A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows 7 » Windows 7 Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Would it have helped the Harvard bomber to use VPN on top of TOR?



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old January 22nd 14, 06:26 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D.[_4_]
external usenet poster
 
Posts: 26
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

I'm curious ...

Given that the Harvard student lost his anonymity simply
by using Tor on the Harvard WiFi network, do you think
there would have been worthwhile anonymizing value had he
simply added VPN on top of Tor?

That is, after anonymizing his browser fingerprint,
instead of going directly to freeware Tor, one adds
an additional layer of freeware VPN?

The presumed advantage is that the local WiFi network
couldn't have "seen" the Tor connection

The disadvantage presumably would be that both VPN and
Tor slow things down; but they guy was only sending email.

QUESTION:
Does freeware VPN add any additional anonymizing value to Tor?

Ads
  #2  
Old January 22nd 14, 06:58 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
J.O. Aho
external usenet poster
 
Posts: 130
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On 22/01/14 19:26, Danny D. wrote:

QUESTION:
Does freeware VPN add any additional anonymizing value to Tor?


This depends on how well the VPN provider logs your activity and how
willing they are sharing this information. I would more bet on those pay
services which has setup their services to help their customers to use
piratebay and similar services without the fear of getting sued by some
greedy MPAA or similar idiots.

--

//Aho

  #3  
Old January 22nd 14, 07:46 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
David Thomas[_3_]
external usenet poster
 
Posts: 1
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 19:58:05 +0100, J.O. Aho wrote:

This depends on how well the VPN provider logs your activity and how
willing they are sharing this information.


With the FBI tracking the offender, probably nothing
would have saved him.

But, for general use, I don't think VPN adds *anything*
of value, with or without TOR.

For one, VPN can be seen by your ISP or by the wifi
access point that you select, so, that singles you
out immediately as an offender of their rules.

Better to blend in with everyone else, and use neither
VPN nor TOR. If you must, one without the other is probably
OK, but having both is a security hole in and of itself.

  #4  
Old January 22nd 14, 07:52 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D.[_3_]
external usenet poster
 
Posts: 7
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 19:46:47 +0000, David Thomas wrote:

But, for general use, I don't think VPN adds *anything*
of value, with or without TOR.


i think vpn adds a lot of value over and above tor!

even if the vpn provider rats on you, they can only
say you were using tor because they don't know your
end url.

plus your traffic is doubly encrypted, once by vpn
and then again by tor.
  #5  
Old January 22nd 14, 07:54 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D.[_4_]
external usenet poster
 
Posts: 26
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 19:58:05 +0100, J.O. Aho wrote:

This depends on how well the VPN provider logs your activity and how
willing they are sharing this information.


i don't understand why the vpn logs would matter.

all the vpn would know is that you went to tor.

the vpn wouldn't know where else you went.

  #6  
Old January 22nd 14, 09:08 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
ghostrider
external usenet poster
 
Posts: 100
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On 1/22/2014 11:52 AM, Danny D. wrote:
On Wed, 22 Jan 2014 19:46:47 +0000, David Thomas wrote:

But, for general use, I don't think VPN adds *anything*
of value, with or without TOR.


i think vpn adds a lot of value over and above tor!

even if the vpn provider rats on you, they can only
say you were using tor because they don't know your
end url.

plus your traffic is doubly encrypted, once by vpn
and then again by tor.


At most places, access to VPN is "by invitation", i.e., via a
discrete logon. While using VPN would mask the physical address
of the transmitter to a recipient, a backtrace would end up at
the VPN server. Checking the VPN logs would then track back to
the originator. If by Wi-Fi, it would point to the user, typically
to the machine's MAC; and if by a physical connection, to the
actual ethernet port. Anonymity is better assured over an open
internet than via dedicated routing, with/without tor.

GR

---
This email is free from viruses and malware because avast! Antivirus protection is active.
http://www.avast.com

  #7  
Old January 22nd 14, 10:12 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D'Amico[_2_]
external usenet poster
 
Posts: 24
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 19:58:05 +0100, J.O. Aho wrote:

I would more bet on those pay
services


That's pretty much what this article said also:
http://lifehacker.com/5940565/why-yo...for-your-needs

  #8  
Old January 22nd 14, 11:47 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Silver Slimer[_4_]
external usenet poster
 
Posts: 340
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

On Wed, 22 Jan 2014 13:26:48 -0500, Danny D.
wrote:

QUESTION:
Does freeware VPN add any additional anonymizing value to Tor?


Of course. You're essentially going through two proxies AND giving
yourself a failsafe if ever Tor gets compromised (and it seems to have
been a few days ago).
--
Silver Slimer
GNU/Linux is Communism
  #9  
Old January 23rd 14, 12:00 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D'Amico[_2_]
external usenet poster
 
Posts: 24
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 13:08:33 -0800, Ghostrider " wrote:

Checking the VPN logs would then track back to
the originator.


For two reasons that doesn't bother me at all ...
a. Most of these VPN providers say they don't have *any* logs.
b. I just want Internet anonymity; not immunity from the law

If by Wi-Fi, it would point to the user, typically
to the machine's MAC; and if by a physical connection, to the
actual ethernet port.


Again, that's not at all worrisome since my eth0 and wlan0
MAC address is randomly changed every time I reboot.

Anonymity is better assured over an open
internet than via dedicated routing, with/without tor.


I'm not so sure I believe that...

  #10  
Old January 23rd 14, 01:49 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D.[_4_]
external usenet poster
 
Posts: 26
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 18:47:35 -0500, Silver Slimer wrote:

Of course. You're essentially going through two proxies AND giving
yourself a failsafe if ever Tor gets compromised (and it seems to have
been a few days ago).


I think that's good advice.

1. The VPN gives us encryption from, I guess, home to the server.
2. The VPN goes to Tor, which gives us encryption to the destination.
3. And, if the destination is an https address, we get a third level of encryption.

At least that's how I *think* it works.

  #11  
Old January 23rd 14, 02:09 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Silver Slimer[_4_]
external usenet poster
 
Posts: 340
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

On Wed, 22 Jan 2014 20:49:43 -0500, Danny D.
wrote:

On Wed, 22 Jan 2014 18:47:35 -0500, Silver Slimer wrote:

Of course. You're essentially going through two proxies AND giving
yourself a failsafe if ever Tor gets compromised (and it seems to have
been a few days ago).


I think that's good advice.

1. The VPN gives us encryption from, I guess, home to the server.
2. The VPN goes to Tor, which gives us encryption to the destination.
3. And, if the destination is an https address, we get a third level of
encryption.

At least that's how I *think* it works.


I haven't used Tor myself but have used VPN's in the past. Essentially,
your ISP will know that you made a connection to the VPN, but from that
point on they know nothing. Once connected to the VPN, you are anonymous
and once you connect to Tor, your activity becomes anonymous to the
provider of the VPN.

--
Silver Slimer
GNU/Linux is Communism

The intellect and maturity of GNU/Linux advocates:
"Does Snot's penis taste salty, Silver Slipper?" - Onion Knight v3.0
"Isn't it time you went home to alt.suicide.holiday?" - Nobody
  #12  
Old January 23rd 14, 02:15 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
John Hasler
external usenet poster
 
Posts: 62
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

Danny D. writes:
The VPN goes to Tor, which gives us encryption to the destination.


Tor is for anonymity, not
encryption. http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
--
John Hasler

Dancing Horse Hill
Elmwood, WI USA
  #13  
Old January 23rd 14, 02:23 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Silver Slimer[_4_]
external usenet poster
 
Posts: 340
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

On Wed, 22 Jan 2014 21:15:14 -0500, John Hasler
wrote:

Danny D. writes:
The VPN goes to Tor, which gives us encryption to the destination.


Tor is for anonymity, not
encryption. http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29


Correct.
--
Silver Slimer
GNU/Linux is Communism

The intellect and maturity of GNU/Linux advocates:
"Does Snot's penis taste salty, Silver Slipper?" - Onion Knight v3.0
"Isn't it time you went home to alt.suicide.holiday?" - Nobody
  #14  
Old January 23rd 14, 04:08 AM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Danny D'Amico[_2_]
external usenet poster
 
Posts: 24
Default Would it have helped the Harvard bomber to use VPN on top ofTOR?

On Wed, 22 Jan 2014 20:15:14 -0600, John Hasler wrote:

Tor is for anonymity, not encryption.


I might have mixed them up, in my examples.

Are these examples correct?

---- === not encrypted
++++ === encrypted

1. Normal un-encrypted connection:
Home PC----ISP----Internet----Destination

2. The standard TOR scenario:
Home PC----ISP----Internet----Tor1/Tor2/Tor3---Destination

3. I think this is the "personal VPN" scenario:
Home PC++++ISP++++Internet++++VPN Server----Destination

4. I think this is the encryption adding personal VPN to Tor:
Home PC++++ISP++++Internet++++VPN++++Tor1/Tor2/Tor3---Destination

Are those diagrams correct?

  #15  
Old January 23rd 14, 02:16 PM posted to alt.comp.freeware,alt.os.linux,alt.windows7.general
Silver Slimer[_4_]
external usenet poster
 
Posts: 340
Default Would it have helped the Harvard bomber to use VPN on top of TOR?

On Wed, 22 Jan 2014 23:08:20 -0500, Danny D'Amico wrote:

On Wed, 22 Jan 2014 20:15:14 -0600, John Hasler wrote:

Tor is for anonymity, not encryption.


I might have mixed them up, in my examples.

Are these examples correct?

---- === not encrypted
++++ === encrypted

1. Normal un-encrypted connection:
Home PC----ISP----Internet----Destination

2. The standard TOR scenario:
Home PC----ISP----Internet----Tor1/Tor2/Tor3---Destination

3. I think this is the "personal VPN" scenario:
Home PC++++ISP++++Internet++++VPN Server----Destination

4. I think this is the encryption adding personal VPN to Tor:
Home PC++++ISP++++Internet++++VPN++++Tor1/Tor2/Tor3---Destination

Are those diagrams correct?


It's more like
PC---ISP----Internet----VPN----Tor/Tor2/Tor3----Destination. Nowhere along
the same is there any kind of encryption.
--
Silver Slimer
GNU/Linux is Communism

The intellect and maturity of GNU/Linux advocates:
"Does Snot's penis taste salty, Silver Slipper?" - Onion Knight v3.0
"Isn't it time you went home to alt.suicide.holiday?" - Nobody
 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 06:04 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.