[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor transparent proxying over OpenVPN
Does a VPN help with fingerprinting?
I know that Tor has had some success in reducing the variables that are
used for fingerprinting but we have not found a perfect solution yet.
If we go into a VPN and then in to Tor would that help to minimize some
additional variables used for fingerprinting? I assume this is not a
perfect solution but it will it help?
On Sun, Jun 16, 2013 at 10:44 PM, mirimir <mirimir@xxxxxxxxxx> wrote:
> On 06/16/2013 07:53 AM, Lunar wrote:
> > ef2k@xxxxxxxxxxx:
> >> Is it possible to do Tor transparent proxying over OpenVPN i.e. My
> >> connection -> OpenVPN -> Tor ?
> >> The purpose of this would be to stop the ISP from seeing that Tor is
> >> used.
> > If that's your goal, I strongly suggest using obfsucated bridges
> > instead:
> > https://www.torproject.org/docs/bridges.html.en#PluggableTransports
> How fast must new obfuscated bridges be created to replace old ones that
> have been discovered? What's the mean lifetime of an obfuscated bridge?
> If obfuscated bridges don't last very long, it's very likely that ef2k's
> ISP will quickly determine that he's using Tor, even if it can't
> consistently block Tor use.
> If ef2k were using a VPN service, on the other hand, his ISP would need
> to gain cooperation of his VPN provider, or snoop its exit traffic. And
> he could choose VPN providers prudently to make either harder for his
> ISP to accomplish. Or he could nest multiple VPNs.
> He could also use both VPNs and obfuscated bridges, if hiding Tor use
> really matters.
> tor-talk mailing list
tor-talk mailing list