-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Today I thought about something...
Let's assume that attacker (government) seizes the hidden service and wants to run it and deanonymize its users with traffic correlation. Attacker could easily tap into major VPN providers traffic and try to correlate their traffic with hidden service traffic. And there are fewer VPN providers than Tor entry guards (and much less than home connections around the globe). Does it mean that routing Tor through a commercial VPN could actually lower the security, compared to routing Tor directly through a home connection? It's in contrast with what many say, that you should use a commercial VPN for extra security. - -- Oskar Wendel, o.wen...@wp.pl.remove.this Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJWpK+8AAoJEGaQzFIxjbhMk6wH/RNFA38ceVBhetnVPUTHhrsz DC5TerZ0NW39Gn6f4rz66QryjHuTVNqzFwUBTuGSQZw5JjENQeOO53RuFiG1xsWM iFE/UNgezAIX+AaYoZOdaocICtMkWPW9gyddWbRN8vG3/0L4TQTD2wdND4We2x+6 W/uQMKtQ/rH8z/O2vMgetsNdNDp/6V7eKrKxWUkq70Nz+LwD5I8K4ONOJgt7Gd1g Uo8syPFktHlISyquoDDqldOvoN4RTwb8F1+nL8k+q/hYC1HJDHSOjOaMW72OjlpK fAymg+vzK7yg+pOgBvYhi/ojdHBCiajQBx6X+SI1dodINeQm84SjXBgMXPREVF4= =B7jK -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk