[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor transparent proxying over OpenVPN



> ef2k@xxxxxxxxxxx:
>> I am worried about this. It's why I don't want to rely on obfuscated
>> bridges to hide my Tor usage, as they're not private and one day I could
>> get flagged as using Tor if the ISP/military/police is monitoring
>> connections to the bridge that I'm using at the time.
>> VPN seems to be the best solution. Services like Airvpn offer additional
>> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that
>> I'm
>> using a VPN, unless they are monitoring connections to Airvpn servers,
>> but
>> even then they could only see that I'm using a VPN - *not* a big deal
>> compared to Tor.
>
> Not sure about this, see:
> https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>

Has this been seen used by any ISPs or governments ?
It seems to me that it would be too difficult and use far too much
resources (computer and human time) to run such fingerprinting on the
millions of internet users, assuming they aren't previously flagged for
using Tor or suspected as being behind political comments or websites,
etc.


_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk