all traffic through a VPN on top of tor, done!
Andrea Ratto
andrearatto_liste at yahoo.it
Fri Nov 13 07:39:39 UTC 2009
I don't really know. I think that you really don't want to be your own
"anonymizer", unless you control computer all over the world. It seems
you are just trying to shorten the circuit.
For this kind of use (VPN) you are connecting to a server you implicitly
trust, since you control it. You don't really need strong anonymity, one
single encrypted hop would be enough.
Any malicious node has only one way of attacking you: be the man in the
middle and try to get your ssh key. But ssh comes with protections
against it and, with a simple precaution, even a malicious node it's ok,
if it routes your traffic.
I already picked up a "near" and fast entry node but it did not really
help.
I would just like to shorten the circuit, but it seems there is no
option for doing that. I hope they change their mind and put one, maybe
limited to 3 hops, so that it can't be used to over saturate the
network.
Il giorno ven, 13/11/2009 alle 01.17 +0000, John Case ha scritto:
> and use them as a pool to build at least two out of three hops
> with ? That way you're getting high speed, but you "trust" the
> overall
> circuit because you know that at least 2/3 of your circuit is not
> malevolant.
>
> I asked this question a month or so ago and did not see any answers -
> if
> one _did_ build a small (10 or so nodes) network of tor relays and
> used
> them as 1/3 or 2
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list