> The goal is to create a bulletproof environment where nothing can leak 
> thought configuration mistakes, dns, java, flash, plugins and even side 
> channel attacks, local infections, trojans...
> Additionally it's also nice to know that all applications can be torified 
> even if they do not support proxy settings

> Initial step is to learn how to setup a VPN server and how to connect to a 
> VPN server and to use it's internet connection. After that's done this 
> internet connection needs to be torified.

You can't trust any machine to honor it's VPN, proxy, torify,
or any other settings when under attack. Most certainly not
a Windows box running all that stuff. The only way to do it
is to let the box of wayward software run free and insert
a packet filter on it's physical wire. Then smile while you run
whatever you want. If you put the box of junk in a VM and trust the
parent OS to corral the VM's net (which is reasonable), that's
fine too. But I wouldn't ever try to point some standalone box's
stack (under VM or not) to a VPN terminator like this. That's asking
for trouble.
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to