[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Using VPN less safe?
-----BEGIN PGP SIGNED MESSAGE-----
On 01/24/2016 03:22 PM, aka wrote:
> Oskar Wendel:
>> Today I thought about something...
>> Let's assume that attacker (government) seizes the hidden service
>> and wants to run it and deanonymize its users with traffic
>> Attacker could easily tap into major VPN providers traffic and
>> try to correlate their traffic with hidden service traffic. And
>> there are fewer VPN providers than Tor entry guards (and much
>> less than home connections around the globe).
>> Does it mean that routing Tor through a commercial VPN could
>> actually lower the security, compared to routing Tor directly
>> through a home connection? It's in contrast with what many say,
>> that you should use a commercial VPN for extra security.
> Why not Tor over Tor? Using a Tor exit to connect to the first
> hop. Would require traffic correlating twice.
" When using a transparent proxy, it is possible to start a Tor
session from the client as well as from the transparent proxy,
creating a "Tor over Tor" scenario. Doing so produces undefined and
potentially unsafe behavior. In theory, however, you can get six hops
instead of three, but it is not guaranteed that you'll get three
different hops - you could end up with the same hops, maybe in reverse
or mixed order. It is not clear if this is safe. It has never been
You can âchoose an entry/exit point, but you get the best security
that Tor can provide when you leave the route selection to Tor;
overriding the entry / exit nodes can mess up your anonymity in ways
we don't understand. Therefore Tor over Tor usage is highly discouraged.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
-----END PGP SIGNATURE-----
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to