Il giorno ven, 13/11/2009 alle 16.28 +0000, John Case ha scritto: > On Fri, 13 Nov 2009, Andrew Lewman wrote: > > > Second, it sounds like you want to protect against a local attacker from > > seeing your traffic. If so, go to proxy.org, find an https:// or > > vpn-based provider and enjoy your encrypted protection against your > > local ISP seeing your destination.
You have a point, that is something I could do probably, but so far all ssl proxy I have seen, are actually websites with a form. I need to use the proxy from the command line and pipe a ssh connection through it. > > If you actually want anonymity, then use Tor as is, for it's designed to > > provide anonymity online by default. That is why am glad my script has tor support now. Anonymity is there. It's just really slow. :-) I added tortunnel support as well, which is probably slower than those websites but serves the purpose. I am pretty happy with the result. I'll be posting a link as soon as I have it online, if someone needs it. It's just a nice script for a vpn on top of ssh, even if you don't need tor. > > Yes, but back to my thread hijack :) > > Let's say my protection model does indeed require Tor, but at the same > time requires "more" speed. > > Forcing Tor to only use fast nodes probably doesn't work, since those fast > nodes are probably inundated just like the slow ones are. This also > suggests that organic growth in the Tor network is not going to solve much > of the speed problem in the near term... existing users will certainly > use more and more traffic. > > But lets say one sets up X Tor nodes in X different locales and configure > my Tor to use one of those X for my entry, and one of those X for my exit > ... I'm still throttled by my middle hop, but the odds are much higher in > my favor, and I may only need to rebuild my connection once or twice to > get an acceptable speed. > > The question is, what values of X are required in order for correlation, > etc., to not be laughable ? > > (the assumption here is that I put my X Tor nodes on the actual Tor > network, but reserve some percentage of their bandwidth exclusively for my > own use ... so they look and act like actual Tor nodes ...) > *********************************************************************** > To unsubscribe, send an e-mail to [email protected] with > unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *********************************************************************** To unsubscribe, send an e-mail to [email protected] with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/

