-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2010/10/06 11:02 PM, John Brooks wrote:
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:
I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
is there an easy way to, for lack of a better description, chain
proxies, so that the traffic between myself and the VPN is anonymized
through Tor, and my traffic between Tor and the internet is encrypted
through the VPN?
Then the traffic between the VPN and the actual destination won't be
encrypted, so the VPN sees everything you do. Same problem, different place.
There is no way you can encrypt traffic sent to a destination that doesn't
know how to decrypt it.
I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of some method to accomplish my expressed goal?
- --
LOADBEAR,8,1;RUN
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq
p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo
=AtlC
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/