[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] NSA supercomputer
I'm in a hurry so, i describe a little scenario :
+ Launch a vpn/ssh tunnel service, and secure bind privoxy/proxifier into
it. (this one is for scrambling, linearising data)
+ Launch a system like Privoxy and/or Proxifier
++ Bind several linked proxy (your data will pass thru each of them)
+ Launch Tor sock service to connect threw it (force connect threw it with
Secure Binding in Privoxy or Proxifier, did'nt remember)
+ A other vpn/ssh tunnel with cipher/crypt techno than the first one ?
With that, you'll have some second of latency. But you'll be hidded, even
if tor is break. Timing attack become quasi impossible, beacause of
scrambling/linearisation of the vpn/ssh tunnel.
Enjoy ? :D
2013/4/4 Ivan Sipka <frkator@xxxxxxxxx>
> On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud <
> guillioud.alexandre@xxxxxxxxx> wrote:
>
> > So, if you're paranoïd, or doing something where paranoïd behavior is
> > requested, use a vpn inside and outside tor.
> > Use linked proxy's on top of this. You'll be fine.
> >
>
> could you elaborate on this a bit more please?
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk