►
From YouTube: Oplerno On TOR
Description
You can find the full interview with Jacob Appelbaum here:
Tor Project: what it is and how it works (Jacob Appelbaum)
https://www.youtube.com/watch?v=nM_PXQ7SUiI
Created this video the YouTube Video Editor and Google Plus
A
Good
morning
welcome
to
a
plearno
on
tour.
A
Some
of
the
security
aspects
which
which
we're
seeing
in
some
of
the
privacy
aspects
that
we're
seeing
especially
in
regards
to
facebook-
I
think
we
posted
this
one
a
video
a
couple
of
days
ago,
and
one
of
the
subjects
that
came
up
was
tor.
Now
we've
been
working
on
a
tour
or
with
tour
for
a
while
and
also
been
thinking
of
implementing
it
for
now,
so
we
wanted
to
give
a
have
us,
have
a
talk,
our
discussion
on
tour
and
wants
to
make
you
part
of
it.
A
So
you're
welcome
to
tweet.
We
have
what's
it,
you
can
have
if
you
tweet,
with
hashtag,
learn
tour
as
one
word
and
leave
comments
on
there
watching
in
the
youtube
video
below
or
I
think
it's
on
the
side
and
yep
take
part
enjoy
it,
and
I
will
try
and
help
you
understand
it
and
and
I'll
try
to
we'll
try
and
go
for
it.
So
first
I
have
a
which
have
a
video
that
I
want
to
show
you
it's.
A
B
Well,
the
tor
network
is
used
by
all
kinds
of
people
all
over
the
world,
so
it's
sometimes
used
by
people
that
wish
to
visit
censored
websites.
But
it's
also
used
by
in
some
cases
the
police.
So
it's
sort
of
hard
to
tell
who's
using
it
and
what
they're
using
it
for,
which
is
the
entire
idea,
but
effectively.
The
way
that
it
works
is
that
it
there's
equal
access
for
everyone
and
when
you
use
it
it's
hard
to
tell
what
people
are
doing
and
that's
the
design.
So
the
design
is
that
anonymity
loves
company.
B
So
it's
not
like
a
virtual
private
network
or
a
vpn
where
you
send
all
your
traffic
to
one
person
forever
and
you
hope
that
they
don't
give
it
up.
It's
rather
that
you
communicate
with
thousands
of
computers
all
over
the
internet,
and
you
try
to
compartmentalize
the
things
you
do
and
you
try
to
make
sure
that
anyone
that
might
know
that
you're
here
in
grotz
at
the
elevate
festival,
would
not
know,
for
example,
that
you
were
visiting
a
website
in
sweden
or
that
you
were
trying
to
get
around
censorship
that
exists
on
a
network
somewhere.
B
Well,
I
mean
everything
has
edges.
So,
of
course,
if
you
like
broke
into
the
house
of
a
developer
and
change
the
source
code
and
then
told
everyone,
there
was
a
new
update
that
they
should
download
like
any
software.
We
have
these
fundamental
problems
which
are
hard
to
solve.
We
try
to
solve
these
as
best
as
is
possible,
and
we
do
that
also
with
cryptography.
So
we
make
sure
that
people
download
software
that
we
have
released
and
we
give
them
steps
to
verify
that
we
have
actually
released
it.
B
We
can't
censor
things
on
the
tor
network
because
we
don't
look
at
those
things
and
we
can't
turn
things
over,
because
we
don't
collect
them
and
in
fact
we
try
to
make
sure
that
any
one
person
or
any
one
set
of
people
could
not
do
that,
and
that
is
in
fact,
by
design,
and
we
call
this
privacy
by
design,
whereas
the
other
design
a
centralized
system,
where
you
hope
that
someone
won't
put
you
into
trouble
or
harm's
way.
Well,
that's
what
we
would
call
privacy
by
policy
which
comes
down
to
trust.
B
B
C
So
why
daniel?
Why
do
you
think
we
should
implement
tor
in
terms
of
for
our
servers
and
for
our
communications?
This
isn't
that
going
to
create
a
huge
level
of
complication
in
terms
of
for
the
students
and
the
faculty.
A
Well,
what
what
we
want
to
do
is
not
serve.
It's
not
force
all
our
students
and
faculty
to
use
storm
and
they're,
of
course,
completely
free
to
to
use
the
regular
method,
and
so
we
will
always
have
a
normal
method
which
which
enables
them
to
visit
atlanta
and
enrol.no.com.
A
What
we
want
to
do
is
add
an
additional
method
so
that
any
any
person
who
doesn't
feel
secure
in
their
in
their
what
in
their
privacy
or
in
this
security,
is
able
to
visit
a
visit.
A
Visit
us
visit
us
and
watch
and
view
all
our
things
via
a
secure,
secure
connection,
so
that
so
that
nobody
can
sleep
into
it.
It's
also
for
people
we're
not
talking
about
people
who
were
the
proverbial
tin,
foil,
hats,
we're
talking
about
regular
people
such
as
you
or
I,
who
don't
really
feel
like
watching
our
government's
knowing
what
we're
doing
and
which-
and
I
want
to
keep
our
information,
our
information,
reasonably
private.
C
You
know,
greatly
facilitate
the
ability
of
people
to
be
private
on
the
net
and
that
that's
one
of
the
things
that
we're
working
towards
on
the
faq
on
our
website
in
terms
of
providing
secure
communications
for
people
who
may
be
in
places
where
what
they
study,
what
they
study
and
what
they
teach
can
potentially
get
them
into
trouble
so
yeah.
No.
This
is
a.
This
is
a
pretty
good
thing.
A
Yeah
there
are
there
are.
There
are
two
ways
to
question
this
tour.
Oh
rob,
would
you
mind
muting
the
there
are
two
ways
to
use
toy
the
you've
got
the
got
a
the
regular
way.
I'm
gonna
just
share
a
show.
My
screen
here
you've
got
a
in
which
you
in
which
you
use
tor
from
your
own
computer
and
you
connect
via
tor
to
from
your
own
from
your
own
computer,
and
you
connect
via
tor
via
the
network,
to
an
exit
relay
and
go
towards
the
destination.
A
A
The
connection
is
then
open
unless
you're
using
http
or
something
or
something
like
that,
but
it
basically
is
open,
and
this
is
one
of
the
places
where
organizations
such
as
the
nsa
nsa
gets
in
the
news
because
they
capture
or
put
in
fake
exit
notes,
so
they
read
everything
that
is
or
they
they
potentially
read
everything
that
that
leaves
the
network.
A
So
what
we
want
to
do
is
let
me
remove
that
we
don't
want
to
actually
have
for
a
planner.
We
don't
want
people
to
go
through
an
exit
node.
We
don't
want
people
to
leave
the
the
tor
network.
So
what?
What?
What?
A
What
I
propose
to
do
is
we
have
our
plano
server
outside
outside
the
network
and
we
have
a
connection
inside
the
network
whereby
this
connection,
this
connection
here,
this
connection
here
is
encrypted,
but
for
any
of
our
users
who
are
coming
in
from
from
the
from
this
side,
they
connect
into
the
tor
network,
which
is
encrypted
connection.
They
connect
towards
it
to
a
node,
they
connect
to
another
node,
and
then
they
connect
from
that
node
to
our
node,
which
is
situated
in
the
tor
network.
So
this
is
called
a
hidden
service.
A
It's
similar
something
similar
to
other
organizations
have
such
as
the
wall
street
journal,
and
I
believe
there
was
at
the
new
york
times.
They
have
a
hidden
node
inside
tour
for
for
people
who
want
to
leak
information
about
about
all
kinds
of
things,
whether
it's
government,
overreach
or
or
our
organization
of
organizations
or
organizational
overreach,
such
as
with
which
happens
to
with
a
lot
with
a
lot
of
big
multinational
companies.
So
we
want
to.
C
Do
you
understand
trump
yeah?
I
know
I
get
it,
I
get
it
perfectly.
I've
used
I've
used
tor
before
and
it's
a
you
know
really
easy
to
set
up.
Of
course,
it's
also
very
easy
to
make
mistakes,
which
then
open
up
your
yourself
to
to
issues.
C
So
just
a
question
daniel
when
we're
saying
that
we're
going
to
set
up
a
node.
Does
that
mean
that
all
of
our
information
is
running
in
that
node
on
the
tor
network?
Or
it's
just
if
people
want
to
go
through
and
do
the
do
the
encrypted
piece.
A
A
The
host
name
is,
is
unknown,
but
which
is
say
it's
this
dot,
this
dot
door,
for
example,
okay
and
then,
if
people
were
to
connect
with
our
tor
client,
which
is
basically
a
firefox
browser
to
this
hostname
or
it'll,
be
it'll,
be
a
variation
on
this,
but
perhaps
a
player
will
have
a
pilaro
in
there
or
something
or
something
like
that.
Then
though,
then
they
can
connect
to
our
network
and
to
enroll.planner
by
the
same
method.
C
That
doesn't
mean
that
the
data
on
our
so
all
it
means
is
that
the
communications
are
secure.
It
does
not
mean
that
the
data
on
our
server
I
mean
our
the
data
on
our
server-
is
secure,
as
we
can
make
it
okay
through
your
hard
work,
but
if-
and
oh
I
see
okay,
so
if
they're
pulling
up
their
own
data
they're
now,
are
they
going
to
be
able
to
do
canvas
through
tour
or
not?
Oh
well.
This
is
until
we
host
it
until
we
host
canvas.
A
The
the
in
principle
they,
if
I
just
I'm,
going
to
just
reverse
all
this
I'll,
save
this
feature
all
this
way,
if
we're
using
canvas
which
is
canvas,
is
our
destination.
A
What
would
what
we're
doing
is?
This
is
the
same
as
with
any
regular
torah
connection,
so
we're
going
from
from
a
vial
from
our
client
to
to
the
entry
guard
to
the
middle,
to
an
exit
relay
and
then,
via
from
the
exit
relay
we're
connecting
to
canvas.
Now.
Canvas
does
have
https
connection
here,
so
they
so
it
is
a
reasonably
secure
connection
so
which
I
can't
confirm.
I
haven't
checked
that,
but
last
night
or
last
I
checked
they.
A
They
were
also
using
they
weren't
using
for
secrecy,
but
that's
quite
possibly
that
that
changed
due
to
the
open,
ssl
bugs
that
were
recently
that
were
revealed
there
some
time
ago.
A
A
Then
they
should
be
safe
up
to
a
certain
point
and
of
course
I
can't
have
we
can
never
guarantee
this.
The.
C
C
Yeah
we
can
never
guarantee
the
security
of
somebody
else's
network.
We
can
only
do
that.
Okay.
So
what's
your
idea,
how
do
you
want
to
proceed.
A
Well,
in
the
watch
in
the
coming
weeks,
in
the
run
up
to
woodblock,
I
my
plan
is
to
is
to
put
up
this
put
up
a
server
or
to
put
up
a
server
here.
I've
already
arranged
it
with
our
hosting
party
that
we
that
we're
able
to
get.
We
need
an
additional
ip
number
for
the
connection
so
that
we
so
that
people
are
connecting
to
a
unique
ip
number
here,
and
so
I've
already
arranged
that
with
our
hosting
party.
A
So
we
should
be
able
to
go
or
create
the
hidden
service
in
the
not
so
distant
future
of,
say,
say
within
the
within
july
and
so
by
by
by.
I
hope,
to
be
able
to
announce
at
the
beginning
of
august
that
we
have
a
tour
node
with
the
corrector
address.
C
That's
that's
excellent,
a
question
one
is
as
we
get
larger,
okay,
we're
building
this
once
okay.
Will
this
be
able
to
expand
with
our
you
know,
with
our
services
and
our
support.
A
Well,
us
all,
certainly
the
one
of
the
one
of
the
advantages
of
our
our
back
plane
is
going
to
is.
A
Our
back
plane
is
going
to
con
currently
consists
of
a
number
of
of
computers,
and
this
this
can
be
expanded
quite
enough
to
a
quite
large
level,
because
of
the
way
that
we
built
the
system.
The
tour,
if
the
tour
hidden
service
is
nothing
more
than
a
than
a
proxy
towards
our
say.
A
If
we,
you
could
say
basically
we're
guaranteeing
an
exit
relay
to
what's
it
to
this,
to
our
own
services,
to
its
scales,
so
scales,
of
course,
of
course,
depending
on
the
amount
of
traffic
that
we
that
we
push
through
it.
If
we
start,
if
we
host
our
own
canvas
with
the
amount
of
videos,
we'll
of
course
need
to
put
far
more
servers
there,
but
until
well,
while
we're
still
hosting
with
canvas,
we
don't
have
an
issue
with
the
amount
of
videos.
That's
where
that
we're
streaming.
C
Okay,
you
know
me,
I
always
like
to
you
know:
I've
we've
worked
from
the
beginning
to
make
this
a
very
large
organization,
and
so
you
know
wanting
to
make
sure
we
don't
have
to
go
back
and
massively
you
know
change
our
infrastructure.
C
How
are
you
going
to
verify
that?
I
know
you
know
how
to
set
it
up
and
remember
I'm
a
complete
noob
when
it
comes
to
most
things
with
computer
security,
you're
going
to
sort
of
open
this
up
and
ask
people
to
test
it
out.
I
noticed
twitter
twitter
discussion
with.
I
can't
remember.
C
Talking
about
different,
you
know
backbones
and
attacks,
so
people
will
be
able
to
check
it
out
and
help
us
out
if
they
would
like.
A
Well,
one
of
the
advantages
of
doing
it
of
one
of
the
advantages
of
our
organization
is
that
we're
small
and
we're
we
were
very
we're
very
open
for
people
to
to
try
out
our
services
and
try
out
our
systems,
and
I
hope
I
know
that
tor
is
what
is
used
by
quite
a
large
number
of
organizations,
and
I,
I
think
that's
a
using
tour
of
or
by
using
tor
underwood
and
by
by
showing
it's
showing
it
to
a
lot
of
showing
it
to
a
lot
of
people
and
now
so
that
we
need
to
tour
as
as
one
of
the
few
education
institutes
who
actually
believe
that
we
should
protect
the
user's
privacy.
A
I
mean
I,
I
can't
I've
helped
caveats
of
that.
They're
sure
I'm
sure
there's
others
who
love
if
they
use
their
their
students,
privacy
and
the
faculty's
privacy
only
was
we're
very,
very
forward
in
that,
and
I
don't
I
don't
think
anybody
else
is.
Is
that
forwarded
as
we
are?
They
don't.
A
C
Don't
have
and
we're
all
really
into
into
that
issue
of
privacy
and
opting
in
rather
than
having
to
opt
out
generally
and
well.
I
shouldn't
say:
generally
that's
the
deal.
We
really
want
to
protect
people's
privacy,
so
I
guess
the
next.
The
next
question
I
have
with
this
is
one
cost.
C
A
Whether
the
way
we
currently
have
our
infrastructure,
so
with
the
https
servers,
all
our
say,
our
infrastructure,
you
can
actually
talk
to
our
servers.
There
is
a
minimal
cost.
Can
you
meet
again.
A
So
but
there's
a
there's
a
minimal
cost
towards
it
to
this,
of
course,
nothing
is
free
here,
there's
necessity
as
a
free
lunch.
So
so
there's
going
to
be
a
small
cost,
but
to
add
a
tour
of
the
tour,
but
I,
but
that's
is
uses
the
same
infrastructure
as
we
currently
currently
use
and
should
have.
Was
it
very
little
overhead
in
terms
of
cost?
I
mean
a
little
in
comparison
to
what
we're
already
spending,
of
course.
So
perhaps
I
don't
know
10
cents
on
the
dollar.
C
Security
of
the
students
and
the
faculty,
okay,
so
we're
starting
to
expand
more
and
more
globally.
We've
got
you
know
we're
now
starting
to
get.
You
know
some
depending
upon
where
you
live,
some
of
the
stuff
that
we're
teaching
politically.
This
will
help
the
security
of
the
faculty
and
the
students.
C
C
A
Of
course,
the
way
we've
built
this
it
built
our
system
for
faculty
and
for
students
there
are
no
required
fields,
we
give
them.
We
in
fact
we
give
them
an
email
address.
That
was,
for
we
give
faculty
an
email
address,
so
they
don't
have
so
in
principle.
They
wouldn't
have
to
give
us
our
email
address,
except
for
when
we're
communicating
with
them,
so
they
could
use
throwaway
email
addresses
these
type
of
things.
A
As
far
as
the
request,
the
things
that
we
require
of
our
members
to
fill
in,
we
don't
require
any
fields.
We
don't
require
names,
we
don't
require
anything
in
on
our
on
our
computer.
On
the
computer
side,
of
course,
we
have
a
requirement
that
people
fill
in
students
and
faculty
fill
in
a
contract
cash
for
contract,
but
this
is
this
is
of
course,
for
us.
A
We
keep
this
one
very
safe
and
is
mostly
meant
to
verify
and
to
ensure
that
any
credits
that
people
earn
with
us
can
be
transferred
to
them
as
a
person
and
can
be
if
they
can
verify
that
they
have
these
credits.
C
And
we
leave
it
on
the
we
leave
it
on
the
hello
sign
server.
We
don't
touch
it
so
we're
not
taking
that
data
in
for
us,
which
is
good.
Okay,.
A
But,
of
course,
this
is
what
this
is
a
this
is
security
by
that
part
with
the
contract
is
secure,
what
they
call
security
by
contract.
It's
not
security.
By
design,
we
in
principle
we
could
examine
this
data,
although
for
we
choose
not
to
and
what's
it
and
then
this
is.
A
This
is
a
matter
of
trust
between
us
and
our
and
our
on
our
students
and
at
a
later
stage,
we'll
of
course
be
able
to,
or
will
we're
at
a
later
stage
of
I'm
going
to
look
into
making
sure
that
we
can
actually
do
do
this
securely
by
design
so
that
it
is
for
us,
with
the
exception
of
with
certain
exceptions,
almost
impossible
to
recover
this
data.
But
that
would.
C
Yeah,
the
I
mean
the
the
issue:
that's
going
to
crop
up
a
little
later
on
is
verifying
the
students
are
actually
taking
the
classes,
they
say
they're
taking
and
then
somebody
else
isn't.
I
assume
that
there's
different
ways.
We
can
do
that
with
ip
address,
verification,
potentially
or
you
know
unique
keystrokes
who
knows,
but
you
know
and
and
we'll
have
huge
discussions.
C
Maybe
it's
appropriate
you'll
have
to
lead
it,
whether
they're
open
discussions
on
the
verification
of
identity
while
maintaining
as
much
anonymity
as
possible.
I
mean
again,
while
in
the
states
what
you
t,
what
you
teach
you
know
and
while
we
in
the
states
more
or
less
protect
academic
freedom,
okay
and
the
students
rights
to
privacy
under
the
different
federal
guidelines,
I
get
more
concerned
about.
C
You
know
people
in
certain
countries
in
latin
america,
africa,
asia,
where
what
you
study
can
get
you
in
a
jam,
and
I
really
want
to
figure
out
if
we
can
create
a
space
where
people
can
access
them.
C
A
Yeah,
but
especially
with
our
system
as
if,
because
our
was
our
initial
starting
point-
is
to
ensure
as
much
privacy
as
possible
for
all
of
our
students
that
are
and
for
our
faculty
as
well.
A
It
makes
that
we're
starting
from
the
from
the
right
position
if
we
were
starting
from
a
blank
from
a
blank
slate
of
having
absolutely
everything
out
there
and
everything
available
for
everybody.
We'd
be
we'd,
be
in
far
more
dire
straight,
and
it
would
be
far
more
difficult
to
attack
on
a
lot
of
the
security
elements
that
were
that
we
currently
have
to
to
an
open
system
rather
than
to
a
to
a
private
system.
C
Great,
I
think
that's
about
it.
You
know,
please
everybody
in
the
audience
who's,
taking
a
look
at
this.
Hopefully
this
will
get.
You
know
we
want
our
community
to
be
involved
in
these
issues
and
so
send
us
questions.
You
know
something
to
daniel.
You
can
send
it
to
me
and
I'll
post
them
to
daniel,
but
you
know
this
is
something
the
whole
community's
got
to
understand
and
be
comfortable
dealing
with.
As
we
move
forward
to
create
this
institution.
C
You
know
I'll
have
to
talk
with
you
a
little
bit
later
on,
or
maybe
there's
some
guide,
because
you
know
how
you
set
up
your
core
browser
on
your
computer
is
extremely
important
to
ensure
your
own
own
security.
You
can't
just
install
it
and
you
know,
think
you're
safe
you've
got
to
do
some
other
stuff.
A
No
all
that
I
wanted
to
add
was
thank
you
for
watching
and,
and
thank
you
for
ever.
Thank
you
rob
for
for
wanting
to
hold
this
discussion
open.
I
think
it's
very
important
to
get
information
out
there
for
our
students
and
for
our
faculty
and
for
everybody
else,
who's
what's
online
and
that
they
can
do
more
to
protect
their
own
privacy.
C
Yeah
and
please
anyone
out
there
if
you
sign
up
for
woodblock
on
the
aperno.com
website,
which
is
where
we're
gathering
faculty
and
students
and
interested
community
members
in
creating
degree
and
certificate
programs,
there's
obviously
going
to
need
to
be
some
discussions
on
the
issue
of
identity,
identity,
verification
and
securing
student
data.
C
And
you
know
we
really
want
to
be
kind
of
the
leaders
in
in
creating
an
open
and
secure
system
like
it
should
have
been,
and
you
know
like
it
should
have
been
for
all
of
us
living
and
working
on
the
net
so
check
out
woodblock
at
a
plano,
not
woodblock
at
apparently.com.
C
But
the
wood
block
seminar
on.
C
All
apple.com
thanks
daniel
we've
got
a
couple
things.
We've
got
to
do
and
closed
in
thanks
for
watching.