Me - Tor - VPN - Internet?

2010-10-06 Thread Load Bear
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- From what I have read, it is at least theoretically possible for someone
running a Tor exit node to monitor any plaintext, non-SSL/https
connections that are passed through that node. The solution that seems
to be usually suggested is to always use end-to-end encryption, such as
https. However, some sites do not support https.

I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
is there an easy way to, for lack of a better description, chain
proxies, so that the traffic between myself and the VPN is anonymized
through Tor, and my traffic between Tor and the internet is encrypted
through the VPN?


- -- 
LOADBEAR,8,1;RUN
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytNwIACgkQ8Li/YMVVHuZGCgCgqcGoIEXD13bs3Vb8YklIiMuo
gZsAn312Q69Nr0I6ODHR+AQ+xkkGStOm
=r2iJ
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Me - Tor - VPN - Internet?

2010-10-06 Thread Load Bear
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2010/10/06 11:02 PM, John Brooks wrote:
 On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:

 I have also noticed that there exist some free VPN services which can be
 used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
 is there an easy way to, for lack of a better description, chain
 proxies, so that the traffic between myself and the VPN is anonymized
 through Tor, and my traffic between Tor and the internet is encrypted
 through the VPN?

 Then the traffic between the VPN and the actual destination won't be
 encrypted, so the VPN sees everything you do. Same problem, different place.
 There is no way you can encrypt traffic sent to a destination that doesn't
 know how to decrypt it.

I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of some method to accomplish my expressed goal?


- -- 
LOADBEAR,8,1;RUN
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq
p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo
=AtlC
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/