I'm in a hurry so, i describe a little scenario : + Launch a vpn/ssh tunnel service, and secure bind privoxy/proxifier into it. (this one is for scrambling, linearising data) + Launch a system like Privoxy and/or Proxifier ++ Bind several linked proxy (your data will pass thru each of them) + Launch Tor sock service to connect threw it (force connect threw it with Secure Binding in Privoxy or Proxifier, did'nt remember) + A other vpn/ssh tunnel with cipher/crypt techno than the first one ?
With that, you'll have some second of latency. But you'll be hidded, even if tor is break. Timing attack become quasi impossible, beacause of scrambling/linearisation of the vpn/ssh tunnel. Enjoy ? :D 2013/4/4 Ivan Sipka <frka...@gmail.com> > On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud < > guillioud.alexan...@gmail.com> wrote: > > > So, if you're paranoïd, or doing something where paranoïd behavior is > > requested, use a vpn inside and outside tor. > > Use linked proxy's on top of this. You'll be fine. > > > > could you elaborate on this a bit more please? > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk