Click on Join Now to Sign Up
mkdesu, would you please comment on the above? It would be really nice to hear from Liberte core dev.
Am I allowed to say that this is ignorant Bullshit?
What we don't wantSome users have requested support for VPNs in Tails to "improve" Tor's anonymity. You know, more hops must be better, right?. That's just incorrect -- if anything VPNs make the situation worse since they basically introduce either a permanent entry guard (if the VPN is set up before Tor) or a permanent exit node (if the VPN is accessed through Tor).
In fact, my ISP doesn't block Tor, so i can access it without any bridges. But, my intent is make myself the least suspicious to the relays of my internet route which are under the jurisdiction of the country i'm living in. Primarily, the network path controlled by my ISP.Going through VPN first hides the fact that you use Tor from your ISP. In that case you might also be interested in Tor bridges. You set it up like this: Tor on your anonymized system -> VPN on your router/proxy/host.
One more profit from doing the Tor → VPN juntion as i see it is elimination of the risk of eavesdropping on the exit nodes.Tor → VPN might indeed be useful for reasons such as avoiding site blocks, but is cumbersome to implement correctly.
I mean, in that case you're really much more safe in case somebody's on your tail.
So, Maxim, do you personally see any right solutions to this problem?
Secure Sockets Layer (SSL) VPN (Cisco WebVPN) sessions are secure, the client may still have cookies, browser files, and email attachments remaining after a session is complete. Cisco Secure Desktop (CSD) extends the inherent security of SSL VPN sessions by writing session data in an encrypted format to a special vault area of the client's disk. In addition, this data is removed from the disk at the end of the SSL VPN session
Here is the steps i would advise anyone who has sensitive data
1.download virtual box
2.Spoof the routers MAC address
2. Create A VM then change the MAC address
3.install Cisco Secure Decktop in VM
5.change tor mac address