On 08/20/2013 02:31 PM, shm...@riseup.net wrote: > mick: >> On Tue, 20 Aug 2013 04:45:19 +1000 "shm...@riseup.net" >> <shm...@riseup.net> allegedly wrote: >> >>> mirimir: >> >>>> Well, one can use a VPN service through Tor. It's doable in >>>> Whonix or with ra's gateway, and maybe in Tails (with >>>> persistent storage). But I believe that reduces the anonymity >>>> that Tor can provide, because there's a persistent connection >>>> that prevents circuit switching. >>>> >>>> Also, unless you're willing to mail cash or thoroughly >>>> anonymize some Bitcoins, it needs to be a free VPN service. >>>> SecurityKISS works, but throttles and limits daily throughput. >>> >>> they also use google dns servers as their backup resolvers ... >> >> Well I can see that's not good. >> >>> and used easy-rsa for their certs ... >> >> But I fail to see the problem here. OpenVPN uses easy-rsa. > > the problem isn't with the way they chose to create certs. it > suggests they may have taken shortcuts/easy options elsewhere that's > enough to be off-putting
Maybe one can't expect too much for free. There are other free VPN services. Or one can use Bitcoin or cash. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk