[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?

On 10/03/2018 04:36 AM, ithor wrote:
> Ok, so basically I have to stick with trust... kinda dangerous really in my geographical location.
> I know there's a lot of talk about the pro and contra of using some kind of VPN before entering the Tor network, how it can deanonymize you and how you basically still have to trust someone.
> But still, in order to defeat the possibility of a malicious entry-node or to avoid having my ip broadcasting i'm connecting to blacklisted obfs4 bridges, wouldn't a "trustworthy" VPN tackle that issue? I'm thinking of providers that employ a mix of obfuscating servers, like PSIPHON. It obfuscates a SSL layer with an http one and is conceived especially for activists living under censorship.
> So ok, one could state: maybe most of the ip's of those servers (even being over 6000 worldwide) are known to the gvt trolls and they're just letting you through in order to get information about you. That's right, but then one should add another security layer by connecting over public wifi and not home router and f.ex. spoofing MAC addresses at every connection.
> It would still be a protecting layer before connecting to the entry-node, even over a obfs4 bridge.

From devices that are identifiably mine, and not some ~anonymous VPS, I
only connect to Tor via nested VPN chains, typically three deep. Some
VPN providers, such as IVPN, even offer obfs4 tunneling. Others, such as
AirVPN, offer SSH and TLS.

It's not prudent to trust VPN services, any more (or less, really) than
it is to trust any particular Tor relay. Or any particular ISP, for that
matter. But with three VPN services in a nested chain, adversaries would
need data from at least two of them. And they'd need to work through the
chain, from one end or the other. Or do traffic analysis.

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to