[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Using VPN less safe?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Flipchan <flipchan@xxxxxxxxxx>:
> Well i never liked vpn , like for example in the US the police can force
> the vpn provider to give out info without the vpn provider telling the
> client/customer about it, so u need to put alot of trust in these vpn
> providers,
That's why I would never purchase a US-based VPN...
> i am acctually developing a better solution but its only in beta and i
> havent got it to work 100%
Could you share some more info on that? Will it work in real time? How
will you address correlation attacks?
> is this person who is hosting my vpn ready to go to jail for me?
Definitely not, that's why I was thinking of a VPN in a jurisdiction that
allows keeping no logs.
But even if a VPN provider keeps no logs (and even if I trust them, and as
HideMyAss case shows, it can be dangerous), I think that if government in
any country wanted to tap into traffic in a datacentre where this VPN
provider hosts some of its servers, it wouldn't be too hard for them to do
so.
> u need a non US provider and some u trust
I trust Tor way more than I trust a VPN provider...
- --
Oskar Wendel, o.wendel@xxxxxxxxxxxxxxxxx
Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C
Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJWpUmZAAoJEGaQzFIxjbhMtgYH/2rIdHcu1MBnv+whPTndiiEM
7Ulpm0oArJZ6FuR3lEykH/cD2TXPepUx5IakO8SrMtAH0nWw5Mrap3UBzfLc+iAz
8xYLl52uv4hZDuIvWcv4FFqNlwhvJTQ0XJwyVKhIWDjmmsEHQe3ddFPFeExss3w2
+EF8VEbAGnh1s4a46njPU7M4b0YvGnhp6TsUigYX3EdP426cNsMyWAKLzlL5Ts7e
6ciRzTdUtlwRzAvkOShDQMxota6BAbtTHxBRlIcBXvbA3GRW025apn5PEoP39BdH
EBxwAYkS02HVNAlkK+DyKd9xtXrt6TiXWWo4rA5knwhUP3gChmHpWlI/qedcW/s=
=7q2d
-----END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk