Delivery-Date: Thu, 11 Jun 2015 08:03:00 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B3AD31E0502;
	Thu, 11 Jun 2015 08:02:58 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4524A35EC1;
	Thu, 11 Jun 2015 12:02:53 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B107F35EBE
 for <tor-talk@lists.torproject.org>; Thu, 11 Jun 2015 12:02:49 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 1793al942BCi for <tor-talk@lists.torproject.org>;
 Thu, 11 Jun 2015 12:02:49 +0000 (UTC)
Received: from smtp8.openmailbox.org (smtp8.openmailbox.org [62.4.1.42])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 8536035EBC
 for <tor-talk@lists.torproject.org>; Thu, 11 Jun 2015 12:02:49 +0000 (UTC)
X-Greylist: delayed 600 seconds by postgrey-1.34 at eugeni;
 Thu, 11 Jun 2015 12:02:49 UTC
Received: from localhost (localhost [127.0.0.1])
 by mail2.openmailbox.org (Postfix) with ESMTP id 96FFA202F9F
 for <tor-talk@lists.torproject.org>; Thu, 11 Jun 2015 13:52:45 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=openmailbox.org;
 h=user-agent:message-id:subject:subject:from:from:date:date
 :content-transfer-encoding:content-type:content-type
 :mime-version:received:received; s=openmailbox; t=1434023560;
 bh=K2Bj9ApkYwMCjZW2a+sY2avEQJlkP5EBjVU4hVWNoIA=; b=Fl7fmJvvHGS+
 9kgPDDZh19IsZI9j+kbX2RcqnwO+OJc0tYhK4qA+9H408wgXHqV6CS7L3HuJ8yRg
 9ndGbLrvgZS/tbh/kQHB7cRoGXk4NPL152RjjnPGLDGrQ63j936RFoPzIvzyC4Wc
 dJ3ngJ311oJnZALg4E5K43uEiT3aMLc=
X-Virus-Scanned: amavisd-new at openmailbox.org
Received: from mail2.openmailbox.org ([62.4.1.33])
 by localhost (mail.openmailbox.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id QiYJg0Gmvhh6 for <tor-talk@lists.torproject.org>;
 Thu, 11 Jun 2015 13:52:40 +0200 (CEST)
Received: from www.openmailbox.org (mail2.openmailbox.org [62.4.1.33])
 by mail2.openmailbox.org (Postfix) with ESMTP id 3092C202F26
 for <tor-talk@lists.torproject.org>; Thu, 11 Jun 2015 13:52:40 +0200 (CEST)
MIME-Version: 1.0
Date: Thu, 11 Jun 2015 13:52:40 +0200
From: dtm168@openmailbox.org
To: tor-talk@lists.torproject.org
Message-ID: <2a8f8c25121cbad6b4575ce5ddcd3d57@openmailbox.org>
X-Sender: dtm168@openmailbox.org
User-Agent: Roundcube Webmail/1.0.5
Subject: [tor-talk] Additional hop before connecting to Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi,

You often read that the fact you are using Tor is being monitored by the 
various intelligence services.

I guess this works by recording which IP addresses connect to known 
entry relays and/or directory authorities.

Since you usually also connect to facebook or gmail your identity can be 
easily linked to Tor usage.
This is especially true if you have a static IP address.

Currently I use a virtual server in a foreign country which I pay with 
Bitcoin. I use an ssh tunnel which I use to make connections to Tor, 
i.e. intelligence service see the IP of my server which connects to 
known Tor IP addresses.

1. How likely is it that they look at connecting IP addresses to my 
server (and identify me)?  Probably very likely. Would it help to have 
an additional anon server as an additional hop to Tor?

2. Tor traffic has these characteristic traffic signatures (packet size, 
timings of packets when idle). Would these also "shine through" the ssh 
tunnel?

3. I guess making that server a private bridge will be worse than using 
ssh because of these typical Tor traffic patterns.

4. I am also afraid of running a Tor relay on my home internet 
connections because all members of my family who share that IP will be 
flagged as Tor users...

I am interested to hear your opinions.

Cheers,
dtm168


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

