Me <-> Tor <-> VPN <-> Internet?
Load Bear
loadbearrun at gmail.com
Thu Oct 7 02:57:06 UTC 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- From what I have read, it is at least theoretically possible for someone
running a Tor exit node to monitor any plaintext, non-SSL/https
connections that are passed through that node. The solution that seems
to be usually suggested is to always use end-to-end encryption, such as
https. However, some sites do not support https.
I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
is there an easy way to, for lack of a better description, chain
proxies, so that the traffic between myself and the VPN is anonymized
through Tor, and my traffic between Tor and the internet is encrypted
through the VPN?
- --
LOAD"BEAR",8,1;RUN
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkytNwIACgkQ8Li/YMVVHuZGCgCgqcGoIEXD13bs3Vb8YklIiMuo
gZsAn312Q69Nr0I6ODHR+AQ+xkkGStOm
=r2iJ
-----END PGP SIGNATURE-----
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list