[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor transparent proxying over OpenVPN



ef2k@xxxxxxxxxxx:
>> ef2k@xxxxxxxxxxx:
>>> I am worried about this. It's why I don't want to rely on obfuscated
>>> bridges to hide my Tor usage, as they're not private and one day I could
>>> get flagged as using Tor if the ISP/military/police is monitoring
>>> connections to the bridge that I'm using at the time.
>>> VPN seems to be the best solution. Services like Airvpn offer additional
>>> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that
>>> I'm
>>> using a VPN, unless they are monitoring connections to Airvpn servers,
>>> but
>>> even then they could only see that I'm using a VPN - *not* a big deal
>>> compared to Tor.
>>
>> Not sure about this, see:
>> https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting
>> _______________________________________________
>> tor-talk mailing list
>> tor-talk@xxxxxxxxxxxxxxxxxxxx
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
> 
> Has this been seen used by any ISPs or governments ?

Not to my knowledge.

> It seems to me that it would be too difficult and use far too much
> resources (computer and human time) to run such fingerprinting on the
> millions of internet users, assuming they aren't previously flagged for
> using Tor or suspected as being behind political comments or websites,
> etc.

I think this assumption is too strong. See trac ticket "GFW actively
probes obfs2 bridges":
https://trac.torproject.org/projects/tor/ticket/8591
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk