[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
- From: 7v5w7go9ub0o <7v5w7go9ub0o@xxxxxxxxx>
- Date: Wed, 25 Jun 2008 09:16:12 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 25 Jun 2008 09:16:23 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=RGpr0Qx/SICBm2sadlczdslB1/x+gl/GXnXI8OnlMq0=; b=A9PtZuvJPKGR8bbQ6qslJxEH6Rx8IQK45oX0iAXHcb9WRKR2nWYeRQQCWRso5FcEic s2h6RLiJJwEDuzZBsibbgf5cF6WAaB4z3Zunvb5rFCjV6bxc5uiJGG9kExmjiFPcl5P8 d24WO1lPUHIHNduP5RraA5TivWimRtMghkSyM=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; b=rz/rZz3iIpR5NsoCsyljZSCMNo0aG0gY0hJnXxe0Tu5CohUIfu07leKWubitjP3oYR pi/WjqmsWfLWWsTGHB34RjUu1sFKU+scyCN8zkGCyedv56Toni/ujvuDjRgf0uc7j/Ef Gr7dPzdoHMtGa3bytGqwuIimB+6WGNAGz44Z4=
- In-reply-to: <200806251315.04758.bf@xxxxxxxxxxxxxxxx>
- References: <200806221054.53587.bf@xxxxxxxxxxxxxxxx> <48616892.9020101@xxxxxxxxx> <200806251315.04758.bf@xxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 126.96.36.199 (X11/20080421)
Bernhard Fischer wrote:
On Tuesday 24 June 2008, 7v5w7go9ub0o wrote:
My hope is to use OnionCat on my laptop to VNC via TOR to my home
computer using nomachine NX. Is that kind of use possible with OC?
Yes, this should work. But why would you like to do this? TOR's hidden
services are not very fast even though no exit nodes are required.
And if you connect to your own computer, anonymity is not an issue.
If you only want to have encryption I suggest to use ssh oder openvpn.
Thank you for your quick reply!
This would be used only from open, WIFI hotspots while I'm on the road.
I'm typically gone for two to three weeks, and the computer would be
1. Connecting via TOR would be an extra, minor security option to
conceal the fact that my home is running a VNC server - eavesdropping
kids at the hotspot may try to make it a hacking "prize".
2. Out of general principle, I see no reason to record my home IPA in
the various hotspot logs. I wish to come and go quietly without "signing
Using the "phone home" example above, is there any way that my home
computer could go out to the general WAN and access non-TOR, non-OC
resources? IIUC, the TUN device means that my computers can only connect
with each other!? i.e. can I also somehow connect out on eth0 while
maintaining an OC/TUN connection?