1
00:00:01,120 --> 00:00:01,530
okay.

2
00:00:01,530 --> 00:00:06,090
in this video, we're going to be discussing an overview to tour bridges and entry guards.

3
00:00:06,090 --> 00:00:10,700
these are very important to know as they assist you in tor circumvention of censorship.

4
00:00:10,760 --> 00:00:16,000
so let's discuss the process of connecting to tor and why a bridge might be needed.

5
00:00:16,180 --> 00:00:17,770
so we've talked about this before.

6
00:00:17,770 --> 00:00:24,360
we've shown you this chart where you connect your isp, which then connects to tor and tor to the rest of the internet.

7
00:00:24,620 --> 00:00:29,120
so that creation of the circuit is really where tor comes into play.

8
00:00:29,460 --> 00:00:34,960
and along the way, there's three hops, three nodes that you go through and then your data is sent.

9
00:00:35,340 --> 00:00:40,430
the main issue though is that node one, that 1st node can be at risk of censorship.

10
00:00:40,430 --> 00:00:44,400
you might not even be able to get into the tor network because it might be blocked.

11
00:00:46,060 --> 00:00:51,670
so how do you go about connecting to tor when that entry node or the nodes on tor are blocked?

12
00:00:51,670 --> 00:00:56,890
because these are on a list publicly and people can just scan for them and know that they're tor.

13
00:00:56,890 --> 00:00:58,110
so how do you prevent this?

14
00:00:58,110 --> 00:00:59,050
well, you have two things.

15
00:00:59,050 --> 00:00:59,850
you have an entry guard.

16
00:00:59,850 --> 00:01:02,400
this is that 1st relay in the circuit we're referencing.

17
00:01:02,500 --> 00:01:06,360
so this is not necessarily anything different than what you're using.

18
00:01:06,580 --> 00:01:09,360
most of your entry points are going to be an entry guard.

19
00:01:09,700 --> 00:01:16,000
but an entry guard specifically being that 1st relay is meant to protect against traffic correlation attacks.

20
00:01:16,780 --> 00:01:22,560
it's usually when you connect on tour, you're going to use the same entry node or the entry guard for months.

21
00:01:23,300 --> 00:01:28,960
and doing so reduces your exposure to potentially compromised guards that exist out there.

22
00:01:29,100 --> 00:01:36,800
so whenever you want to connect to a circuit, notice if you go to different websites that your 1st hop is usually the same.

23
00:01:36,860 --> 00:01:38,240
that is your entry guard.

24
00:01:38,300 --> 00:01:42,880
if you do select the new identity, it will select a new entry guard and change that.

25
00:01:43,100 --> 00:01:44,880
a bridge is slightly different.

26
00:01:45,060 --> 00:01:49,670
it is an entry relay as well, but this is a relay that's not on the public node list.

27
00:01:49,670 --> 00:01:59,960
it also uses pluggable transports, which we just talked about in the last video, uses that on top of them to help better circumvent and hide the activity that you may be doing.

28
00:02:00,380 --> 00:02:09,160
and it's really helpful for those who are subject to censorship and need to connect to tor but can't because it's blocked or monitored or otherwise stopped.

29
00:02:09,300 --> 00:02:17,480
so that is the point of bridges while entry guards are more of just protection generally in the tor network with your 1st node.

30
00:02:17,620 --> 00:02:18,590
so that's really it.

31
00:02:18,590 --> 00:02:22,870
that's the difference between entry guard and bridges and a high level understanding of what a bridge is.

32
00:02:22,870 --> 00:02:24,880
if you have any questions, of course, let me know.

33
00:02:24,900 --> 00:02:34,920
otherwise, we're going to continue on and talk about the ultimate privacy checklist with tor so you can get the best understanding of how to be the most secure, private and anonymous that you can be.

34
00:02:35,420 --> 00:02:36,090
thank you.

35
00:02:36,090 --> 00:02:37,160
see you in the next one.