Does a VPN help with fingerprinting? I know that Tor has had some success in reducing the variables that are used for fingerprinting but we have not found a perfect solution yet.
If we go into a VPN and then in to Tor would that help to minimize some additional variables used for fingerprinting? I assume this is not a perfect solution but it will it help? Thnks On Sun, Jun 16, 2013 at 10:44 PM, mirimir <[email protected]> wrote: > On 06/16/2013 07:53 AM, Lunar wrote: > > > [email protected]: > >> Is it possible to do Tor transparent proxying over OpenVPN i.e. My > >> connection -> OpenVPN -> Tor ? > >> The purpose of this would be to stop the ISP from seeing that Tor is > being > >> used. > > > > If that's your goal, I strongly suggest using obfsucated bridges > > instead: > > https://www.torproject.org/docs/bridges.html.en#PluggableTransports > > How fast must new obfuscated bridges be created to replace old ones that > have been discovered? What's the mean lifetime of an obfuscated bridge? > > If obfuscated bridges don't last very long, it's very likely that ef2k's > ISP will quickly determine that he's using Tor, even if it can't > consistently block Tor use. > > If ef2k were using a VPN service, on the other hand, his ISP would need > to gain cooperation of his VPN provider, or snoop its exit traffic. And > he could choose VPN providers prudently to make either harder for his > ISP to accomplish. Or he could nest multiple VPNs. > > He could also use both VPNs and obfuscated bridges, if hiding Tor use > really matters. > _______________________________________________ > tor-talk mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
