[tor-talk] Using VPN less safe?

2016-01-27 Thread Spencer
Hi, Spencer: I am forced to update [0] And to use third-parties for a native functionality ): Wordlife, Spencer [0]: http://fr.tinypic.com/r/2qk5gtw/9 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to

[tor-talk] Using VPN less safe?

2016-01-27 Thread Spencer
Hi, Thank you for your thoughtful response (: Paul Syverson: diversity of trust This has no definition that I could quickly find. It is an anthropological area of research, though, such as inquiring into how trust works in diverse communities, with more research needed. this does not

Re: [tor-talk] Using VPN less safe?

2016-01-26 Thread juan
On Mon, 25 Jan 2016 10:25:20 -0500 Paul Syverson wrote: > "20,000 In League Under the Sea: Anonymous Communication, Trust, > MLATs, and Undersea Cables" available at >

Re: [tor-talk] Using VPN less safe?

2016-01-25 Thread Paul Syverson
On Sun, Jan 24, 2016 at 04:13:18PM -0800, Spencer wrote: > > > >leave the route selection to Tor > > > > Is this that trust thing people are always talking about? > A little terse to know, but onion routing is designed around diversity of trust. Just to be clear, this does not mean 'let the Tor

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Mirimir
On 01/24/2016 09:38 AM, Roger Dingledine wrote: > On Sun, Jan 24, 2016 at 11:04:30AM +, Oskar Wendel wrote: >> Attacker could easily tap into major VPN providers traffic and try to >> correlate their traffic with hidden service traffic. And there are fewer >> VPN providers than Tor entry

[tor-talk] Using VPN less safe?

2016-01-24 Thread Spencer
Hi, Nobody [quoted and I snipped regarding Tor over Tor]: undefined and potentially unsafe behavior ... it is not clear if this is safe ... it has never been discussed ... we don't understand. These seem to be the valuable parts. leave the route selection to Tor Is this that trust

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Flipchan : > Do u mean a vpn to tor? Or first tor then a vpn? Tor over VPN. So we first purchase a VPN and then make Tor use it to connect to the first hop. - -- Oskar Wendel, o.wen...@wp.pl.remove.this Pubkey:

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Flipchan
Well i never liked vpn , like for example in the US the police can force the vpn provider to give out info without the vpn provider telling the client/customer about it, so u need to put alot of trust in these vpn providers, i am acctually developing a better solution but its only in beta and

[tor-talk] Using VPN less safe?

2016-01-24 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Today I thought about something... Let's assume that attacker (government) seizes the hidden service and wants to run it and deanonymize its users with traffic correlation. Attacker could easily tap into major VPN providers traffic and try to

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Roger Dingledine
On Sun, Jan 24, 2016 at 11:04:30AM +, Oskar Wendel wrote: > Attacker could easily tap into major VPN providers traffic and try to > correlate their traffic with hidden service traffic. And there are fewer > VPN providers than Tor entry guards (and much less than home connections > around

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Flipchan
Instead of goin vpn->tor You could go i2p->tor nobody skrev: (24 januari 2016 21:25:38 CET) >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA512 > > > >On 01/24/2016 03:22 PM, aka wrote: >> Oskar Wendel: >>> Today I thought about something... >>> >>> Let's assume that

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Roger Dingledine : > It's a tradeoff -- if somebody somehow breaks the anonymity of your Tor > circuit, it's nice to have another layer behind that. But if somebody > guesses that you're using a particular VPN, or you pick a VPN that

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Oskar Wendel
aka : > Why not Tor over Tor? Using a Tor exit to connect to the first hop. > Would require traffic correlating twice. It wouldn't. Traffic correlation doesn't care of the traffic content itself. It doesn't break the traffic anonymity, it just correlates your

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Flipchan : > Instead of goin vpn->tor You could go i2p->tor It's a bit offtopic, but still interesting. So you mean routing i2p through Tor? I conducted some experiments some time ago (I don't trust i2p enough to run it

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread aka
Oskar Wendel: > Today I thought about something... > > Let's assume that attacker (government) seizes the hidden service and > wants to run it and deanonymize its users with traffic correlation. > > Attacker could easily tap into major VPN providers traffic and try to > correlate their traffic

Re: [tor-talk] Using VPN less safe?

2016-01-24 Thread nobody
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/24/2016 03:22 PM, aka wrote: > Oskar Wendel: >> Today I thought about something... >> >> Let's assume that attacker (government) seizes the hidden service >> and wants to run it and deanonymize its users with traffic >> correlation. >> >>