[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] NSA supercomputer



One thing i forgot.. The last vpn/ssh tunnel need to be totally secure.
Basically, you need your personnal anon server to do that. If you can't
handle your own service, you'll better stay with tor as the last system in
the pile.


2013/4/4 Alexandre Guillioud <guillioud.alexandre@xxxxxxxxx>

> I'm in a hurry so, i describe a little scenario :
>
> + Launch a vpn/ssh tunnel service, and secure bind privoxy/proxifier into
> it. (this one is for scrambling, linearising data)
> + Launch a system like Privoxy and/or Proxifier
> ++ Bind several linked proxy (your data will pass thru each of them)
> + Launch Tor sock service to connect threw it (force connect threw it with
> Secure Binding in Privoxy or Proxifier, did'nt remember)
> + A other vpn/ssh tunnel with cipher/crypt techno than the first one ?
>
> With that, you'll have some second of latency. But you'll be hidded, even
> if tor is break. Timing attack become quasi impossible, beacause of
> scrambling/linearisation of the vpn/ssh tunnel.
>
> Enjoy ? :D
>
> 2013/4/4 Ivan Sipka <frkator@xxxxxxxxx>
>
>> On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud <
>> guillioud.alexandre@xxxxxxxxx> wrote:
>>
>> > So, if you're paranoïd, or doing something where paranoïd behavior is
>> > requested, use a vpn inside and outside tor.
>> > Use linked proxy's on top of this. You'll be fine.
>> >
>>
>> could you elaborate on this a bit more please?
>> _______________________________________________
>> tor-talk mailing list
>> tor-talk@xxxxxxxxxxxxxxxxxxxx
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
>
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk