Oskar Wendel: > Today I thought about something... > > Let's assume that attacker (government) seizes the hidden service and > wants to run it and deanonymize its users with traffic correlation. > > Attacker could easily tap into major VPN providers traffic and try to > correlate their traffic with hidden service traffic. And there are fewer > VPN providers than Tor entry guards (and much less than home connections > around the globe). > > Does it mean that routing Tor through a commercial VPN could actually > lower the security, compared to routing Tor directly through a home > connection? It's in contrast with what many say, that you should use > a commercial VPN for extra security. > >
Why not Tor over Tor? Using a Tor exit to connect to the first hop. Would require traffic correlating twice. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk