[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Me <-> Tor <-> VPN <-> Internet?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Me <-> Tor <-> VPN <-> Internet?
- From: Load Bear <loadbearrun@xxxxxxxxx>
- Date: Wed, 06 Oct 2010 23:11:14 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 06 Oct 2010 23:11:30 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=vBlV+xsc2aTZCFEBQ/T0k4h6GCRgSLoU8Da1sLXEvnM=; b=O5M1epGU6TtG0NlXWNtZGYNTb92hXLiH5lz7Q5HIKju/mlXKld5DDk63I+zKITpPd5 mO0c4cmzbCGYsuYEGMhkeVJ3s+0emyQW4ECtYAg61bELzW5+0FuunLEK1IPOl2KTL2pt jO5W6nq0tvHG4kAnf5fsRJxdBuO4RQeBXuvxA=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=lpKMLlUVnmXAsBDrSaLm+haso8iklH/YqFA54HPdvD+zsLN71XBzFukpnx2LbXBQaG llr0Ub3Zc2189pBWBj/moPUtV7vb/ROyaWWfViXN5fwRTLQX6b597B6FR6EHHlmQsw/B bepvWXaq289oaT6ekYvzeZsCiB4YxNTPrANio=
- In-reply-to: <AANLkTinjE81N9YMjrxCF8FS-ETKGzTMmBk1v+4ky64Eo@xxxxxxxxxxxxxx>
- References: <4CAD3702.8060205@xxxxxxxxx> <AANLkTinjE81N9YMjrxCF8FS-ETKGzTMmBk1v+4ky64Eo@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.9) Gecko/20100915 Thunderbird/3.1.4
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 2010/10/06 11:02 PM, John Brooks wrote:
> On Wed, Oct 6, 2010 at 8:57 PM, Load Bear <loadbearrun@xxxxxxxxx> wrote:
>> I have also noticed that there exist some free VPN services which can be
>> used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
>> is there an easy way to, for lack of a better description, chain
>> proxies, so that the traffic between myself and the VPN is anonymized
>> through Tor, and my traffic between Tor and the internet is encrypted
>> through the VPN?
> Then the traffic between the VPN and the actual destination won't be
> encrypted, so the VPN sees everything you do. Same problem, different place.
> There is no way you can encrypt traffic sent to a destination that doesn't
> know how to decrypt it.
I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of some method to accomplish my expressed goal?
- --
LOAD"BEAR",8,1;RUN
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq
p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo
=AtlC
-----END PGP SIGNATURE-----
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/