-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - From what I have read, it is at least theoretically possible for someone running a Tor exit node to monitor any plaintext, non-SSL/https connections that are passed through that node. The solution that seems to be usually suggested is to always use end-to-end encryption, such as https. However, some sites do not support https.
I have also noticed that there exist some free VPN services which can be used reasonably anonymously, such as ItsHidden. Thus, I was wondering - is there an easy way to, for lack of a better description, chain proxies, so that the traffic between myself and the VPN is anonymized through Tor, and my traffic between Tor and the internet is encrypted through the VPN? - -- LOAD"BEAR",8,1;RUN -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkytNwIACgkQ8Li/YMVVHuZGCgCgqcGoIEXD13bs3Vb8YklIiMuo gZsAn312Q69Nr0I6ODHR+AQ+xkkGStOm =r2iJ -----END PGP SIGNATURE----- *********************************************************************** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/