On 06/17/2013 12:26 AM, adrelanos wrote: > e...@tormail.org: >> I am worried about this. It's why I don't want to rely on obfuscated >> bridges to hide my Tor usage, as they're not private and one day I could >> get flagged as using Tor if the ISP/military/police is monitoring >> connections to the bridge that I'm using at the time. >> VPN seems to be the best solution. Services like Airvpn offer additional >> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that I'm >> using a VPN, unless they are monitoring connections to Airvpn servers, but >> even then they could only see that I'm using a VPN - *not* a big deal >> compared to Tor. > > Not sure about this, see: > https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting
SSH and VPNs are vulnerable to fingerprinting because latency is low, and they don't pad traffic. But ef2k would be going through Tor after the VPN, so fingerprinting seems less effective. Also, as I just mentioned, ef2k could add cover traffic. _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk