[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor transparent proxying over OpenVPN



On 06/17/2013 12:26 AM, adrelanos wrote:

> ef2k@xxxxxxxxxxx:
>> I am worried about this. It's why I don't want to rely on obfuscated
>> bridges to hide my Tor usage, as they're not private and one day I could
>> get flagged as using Tor if the ISP/military/police is monitoring
>> connections to the bridge that I'm using at the time.
>> VPN seems to be the best solution. Services like Airvpn offer additional
>> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that I'm
>> using a VPN, unless they are monitoring connections to Airvpn servers, but
>> even then they could only see that I'm using a VPN - *not* a big deal
>> compared to Tor.
> 
> Not sure about this, see:
> https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting

SSH and VPNs are vulnerable to fingerprinting because latency is low,
and they don't pad traffic. But ef2k would be going through Tor after
the VPN, so fingerprinting seems less effective. Also, as I just
mentioned, ef2k could add cover traffic.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk