1: Whereas I was thinking more along the lines of of 33 00:01:44,000 --> 00:01:46,960 Speaker 1: what I think Tim was saying, which is that, you know, 34 00:01:47,280 --> 00:01:51,480 Speaker 1: using certain websites to get around barriers that would otherwise 35 00:01:51,480 --> 00:01:54,000 Speaker 1: be between you and the content you want to see. 36 00:01:54,360 --> 00:01:57,000 Speaker 1: So it's interesting, I guess, uh, I was saying that 37 00:01:57,000 --> 00:01:59,040 Speaker 1: Pelette's kind of looking at it at the the sort 38 00:01:59,080 --> 00:02:00,800 Speaker 1: of the law abiding way, and I was looking at 39 00:02:00,840 --> 00:02:05,920 Speaker 1: it at the the hooligan kind of way. How unusual. Yeah, 40 00:02:06,120 --> 00:02:09,720 Speaker 1: it never would have pegged it would. Well, what I 41 00:02:09,760 --> 00:02:14,120 Speaker 1: was thinking about was personal experience working in corporations where 42 00:02:14,639 --> 00:02:17,560 Speaker 1: they will put up a in a very advanced firewall 43 00:02:17,600 --> 00:02:20,519 Speaker 1: which blocks a lot of a lot of cyber attacks 44 00:02:20,560 --> 00:02:25,639 Speaker 1: and um basically keeps you from going out to UH 45 00:02:25,720 --> 00:02:28,360 Speaker 1: porn sites or to spend a lot of time on 46 00:02:28,400 --> 00:02:32,640 Speaker 1: Facebook or your email account and things like that. Basically 47 00:02:32,720 --> 00:02:35,919 Speaker 1: trying to keep people productive and keep the company from 48 00:02:35,919 --> 00:02:39,680 Speaker 1: suffering any harm via the Internet. And in this case, 49 00:02:39,760 --> 00:02:43,400 Speaker 1: a proxy server would allow you to get information through 50 00:02:43,440 --> 00:02:47,280 Speaker 1: the firewall, so you you you're essentially bypassing the firewall, 51 00:02:47,280 --> 00:02:50,200 Speaker 1: but you're bypassing it in ways that the company allows 52 00:02:50,280 --> 00:02:52,959 Speaker 1: you to bypass it. So it's like, guess you can 53 00:02:53,040 --> 00:02:56,120 Speaker 1: in fact go to the corporate website UH and to 54 00:02:56,280 --> 00:02:58,359 Speaker 1: some of our competitors to do research, but you may 55 00:02:58,400 --> 00:03:02,520 Speaker 1: not go shopping on Amazon, right. And it kind of 56 00:03:02,560 --> 00:03:05,120 Speaker 1: helps to sort of give a brief overview of how 57 00:03:05,160 --> 00:03:09,120 Speaker 1: the Internet works, sort of an Internet infrastructure rundown to 58 00:03:09,160 --> 00:03:12,560 Speaker 1: sort of understand what we're talking about here. So think 59 00:03:12,800 --> 00:03:16,280 Speaker 1: of the Internet as a series of servers and clients. 60 00:03:18,480 --> 00:03:21,800 Speaker 1: It's not a series of tubes that administration is never mind, 61 00:03:21,960 --> 00:03:25,600 Speaker 1: So we're talking about clients and servers. The client requests 62 00:03:25,720 --> 00:03:30,400 Speaker 1: information from servers, and think of all the servers across 63 00:03:30,440 --> 00:03:33,799 Speaker 1: the world as being nodes, and when you send out 64 00:03:33,840 --> 00:03:36,760 Speaker 1: a request from a client, it goes out until it 65 00:03:36,800 --> 00:03:40,040 Speaker 1: reaches the destination where that information resides. Because all the 66 00:03:40,040 --> 00:03:43,960 Speaker 1: information on the Internet exists on a physical machine somewhere 67 00:03:44,760 --> 00:03:48,480 Speaker 1: more multiple physical machines sometimes I mean for redundancy's sake, 68 00:03:48,520 --> 00:03:52,440 Speaker 1: there are multiple machines with that info. So your your 69 00:03:52,440 --> 00:03:55,320 Speaker 1: request goes out and then that server serves up the 70 00:03:55,360 --> 00:03:58,000 Speaker 1: information sends it back to you. It goes through all 71 00:03:58,040 --> 00:04:00,360 Speaker 1: those nodes, of various nodes to get to you. It 72 00:04:00,600 --> 00:04:02,480 Speaker 1: may not go through the same ones that your request 73 00:04:02,520 --> 00:04:06,280 Speaker 1: went through. Uh. They come in packets. The information comes 74 00:04:06,280 --> 00:04:08,680 Speaker 1: into these little uh, these little packets of information that 75 00:04:08,720 --> 00:04:11,480 Speaker 1: gets reassembled at your computer and then you've got whatever 76 00:04:11,480 --> 00:04:14,240 Speaker 1: it was you sent your request out to get. So 77 00:04:14,360 --> 00:04:19,919 Speaker 1: a proxy server sits between your client and all the 78 00:04:19,960 --> 00:04:22,800 Speaker 1: other servers. It is uh, it's it's kind of like 79 00:04:22,839 --> 00:04:27,880 Speaker 1: a guardian in a way, so it can intercept information 80 00:04:27,920 --> 00:04:31,760 Speaker 1: being sent out or being brought in too, from the 81 00:04:31,800 --> 00:04:34,440 Speaker 1: servers to the client or vice versa. And that's where 82 00:04:34,480 --> 00:04:37,280 Speaker 1: you get filtering, where you can have a proxy server 83 00:04:37,360 --> 00:04:40,760 Speaker 1: set up with filters that block certain websites, you know, 84 00:04:40,880 --> 00:04:44,240 Speaker 1: complete access if you want, so just think of it. 85 00:04:44,240 --> 00:04:46,640 Speaker 1: It's pretty simple really, It's just a big database of 86 00:04:46,680 --> 00:04:50,640 Speaker 1: websites saying, you know, don't allow anyone on this side 87 00:04:50,640 --> 00:04:55,240 Speaker 1: of the proxy server to access these websites. UM. So yeah, 88 00:04:55,400 --> 00:04:58,520 Speaker 1: very simple kind of concept. Uh, and that's your basic 89 00:04:58,560 --> 00:05:04,279 Speaker 1: proxy server. Well, and it reminds me actually of Tour. 90 00:05:05,320 --> 00:05:08,960 Speaker 1: I'm assuming that you're familiar with Tour because what Tour 91 00:05:09,080 --> 00:05:13,440 Speaker 1: does is, um it's an anonymous web browsing software solution. 92 00:05:13,720 --> 00:05:17,160 Speaker 1: And uh, it uses the concept that Jonathan was just 93 00:05:17,200 --> 00:05:20,760 Speaker 1: talking about about the different nodes. UM. Once you send 94 00:05:20,800 --> 00:05:25,440 Speaker 1: a request, in your request bounces between computers in different places, 95 00:05:25,960 --> 00:05:30,480 Speaker 1: and it basically prevents you from being your traffic from 96 00:05:30,480 --> 00:05:35,960 Speaker 1: being analyzed. So if you are from you know, the 97 00:05:35,760 --> 00:05:41,640 Speaker 1: United States, and you use Tour to mask your your information, 98 00:05:42,080 --> 00:05:44,880 Speaker 1: your signal gets bounced around and you might appear to 99 00:05:44,880 --> 00:05:48,599 Speaker 1: be coming from Sweden, for example, because it is basically 100 00:05:48,640 --> 00:05:51,680 Speaker 1: fooling those servers into thinking you're from somewhere else. It's 101 00:05:51,760 --> 00:05:53,920 Speaker 1: it's very much like those spy movies when they're trying 102 00:05:53,920 --> 00:05:57,320 Speaker 1: to trace the call. Right, he's calling from Luxembourg. No, 103 00:05:57,640 --> 00:06:02,560 Speaker 1: wait it's Paris. Wait no, it's Sydney. Australia, same sort 104 00:06:02,560 --> 00:06:06,719 Speaker 1: of concept, really and uh and what Tim was sort 105 00:06:06,760 --> 00:06:09,920 Speaker 1: of referring to are these proxy sites that are run 106 00:06:09,960 --> 00:06:14,880 Speaker 1: by various individuals um where you can log into this 107 00:06:15,320 --> 00:06:18,480 Speaker 1: proxy site and then from the proxy site you can 108 00:06:18,480 --> 00:06:23,440 Speaker 1: then access other websites. So let's say that you are 109 00:06:23,440 --> 00:06:26,360 Speaker 1: trying to access a video site that's hosted in another 110 00:06:26,400 --> 00:06:31,160 Speaker 1: country and that country says only only citizens of that 111 00:06:31,200 --> 00:06:34,120 Speaker 1: country can have access to that site. So you since 112 00:06:34,160 --> 00:06:36,479 Speaker 1: you're notice is and you know, you get an access 113 00:06:36,480 --> 00:06:39,280 Speaker 1: denied when you try to access that site directly. You're 114 00:06:39,279 --> 00:06:42,120 Speaker 1: not thinking of the BBC directly, are you, because they 115 00:06:42,120 --> 00:06:45,000 Speaker 1: completely do not allow citizens of the United States to 116 00:06:45,120 --> 00:06:49,479 Speaker 1: access their web shows. I can neither confirm nor deny that. Well, 117 00:06:49,880 --> 00:06:52,400 Speaker 1: you know, if you were in Europe, say you might 118 00:06:52,520 --> 00:06:55,520 Speaker 1: be able to access Hulu, so it would be the 119 00:06:55,560 --> 00:06:59,120 Speaker 1: same thing. Right, Let's just use a completely theoretical example 120 00:06:59,200 --> 00:07:01,200 Speaker 1: like that. So let's say that I'm in Europe and 121 00:07:01,200 --> 00:07:04,080 Speaker 1: I want access Hulu and I can't. Let's stop smirking 122 00:07:04,600 --> 00:07:09,600 Speaker 1: at any rate, So what what one potential solution? And 123 00:07:09,760 --> 00:07:13,680 Speaker 1: granted again we're not uh suggesting you do this, but 124 00:07:14,000 --> 00:07:17,520 Speaker 1: you could find a proxy site that's located within that 125 00:07:17,560 --> 00:07:21,679 Speaker 1: country and visit that that proxy site. Then you normally 126 00:07:21,720 --> 00:07:24,200 Speaker 1: have to fill out a form of some sort and 127 00:07:24,240 --> 00:07:28,400 Speaker 1: then use that to UH to navigate towards the site 128 00:07:28,400 --> 00:07:31,840 Speaker 1: you really want to go to. Now, from the perspective 129 00:07:32,040 --> 00:07:35,320 Speaker 1: of your target site, it looks like you're coming from 130 00:07:35,600 --> 00:07:39,120 Speaker 1: the proxy. They don't see that you're back in Europe 131 00:07:39,240 --> 00:07:42,760 Speaker 1: or Atlanta, Georgia, or wherever you happen to really be. 132 00:07:43,240 --> 00:07:46,040 Speaker 1: They see your location as being from whatever the proxy 133 00:07:46,080 --> 00:07:48,800 Speaker 1: site is and UH and so as a result, you 134 00:07:48,920 --> 00:07:51,320 Speaker 1: may be able to get access to this information that 135 00:07:51,400 --> 00:07:55,840 Speaker 1: otherwise you could not access. UM. That's the basic idea 136 00:07:55,920 --> 00:08:01,080 Speaker 1: behind these these proxy avoidance systems. UH. There are some 137 00:08:01,240 --> 00:08:04,680 Speaker 1: major major issues with proxy avoidance systems that we should 138 00:08:04,720 --> 00:08:08,680 Speaker 1: talk about. The first is that unless you are absolutely 139 00:08:08,720 --> 00:08:14,120 Speaker 1: certain that the person running the site is legitimate, you 140 00:08:14,320 --> 00:08:19,600 Speaker 1: risk having all of your traffic monitored and recorded and 141 00:08:19,680 --> 00:08:23,480 Speaker 1: scrutinized by whomever is running that site, because once you 142 00:08:23,560 --> 00:08:26,360 Speaker 1: fill out that form and that information, you're using their 143 00:08:26,400 --> 00:08:29,240 Speaker 1: site to to browse around. If they're tracking the information, 144 00:08:29,320 --> 00:08:31,679 Speaker 1: they can see what you're doing. So if you access 145 00:08:31,720 --> 00:08:34,360 Speaker 1: a site where you have to put in a user 146 00:08:34,440 --> 00:08:36,640 Speaker 1: name and password, there's a chance that they could have 147 00:08:36,679 --> 00:08:39,960 Speaker 1: access to that information. This is what we in the 148 00:08:40,000 --> 00:08:48,000 Speaker 1: Internet biz tend to refer to as a bad thing. Yeah, yes, exactly, So, UM, 149 00:08:48,160 --> 00:08:53,640 Speaker 1: definitely be careful. I, you know, don't recommend using proxy 150 00:08:53,679 --> 00:08:57,600 Speaker 1: sites on in general. I will not say that I 151 00:08:57,640 --> 00:09:01,080 Speaker 1: have never used a proxy site. I won't say that 152 00:09:01,120 --> 00:09:06,360 Speaker 1: I have either, right yeah, yeah, yeah. Was that it 153 00:09:06,440 --> 00:09:08,520 Speaker 1: for your your bad things? Yeah, that was it for 154 00:09:08,640 --> 00:09:12,120 Speaker 1: my bad thing. So that's that's the general low down 155 00:09:12,200 --> 00:09:15,800 Speaker 1: on on proxy avoidance systems. All right, all right, Well, 156 00:09:16,200 --> 00:09:18,360 Speaker 1: you know, if you were thinking of it from my 157 00:09:18,400 --> 00:09:21,760 Speaker 1: point of view, the one where I was talking about 158 00:09:21,920 --> 00:09:24,320 Speaker 1: your behind the corporate firewall and it's really annoying that 159 00:09:24,360 --> 00:09:26,920 Speaker 1: you can't get to your Gmail. Um, there were a 160 00:09:26,920 --> 00:09:30,760 Speaker 1: couple of things that that might work for you. Um. 161 00:09:30,800 --> 00:09:32,920 Speaker 1: Now this is an entirely different thing. Keeping your mind, 162 00:09:33,000 --> 00:09:36,040 Speaker 1: I mean, this is you being restricted by a uh 163 00:09:36,920 --> 00:09:39,160 Speaker 1: tight firewall. I'm looking for a way to fool the 164 00:09:39,200 --> 00:09:42,600 Speaker 1: proxy into letting you through. Well, uh, simple way to 165 00:09:42,640 --> 00:09:44,439 Speaker 1: do that might be just to add an S to 166 00:09:44,559 --> 00:09:47,840 Speaker 1: the h T t P. A lot of proxies, as 167 00:09:47,880 --> 00:09:51,120 Speaker 1: it turns out, corporate proxies are looking for HTTP calling 168 00:09:51,160 --> 00:09:53,760 Speaker 1: slash slash, and the website you're looking for, well, they 169 00:09:53,800 --> 00:09:56,400 Speaker 1: may not be looking for a secure version of that site, 170 00:09:56,920 --> 00:09:59,199 Speaker 1: and you may simply be able to fool the the 171 00:09:59,240 --> 00:10:02,400 Speaker 1: proxy server into letting you through simply by adding an 172 00:10:02,520 --> 00:10:05,360 Speaker 1: S to your hdt P. I'm not saying it'll work. 173 00:10:05,400 --> 00:10:08,720 Speaker 1: And again, this is another version of it's probably not 174 00:10:08,760 --> 00:10:11,280 Speaker 1: necessarily a good idea to do this yourself. I mean, 175 00:10:11,480 --> 00:10:13,920 Speaker 1: you could get caught surfing some site that you shouldn't 176 00:10:13,920 --> 00:10:18,880 Speaker 1: at work and get fired, So I wouldn't advocate doing that. Um. Also, 177 00:10:19,720 --> 00:10:23,000 Speaker 1: I know that some people have used, uh, the Google 178 00:10:23,120 --> 00:10:27,200 Speaker 1: language tools to get through things. Translating English to English 179 00:10:27,360 --> 00:10:30,480 Speaker 1: will let people through because it fools the fools the 180 00:10:30,520 --> 00:10:34,560 Speaker 1: website into thinking it's actually using Google for a useful purpose, 181 00:10:34,640 --> 00:10:38,080 Speaker 1: until of course they find out and block the English 182 00:10:38,120 --> 00:10:40,199 Speaker 1: to English translation as part of the u r L. 183 00:10:40,520 --> 00:10:43,240 Speaker 1: Because these services use your l's to block. I mean 184 00:10:43,240 --> 00:10:46,520 Speaker 1: they're they're putting those in specifically, so uh, you know, 185 00:10:46,679 --> 00:10:49,720 Speaker 1: that's why you can get through to Pandora for two 186 00:10:49,760 --> 00:10:52,120 Speaker 1: months and then somebody goes too much bandwidth and they 187 00:10:52,160 --> 00:10:55,760 Speaker 1: cut and they cut you off. You're talking like you 188 00:10:55,920 --> 00:10:59,040 Speaker 1: speak from experience here, Chris I mean, you're and I 189 00:10:59,120 --> 00:11:00,679 Speaker 1: just know that some people have done this, and I 190 00:11:00,760 --> 00:11:02,880 Speaker 1: also know that some people have in order to get 191 00:11:02,880 --> 00:11:07,160 Speaker 1: through instant messaging protocols. They find out they download a 192 00:11:07,240 --> 00:11:10,680 Speaker 1: multi protocol client like a Pigeon or trillion or something 193 00:11:10,720 --> 00:11:14,000 Speaker 1: like that digsby, and uh, they find out that their 194 00:11:14,040 --> 00:11:18,920 Speaker 1: their corporate UM I T people have blocked the servers 195 00:11:19,000 --> 00:11:21,400 Speaker 1: that go through there. Well, actually they're blocking the ports 196 00:11:21,720 --> 00:11:25,840 Speaker 1: in those cases probably, And if you do a search online, 197 00:11:25,880 --> 00:11:27,800 Speaker 1: you might find out that there are other ports that 198 00:11:28,120 --> 00:11:31,880 Speaker 1: use another server's chat. Servers that use the same protocols, 199 00:11:31,920 --> 00:11:34,600 Speaker 1: like for example, I c Q might use a number 200 00:11:34,640 --> 00:11:37,000 Speaker 1: of different servers and ports, and if you, you know, 201 00:11:37,040 --> 00:11:39,800 Speaker 1: play around with that, you might find out that, well, 202 00:11:40,000 --> 00:11:43,800 Speaker 1: some of them aren't blocked. Not that I would advocate 203 00:11:43,840 --> 00:11:46,760 Speaker 1: doing that losing your job, because that would be terrible. 204 00:11:46,920 --> 00:11:50,800 Speaker 1: That would I would not like that, and I would 205 00:11:50,800 --> 00:11:55,480 Speaker 1: have corporate parents. Wow. But that's uh, that see that 206 00:11:55,480 --> 00:11:57,439 Speaker 1: that was the kind of thing I was thinking about. 207 00:11:58,679 --> 00:12:00,800 Speaker 1: I do know people who were sty fold by that 208 00:12:00,920 --> 00:12:05,160 Speaker 1: lack of access to fun and games during work hours. Sure, 209 00:12:05,360 --> 00:12:08,400 Speaker 1: And I should also point out that proxy sites tend 210 00:12:08,440 --> 00:12:10,199 Speaker 1: to you know, they tend to come and go pretty 211 00:12:10,280 --> 00:12:13,080 Speaker 1: quickly because Uh, it turns out that a lot of 212 00:12:13,120 --> 00:12:16,720 Speaker 1: companies don't like people accessing proxy sites for the same 213 00:12:16,720 --> 00:12:19,120 Speaker 1: reason that they put the firewall up in the first place. Really, 214 00:12:19,559 --> 00:12:23,720 Speaker 1: so um, often they'll block access to those. But on 215 00:12:23,760 --> 00:12:27,400 Speaker 1: the flip side, for everyone that you lose access to, 216 00:12:27,840 --> 00:12:30,440 Speaker 1: it seems like two more pop up. Again. It's one 217 00:12:30,480 --> 00:12:32,440 Speaker 1: of those issues where you definitely have to do your 218 00:12:32,440 --> 00:12:34,600 Speaker 1: homework and make sure that whichever one you go to 219 00:12:34,840 --> 00:12:39,040 Speaker 1: is a reputable as far as that goes proxy site. UM. 220 00:12:39,120 --> 00:12:42,160 Speaker 1: And we should also point out that there are cases 221 00:12:42,240 --> 00:12:46,840 Speaker 1: where these sites have been very very important for people 222 00:12:47,040 --> 00:12:51,160 Speaker 1: who are let's say, overseas. Um. It turns out that 223 00:12:51,200 --> 00:12:54,439 Speaker 1: a lot of journalists in China have used proxy sites 224 00:12:54,440 --> 00:12:57,480 Speaker 1: in order to get information out of that country because 225 00:12:57,520 --> 00:13:00,319 Speaker 1: they're so restrictive. I mean, it's the great our Wall 226 00:13:00,360 --> 00:13:04,640 Speaker 1: of China is famous for restricting information in and out 227 00:13:04,679 --> 00:13:09,720 Speaker 1: of that country, and without things like proxy sites, Uh, 228 00:13:09,760 --> 00:13:12,160 Speaker 1: it would make it much more difficult for information to 229 00:13:12,320 --> 00:13:18,680 Speaker 1: pass across that firewall. So I mean, it's um, it's 230 00:13:18,800 --> 00:13:22,240 Speaker 1: it's a sticky issue. It's one that we actually debated 231 00:13:22,240 --> 00:13:24,720 Speaker 1: on whether or not we should even address this. But 232 00:13:24,840 --> 00:13:27,520 Speaker 1: then the information is out there and people want to 233 00:13:27,559 --> 00:13:31,600 Speaker 1: know about it. And really, I think our our listeners are, 234 00:13:31,640 --> 00:13:35,000 Speaker 1: on the whole, are very responsible and upstanding lot, wouldn't 235 00:13:35,040 --> 00:13:39,280 Speaker 1: you say, I'd say so, and they probably realized too that, uh, 236 00:13:39,360 --> 00:13:41,080 Speaker 1: you know, it's it's fun to talk about some of 237 00:13:41,080 --> 00:13:42,920 Speaker 1: these things, but when I talk when you talk about 238 00:13:43,200 --> 00:13:46,000 Speaker 1: losing your job or having your access restricted or you know, 239 00:13:46,040 --> 00:13:49,600 Speaker 1: getting into llegal trouble, that's another thing entirely. You don't 240 00:13:49,600 --> 00:13:52,760 Speaker 1: want to mess with that lightly, right, right, So, so, Tim, 241 00:13:52,800 --> 00:13:55,200 Speaker 1: We're sure you were just you know, curious, and we 242 00:13:55,240 --> 00:13:58,679 Speaker 1: hope that we've satisfied your curiosity with this discussion. Did 243 00:13:58,679 --> 00:14:03,880 Speaker 1: you have any I'm I'm dry, excellent, fantastic, So I'm 244 00:14:03,880 --> 00:14:06,720 Speaker 1: glad we were able to to to clear that up 245 00:14:06,720 --> 00:14:10,120 Speaker 1: for you. Tim. If any of you have any questions, 246 00:14:10,160 --> 00:14:12,600 Speaker 1: you can write us at podcasts at how stuff works 247 00:14:12,640 --> 00:14:15,480 Speaker 1: dot com. We love getting that email, so definitely right in. 248 00:14:16,040 --> 00:14:18,160 Speaker 1: And if you want to learn more about the Internet, 249 00:14:18,640 --> 00:14:22,280 Speaker 1: the web, how the web is different from the Internet, 250 00:14:22,400 --> 00:14:24,920 Speaker 1: all of these topics you can find right now at 251 00:14:24,960 --> 00:14:27,360 Speaker 1: how stuff works dot com. And we'll talk to you 252 00:14:27,400 --> 00:14:31,200 Speaker 1: again really soon for more on this and thousands of 253 00:14:31,200 --> 00:14:38,400 Speaker 1: other topics. Is it how stuff works? Dot com brought 254 00:14:38,400 --> 00:14:41,600 Speaker 1: to you by the reinvented two thousand twelve camera. It's ready, 255 00:14:41,760 --> 00:14:42,200 Speaker 1: are you