On 01/22/12 at 06:46 AM, Christopher J. Walters wrote:

 > Actually, I know little about VPN. I was asking, in the hope that
 > I could learn more - and also it was suggested (I'm not sure where)
 > that using a VPN with Tor was better than either alone. Maybe it
 > would help if someone explained VPN - its good and bad points.

 Generally, virtual private networks (VPNs) are just that. You can think of VPN 
connections (aka tunnels) as virtual ethernet cables. Organizations typically 
use VPNs for LAN connectivity among locations, and with remote staff. There are 
three main protocols: 1) PPTP (outdated, simple, insecure); 2) IPsec (current, 
complicated, secure); and 3) OpenVPN (current, arguably less complicated, 
secure).

 In this context, however, we are using "VPN" in a more restricted way, to mean 
VPN "anonymnity" services. That is, we mean VPN connections to remote Internet 
gateways, rather than to remote LANs.

 Regarding Tor, you must trust the design, the validity of the security 
assumptions that it's based on, and the software implementation. To the extent 
that you don't understand any of that, you must trust the developers. If you 
trust Tor itself, you don't need to trust the other participants (or vice 
versa). But you have no way, as a user, to really know how anonymous you are.

 Regarding VPN services, you must trust the operators, as well as their 
designs, assumptions and implementations. Some VPN services are basically just 
VPN-connected proxy servers. They know who you are, and they know where you've 
been. Other VPN providers may claim to increase anonymity in various ways. They 
may claim to route connections through multiple, geographically widespread 
servers and routers ("multi-hop VPNs"). They may claim to mix traffic on links 
and exit nodes that are shared with associated organizations ("multiplexing and 
crowding"). They may claim to require joint authentication, by mutually 
anonymous administrators, for access to, and configuration of, shared resources.

 However, everything can be logged, by every device that's involved (servers, 
routers, switches, etc). VPN providers may claim that they don't keep logs, 
that their designs make it difficult or impossible to keep logs, and so on. You 
can nest multiple VPN services, using providers who seem unlikely to collude 
and cooperate with your government. You can pay anonymously. But again, you 
have no way, as a user, to really know how anonymous you are.

 As a user, for both Tor and VPNs, it comes down to trust. Tor is arguably more 
likely to be more anonymous. Accessing Tor through VPNs can't hurt. Routing 
VPNs through Tor may be appropriate under some circumstances. But doing that 
will create shared history for each VPN that you use in that way. You obviously 
don't want to use the same VPN service on both sides of Tor.

 If you're interested in learning more, there are many informative threads on 
Wilders Security Forums.
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to