[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: all traffic through a VPN on top of tor, done!
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: all traffic through a VPN on top of tor, done!
- From: Erilenz <erilenz@xxxxxxxxx>
- Date: Tue, 17 Nov 2009 07:37:51 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 17 Nov 2009 07:46:08 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:mime-version:content-type:content-disposition; bh=bwOoyzN3SYex+cuwslgPEOsNtB5R7VO2Cvgce4ca/0E=; b=XPZNWmnRbxw7hczzrTdGZAKi9xdMEQv6FhmQU3hR0Xg9IHk02br9sH7NWDRa4D0/vK R3DQWv6XevLSk0UBnq8HH3sS1LT8qz5FF3pExR/+ryLtIfY7o3/9rBuX5z+JAXNenioU 9woGi/psxEgMJKcGjuOSE5JwSWLAMUJw/b5zU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type :content-disposition; b=mDQVEpea7z7eHM0IfjK3nvi04iF/ejAp636erIDisiDf3rKakiEf1VDWC8pzdyJAeI y/dj1cDB+/J921Uo0mZ8M2GvRb9caiLYtToOCiU1DfB6Ji9c+/wbdpzFbzdPDFzd0hSk cYa3nFM7O1FVgm0uxcnkhDhn3rGVVvQ0mDSyo=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
* on the Fri, Nov 13, 2009 at 04:28:20PM +0000, John Case wrote:
>> Second, it sounds like you want to protect against a local attacker from
>> seeing your traffic. If so, go to proxy.org, find an https:// or
>> vpn-based provider and enjoy your encrypted protection against your
>> local ISP seeing your destination.
>> If you actually want anonymity, then use Tor as is, for it's designed to
>> provide anonymity online by default.
> Yes, but back to my thread hijack :)
> Let's say my protection model does indeed require Tor, but at the same
> time requires "more" speed.
> Forcing Tor to only use fast nodes probably doesn't work, since those
> fast nodes are probably inundated just like the slow ones are. This also
> suggests that organic growth in the Tor network is not going to solve
> much of the speed problem in the near term... existing users will
> certainly use more and more traffic.
If you're only concerned with hiding where you're connecting to from
your neighbour, you can modify the source code fairly easily to make two
hop circuits instead of three hop circuits (*). You could then limit the
ExitNodes to be fairly local (your own country), and then after a little
trial and error, manually pick a group of EntryNodes which are also in
your own country, and which perform well for you. High bandwidth
University nodes for example. One thing you absolutely don't want to do
is use a Hidden Service for your VPN as that doubles the number of hops
in the circuit.
(*) I can't remember how though. Google it.
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/