> [email protected]: >> I am worried about this. It's why I don't want to rely on obfuscated >> bridges to hide my Tor usage, as they're not private and one day I could >> get flagged as using Tor if the ISP/military/police is monitoring >> connections to the bridge that I'm using at the time. >> VPN seems to be the best solution. Services like Airvpn offer additional >> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that >> I'm >> using a VPN, unless they are monitoring connections to Airvpn servers, >> but >> even then they could only see that I'm using a VPN - *not* a big deal >> compared to Tor. > > Not sure about this, see: > https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting > _______________________________________________ > tor-talk mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >
Has this been seen used by any ISPs or governments ? It seems to me that it would be too difficult and use far too much resources (computer and human time) to run such fingerprinting on the millions of internet users, assuming they aren't previously flagged for using Tor or suspected as being behind political comments or websites, etc. _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
