[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: all traffic through a VPN on top of tor, done!
Il giorno ven, 13/11/2009 alle 16.28 +0000, John Case ha scritto:
> On Fri, 13 Nov 2009, Andrew Lewman wrote:
>
> > Second, it sounds like you want to protect against a local attacker from
> > seeing your traffic. If so, go to proxy.org, find an https:// or
> > vpn-based provider and enjoy your encrypted protection against your
> > local ISP seeing your destination.
You have a point, that is something I could do probably, but so far all
ssl proxy I have seen, are actually websites with a form. I need to use
the proxy from the command line and pipe a ssh connection through it.
> > If you actually want anonymity, then use Tor as is, for it's designed to
> > provide anonymity online by default.
That is why am glad my script has tor support now. Anonymity is there.
It's just really slow. :-)
I added tortunnel support as well, which is probably slower than those
websites but serves the purpose.
I am pretty happy with the result. I'll be posting a link as soon as I
have it online, if someone needs it. It's just a nice script for a vpn
on top of ssh, even if you don't need tor.
>
> Yes, but back to my thread hijack :)
>
> Let's say my protection model does indeed require Tor, but at the same
> time requires "more" speed.
>
> Forcing Tor to only use fast nodes probably doesn't work, since those fast
> nodes are probably inundated just like the slow ones are. This also
> suggests that organic growth in the Tor network is not going to solve much
> of the speed problem in the near term... existing users will certainly
> use more and more traffic.
>
> But lets say one sets up X Tor nodes in X different locales and configure
> my Tor to use one of those X for my entry, and one of those X for my exit
> ... I'm still throttled by my middle hop, but the odds are much higher in
> my favor, and I may only need to rebuild my connection once or twice to
> get an acceptable speed.
>
> The question is, what values of X are required in order for correlation,
> etc., to not be laughable ?
>
> (the assumption here is that I put my X Tor nodes on the actual Tor
> network, but reserve some percentage of their bandwidth exclusively for my
> own use ... so they look and act like actual Tor nodes ...)
> ***********************************************************************
> To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
> unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/