Silk Road forums
Discussion => Newbie discussion => Topic started by: malabootay on August 04, 2013, 06:21 am
-
I just recently got tor and I am trying to learn about the different precautions to take with security. Any info would be appreciated
-
i'm still looking into bridges, so can't help there. but if your not already you should look into tails or vpn.
-
I thought a bridge was just like a vpn that makes it look like you aren't accessing tor. Also stacking a vpn on top of tor lessens your anonymity. Tor pools all of our outgoing traffic so the more users on it the more anonymous each individual is. If all your traffic is being routed to a vpn, traffic coming out of the vpn's network going into the tor network will have a much smaller pool of of users to hide your traffic amongst. kmfkewm puts it better than I can though...
So you use Tor and tell me you use BobVPN. So now that is great because I can go to BobVPN and see who all is using Tor. Okay there are twenty people using BobVPN and connecting to Tor, you are probably one of them. Now if I can watch traffic over BobVPN I can quickly pinpoint your traffic with fingerprinting attacks, since I already see the posts you make here and the size of the posts. Only one of the twenty people using BobVPN to connect to Tor is likely to have traffic pattern correlating with the posts I can see you making on the forum here. Also many VPN providers keep logs of who is connected to the VPN when, even if they don't keep traffic logs. So now I can use these logs and see who of the twenty are connected to the VPN when I see traffic from you on this site. Over a small period of time I can use intersection attack to deduce who you are. You could say well my VPN keeps no logs blah blah, and I say fine that is great but you still have essentially changed your security model from Tor to your VPN provider, and that makes life easier for me if I am trying to trace you.