[tor-talk] NSA supercomputer

Alexandre Guillioud guillioud.alexandre at gmail.com
Thu Apr 4 14:31:00 UTC 2013


One thing i forgot.. The last vpn/ssh tunnel need to be totally secure.
Basically, you need your personnal anon server to do that. If you can't
handle your own service, you'll better stay with tor as the last system in
the pile.


2013/4/4 Alexandre Guillioud <guillioud.alexandre at gmail.com>

> I'm in a hurry so, i describe a little scenario :
>
> + Launch a vpn/ssh tunnel service, and secure bind privoxy/proxifier into
> it. (this one is for scrambling, linearising data)
> + Launch a system like Privoxy and/or Proxifier
> ++ Bind several linked proxy (your data will pass thru each of them)
> + Launch Tor sock service to connect threw it (force connect threw it with
> Secure Binding in Privoxy or Proxifier, did'nt remember)
> + A other vpn/ssh tunnel with cipher/crypt techno than the first one ?
>
> With that, you'll have some second of latency. But you'll be hidded, even
> if tor is break. Timing attack become quasi impossible, beacause of
> scrambling/linearisation of the vpn/ssh tunnel.
>
> Enjoy ? :D
>
> 2013/4/4 Ivan Sipka <frkator at gmail.com>
>
>> On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud <
>> guillioud.alexandre at gmail.com> wrote:
>>
>> > So, if you're paranoïd, or doing something where paranoïd behavior is
>> > requested, use a vpn inside and outside tor.
>> > Use linked proxy's on top of this. You'll be fine.
>> >
>>
>> could you elaborate on this a bit more please?
>> _______________________________________________
>> tor-talk mailing list
>> tor-talk at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
>
>


More information about the tor-talk mailing list