[tor-talk] Silk Road taken down by FBI
mick
mbm at rlogin.net
Sun Oct 6 10:32:16 UTC 2013
On Sun, 06 Oct 2013 02:36:20 +0000
mirimir <mirimir at riseup.net> allegedly wrote:
>
> Still, if one uses nested VPN tunnels from multiple providers in
> suitably chosen spheres of influence, it will be nontrivial for
> adversaries to install enough taps. Going through China, for example,
> would be a serious roadblock for US-aligned TLAs. Even with four
> nested VPN tunnels, latency and bandwidth are far better than using
> Tor.
>
> Finally, it's not either/or. It's easy to include Tor in nested VPN
> configurations. Latency is typically over two seconds, but bandwidth
> is adequate, especially for UDP traffic.
>
Forgive me, I'm not sure I understand this. Could you elaborate please
on the nesting of the VPN tunnels with Tor? Since Tor does not
(currently) support UDP, what architectural model do you have in mind?
(e.g. openVPN tunnelled through openVPN to a Tor guard entry?)
Mick
---------------------------------------------------------------------
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
---------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20131006/9285ac60/attachment-0001.sig>
More information about the tor-talk
mailing list