Delivery-Date: Sun, 24 Jan 2016 06:04:53 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,RCVD_IN_SBL,T_RP_MATCHES_RCVD autolearn=no version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 24FA01E0342;
	Sun, 24 Jan 2016 06:04:51 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AB7A736EC0;
	Sun, 24 Jan 2016 11:04:46 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E7BAD36C1C
 for <tor-talk@lists.torproject.org>; Sun, 24 Jan 2016 11:04:43 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id lHR6LA4NcYD7 for <tor-talk@lists.torproject.org>;
 Sun, 24 Jan 2016 11:04:43 +0000 (UTC)
Received: from plane.gmane.org (plane.gmane.org [80.91.229.3])
 (using TLSv1 with cipher AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id AD22336450
 for <tor-talk@lists.torproject.org>; Sun, 24 Jan 2016 11:04:43 +0000 (UTC)
Received: from list by plane.gmane.org with local (Exim 4.69)
 (envelope-from <gno-or-talk-2@m.gmane.org>) id 1aNITE-0004UC-BD
 for tor-talk@lists.torproject.org; Sun, 24 Jan 2016 12:04:36 +0100
Received: from tor-exit.want.some.vodka ([104.192.0.18])
 by main.gmane.org with esmtp (Gmexim 0.1 (Debian))
 id 1AlnuQ-0007hv-00
 for <tor-talk@lists.torproject.org>; Sun, 24 Jan 2016 12:04:36 +0100
Received: from o.wendel by tor-exit.want.some.vodka with local (Gmexim 0.1
 (Debian)) id 1AlnuQ-0007hv-00
 for <tor-talk@lists.torproject.org>; Sun, 24 Jan 2016 12:04:36 +0100
X-Injected-Via-Gmane: http://gmane.org/
To: tor-talk@lists.torproject.org
From: Oskar Wendel <o.wendel@wp.pl>
Date: Sun, 24 Jan 2016 11:04:30 +0000 (UTC)
Lines: 32
Message-ID: <n82b3t$g4v$1@ger.gmane.org>
X-Complaints-To: usenet@ger.gmane.org
X-Gmane-NNTP-Posting-Host: tor-exit.want.some.vodka
Subject: [tor-talk] Using VPN less safe?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Today I thought about something...

Let's assume that attacker (government) seizes the hidden service and 
wants to run it and deanonymize its users with traffic correlation.

Attacker could easily tap into major VPN providers traffic and try to 
correlate their traffic with hidden service traffic. And there are fewer 
VPN providers than Tor entry guards (and much less than home connections 
around the globe).

Does it mean that routing Tor through a commercial VPN could actually 
lower the security, compared to routing Tor directly through a home 
connection? It's in contrast with what many say, that you should use 
a commercial VPN for extra security.

- -- 
Oskar Wendel, o.wendel@wp.pl.REMOVE.THIS
Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C
Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C
-----BEGIN PGP SIGNATURE-----

iQEcBAEBAgAGBQJWpK+8AAoJEGaQzFIxjbhMk6wH/RNFA38ceVBhetnVPUTHhrsz
DC5TerZ0NW39Gn6f4rz66QryjHuTVNqzFwUBTuGSQZw5JjENQeOO53RuFiG1xsWM
iFE/UNgezAIX+AaYoZOdaocICtMkWPW9gyddWbRN8vG3/0L4TQTD2wdND4We2x+6
W/uQMKtQ/rH8z/O2vMgetsNdNDp/6V7eKrKxWUkq70Nz+LwD5I8K4ONOJgt7Gd1g
Uo8syPFktHlISyquoDDqldOvoN4RTwb8F1+nL8k+q/hYC1HJDHSOjOaMW72OjlpK
fAymg+vzK7yg+pOgBvYhi/ojdHBCiajQBx6X+SI1dodINeQm84SjXBgMXPREVF4=
=B7jK
-----END PGP SIGNATURE-----

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

