OnionCat -- An IP-Transparent TOR Hidden Service Connector
7v5w7go9ub0o
7v5w7go9ub0o at gmail.com
Wed Jun 25 13:16:12 UTC 2008
Bernhard Fischer wrote:
> On Tuesday 24 June 2008, 7v5w7go9ub0o wrote:
<snip
>> My hope is to use OnionCat on my laptop to VNC via TOR to my home
>> computer using nomachine NX. Is that kind of use possible with OC?
>>
>> Thanks again.
>
> Yes, this should work. But why would you like to do this? TOR's hidden
> services are not very fast even though no exit nodes are required.
> And if you connect to your own computer, anonymity is not an issue.
> If you only want to have encryption I suggest to use ssh oder openvpn.
Thank you for your quick reply!
This would be used only from open, WIFI hotspots while I'm on the road.
I'm typically gone for two to three weeks, and the computer would be
home unattended.
1. Connecting via TOR would be an extra, minor security option to
conceal the fact that my home is running a VNC server - eavesdropping
kids at the hotspot may try to make it a hacking "prize".
2. Out of general principle, I see no reason to record my home IPA in
the various hotspot logs. I wish to come and go quietly without "signing
in".
Question:
Using the "phone home" example above, is there any way that my home
computer could go out to the general WAN and access non-TOR, non-OC
resources? IIUC, the TUN device means that my computers can only connect
with each other!? i.e. can I also somehow connect out on eth0 while
maintaining an OC/TUN connection?
More information about the tor-talk
mailing list