[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Me <-> Tor <-> VPN <-> Internet?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2010/10/06 11:02 PM, John Brooks wrote:
> On Wed, Oct 6, 2010 at 8:57 PM, Load Bear <loadbearrun@xxxxxxxxx> wrote:

>> I have also noticed that there exist some free VPN services which can be
>> used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
>> is there an easy way to, for lack of a better description, chain
>> proxies, so that the traffic between myself and the VPN is anonymized
>> through Tor, and my traffic between Tor and the internet is encrypted
>> through the VPN?

> Then the traffic between the VPN and the actual destination won't be
> encrypted, so the VPN sees everything you do. Same problem, different place.
> There is no way you can encrypt traffic sent to a destination that doesn't
> know how to decrypt it.

I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of some method to accomplish my expressed goal?


- -- 
LOAD"BEAR",8,1;RUN
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq
p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo
=AtlC
-----END PGP SIGNATURE-----
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/