In case anyone is interested I managed to block STUN requests using an
application level firewall on the router. Probably not 100%, but
definitely an improvement...
On 08/02/15 12:00, Bill Berry wrote:
Hi all,
I've setup a Tor transparent proxy, as per the instructions here
Hi all,
I've setup a Tor transparent proxy, as per the instructions here
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy (I'm
aware of the security risks of not using the Tor Browser)
It's working well except it is vulnerable to STUN requests (as per
http://ipleak.net/). D
As I recall, nobody in this thread has actually opined that "VPN -> Tor"
is "definitely not good". People have quoted Grugq to that effect, from
a 2012 presentation. But nobody here has made an argument for it.
I think leeroy presented some compelling reasons why in his case 1
(easier to do cor
re: HideMyAss
http://www.quora.com/LulzSec/How-did-Topiary-get-busted
http://www.wilderssecurity.com/threads/hidemyass-provides-fbi-with-logs-for-lulzsec.308290/
http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/
On 01/02/15 15:21, Joe Btfsplk wrote:
On 2/1/2015 4:11 AM, Bill Berry wrote
My take (on his take :) ) was that;
a) trusting a VPN for security is a bad idea because no VPN operator is
going to go to jail for you (see HideMyAss and Sabu etc)
b) he assumes most VPN accounts can be tied back to you; almost no-one
is going to bitcoin+tor every interaction with their VPN p
This image explains VPN + tor quite well;
https://vigilantcanuck.files.wordpress.com/2015/01/vpn-tor.png
IMO this setup is a pretty sensible idea given the recent
de-anonymisation attacks (e.g. CMU). If your Tor connection gets
comprimised, all the Feds have (hopefully) is your VPN IP.
The b