![]() Why stop at two?Īs you can imagine, even using two VPNs, you’re not totally home and dry.įirstly, by using the same two VPNs every time, there is an obvious pattern to your connections, and therefore a consistency in the trail that an investigator (or a crook) could follow to try to trace you back.įor all that your traffic follows a complicated route, it nevertheless takes the same route every time, so it might be worth the time and effort for a criminal (or a cop) to work backwards through both layers of VPN, even if that means double the amount of hacking or twice as many warrants. In theory, you’d have fulfilled both of the aims above by a sort of divide-and conquer approach, because anyone who wanted to track you back would first need to get decrypted traffic logs from VPN2, and then to get username details from VPN1 before they could start to “join the dots”. So VPN1 would know where your traffic came from and VPN2 would know where it was going, but unless the two providers colluded they’d each know only half the story. You’d encrypt your network traffic for VPN2 to decrypt, then encrypt it again for VPN1 to decrypt, and send it off to VPN1. Why not use two VPNs?Īt this point, you’re probably thinking, “Why not use two VPNs in sequence? In jargon terms, why not build a tunnel-inside-a-tunnel? Your VPN provider therefore essentially becomes your new ISP, with the same degree of visibility into your online life that a regular ISP has. Sure, a VPN makes it difficult for most people to join the dots, but it doesn’t prevent everyone from doing do, for the simple reason that the VPN provider always knows where your requests come from, where they’re going, and what data you ultimately send and receive. So, as you can see, a VPN deals with the first issue listed above: disguising your true location on the network.īut a VPN doesn’t deal with the second issue, namely making it difficult for anyone to “join the dots”. The encrypted connection between your computer is dubbed a VPN tunnel, and is, in theory, invisible to, or at least unsnoopable by, other people online. To make it difficult for anyone to “join the dots” by tracing your web browsing requests back to your computer.Īt this point, you might be thinking, “But that’s exactly what a VPN does, and not just for my browsing but for everything I do online.”Ī VPN ( virtual private network) encrypts all your network traffic and relays it in scrambled form to a VPN server run by your VPN provider, where it’s unscrambled and “injected” onto the internet as if it originated from that VPN server.Īny network replies are therefore received by your VPN provider on your behalf, and delivered back to you in encrypted form.To disguise your true location on the network while you browse, so servers don’t know where you are.The Tor network (Tor is short for the onion router, for reasons that will be obvious in a moment if you imagine an onion coming apart as you peel it), which was originally designed by the US Navy, aims: So let’s look quickly at how Tor works, how crooks (and countries with strict rules about censorship and surveillance) might abuse it, and just how scary the abovementioned headline really is. ![]() That sounds more than just worrying – it makes it sound as though using Tor could be making you even less secure than you already are, and therefore that going back to a regular browser for everything might be an important step. …then one in four of those visits (perhaps more!) will be subject to the purposeful scrutiny of cybercriminals. Loosely speaking, that strapline implies that if you visit a website using Tor, typically in the hope of remaining anonymous and keeping away from unwanted surveillance, censorship or even just plain old web tracking for marketing purposes… 23% of the Tor network’s exit capacity has been attacking Tor users How Malicious Tor Relays are Exploiting Users in 2020 (Part I) Written as an independent research piece by an author going only by nusenu, the story is headlined: ![]() ![]() An article published on the open-to-allcomers blogging site Medium earlier this week has made for some scary headlines.
0 Comments
Leave a Reply. |