all traffic through a VPN on top of tor, done!
John Case
case at sdf.lonestar.org
Fri Nov 13 16:28:20 UTC 2009
On Fri, 13 Nov 2009, Andrew Lewman wrote:
> Second, it sounds like you want to protect against a local attacker from
> seeing your traffic. If so, go to proxy.org, find an https:// or
> vpn-based provider and enjoy your encrypted protection against your
> local ISP seeing your destination.
>
> If you actually want anonymity, then use Tor as is, for it's designed to
> provide anonymity online by default.
Yes, but back to my thread hijack :)
Let's say my protection model does indeed require Tor, but at the same
time requires "more" speed.
Forcing Tor to only use fast nodes probably doesn't work, since those fast
nodes are probably inundated just like the slow ones are. This also
suggests that organic growth in the Tor network is not going to solve much
of the speed problem in the near term... existing users will certainly
use more and more traffic.
But lets say one sets up X Tor nodes in X different locales and configure
my Tor to use one of those X for my entry, and one of those X for my exit
... I'm still throttled by my middle hop, but the odds are much higher in
my favor, and I may only need to rebuild my connection once or twice to
get an acceptable speed.
The question is, what values of X are required in order for correlation,
etc., to not be laughable ?
(the assumption here is that I put my X Tor nodes on the actual Tor
network, but reserve some percentage of their bandwidth exclusively for my
own use ... so they look and act like actual Tor nodes ...)
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list