On the Topic of Tor's Weaknesses

Discussion in 'privacy technology' started by lotuseclat79, Mar 22, 2012.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    They mention being able to trace you if they have access to the first and last node, if I understand correctly. So I guess if you open the Tor Browser bundle after connecting to a VPN, the connection could only be traced back to the VPN.
     
  3. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    That's correct Caspian.
     
  4. zero_Phil

    zero_Phil Registered Member

    Joined:
    Apr 22, 2011
    Posts:
    67
    So if you don't use a VPN Tor is useless?
     
  5. hugsy

    hugsy Registered Member

    Joined:
    May 22, 2010
    Posts:
    167
    In my opinion, that would work only if there is just one relay nod in between.
    Bad-Good-Bad, if there are two or more, it would be very hard(er). Plus if you have https, then it is encrypted.
     
  6. zero_Phil

    zero_Phil Registered Member

    Joined:
    Apr 22, 2011
    Posts:
    67
    Thanks Jack & Hugsy, all interestng stuff.
     
  7. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Adding a VPN only protects from evil Tor exit nodes if the VPN is routed through Tor. Conversely, adding a VPN only protects from the deanonymization attack described by the OP if Tor is connecting through the VPN. But you can have both, if you like.
     
  8. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    Thanks for that. . But then if the organization who was able to control the first and last node contacted the VPN provider to see who was connected to tor at such and such time, and the VPN provider agreed to give it to them, then that would be that. So still it is important to have a trustworthy VPN who is truly devoted to the principles of privacy and freedom.
     
  9. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    I wish I knew how to have it both ways. That would be pretty cool. How do you get a VPN to go through tor?

    I have a JanusPA that I bought a long time ago. But I never got around to hooking it up. Do you think it would still be safe to try? That is the only way I could think of getting a VPN to go through tor. Connect the JanusPA, fire up the VPN, and then fire up the Tor browser bundle....LOL
     
  10. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Tor handles TCP, so TCP-based VPNs (HTTPS port 443) work. VPNs deal pretty well with packet loss and latency. See -http://www.wilderssecurity.com/showthread.php?t=316044 for one approach.

    I wouldn't use JanusPA unless you could update Tor.
     
  11. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    OK, that works too: routing TCP VPN traffic through Tor. But your ISP etc does see that you're using Tor.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.