can you identify a vpn or tor user?

5 Antworten [Letzter Beitrag]
tonlee
Offline
Beigetreten: 09/08/2014

https://www.reuters.com/article/us-russia-internet-idUSKBN1AF0QI?feedType=RSS&feedName=technologyNews&utm_source=Twitter&utm_medium=Social&utm_campaign=Feed%3A+reuters%2Fte...

Countries which prohibit vpn and tor, can they identify a vpn user?
I guess a tor user cannot be identified.

https://en.wikipedia.org/wiki/Mass_surveillance_in_Russia#SORM. I assume india, china have equal systems. As well as a lot of other repressive governments.

SuperTramp83

I am a translator!

Offline
Beigetreten: 10/31/2014

Of course, your ISP knows you are using a VPN (dem packets aren't gonna go from u to your VPN provider by sheer magic :P), they will see only gibberish encrypted data though, they won't know what you visit or download if you set everything correctly. But if this is not the case things are actually much worse. Consider the DNS leaks. If your VPN suffers from DNS leaks your ISP will also know the websites you visit, as the DNS requests are still going through your ISP (this is usually the case, very few people change their DNS server).

Your ISP will also know that you use Tor, unless VPN before or bridges.

In any case, do not trust your ISP, they are not trustworthy and in many countries are subject to despicable laws, requiring them to log everything you do, and they **will** bend very easily when power knocks at their door. Same applies to the VPN provider. Always give this for granted: they all log, indefinitely. Better be a pessimist (realist is a better term though) than a gullible chimp, right?

Your best bet is, if it is not illegal in your country, for sensitive communication/information and in general - use Tor. Tor doesn't log.

Sasaki
Offline
Beigetreten: 08/11/2014

*Your ISP will also know that you use Tor, unless VPN before or bridges.*

Or unless you setup tor correctly to hide your connection to the ISP. A documentation page about this option does exist on the tor website, but I forgot it's name so I can't retrieve it.

Anyone knows ?

Mangy Dog

I am a member!

I am a translator!

Offline
Beigetreten: 03/15/2015

How to configure Tor Bridges Trisquel documentation (French)[needs to be translated]
https://trisquel.info/fr/wiki/installer-tor-browser-et-configurer-un-bridge

obfs4 is currently the most effective transport to bypass censorship
https://www.torproject.org/docs/pluggable-transports
https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports/obfs4proxy

OpenVPN
One approach, which is offered by AirVPN, uses stunnel. The other, which is offered by iVPN, uses obfsproxy (developed by the Tor Project). Both tunnel TCP-mode VPN links through an additional SSL layer. I gather that stunnel simulates HTTPS, while obfsproxy can simulate various sorts of SSL connections.Neither approach totally hides OpenVPN. Neither hides packet size or timing, and the OpenVPN handshake is distinctive.
https://www.wilderssecurity.com/threads/ways-to-obfuscate-vpn-connections.363059/

tonlee
Offline
Beigetreten: 09/08/2014

Thanks. Skilled people can still use tor and not be identified by any one?

SuperTramp83

I am a translator!

Offline
Beigetreten: 10/31/2014

>Anyone knows ?

Yeah, bridges.

https://www.torproject.org/docs/bridges

But I remember I once read on their website bridges are not a perfect solution being that if your ISP really wants to analyze deeply your traffic it will know you use Tor even when 'bridges'.. Bridges are mostly used to circumvent Tor censorship. Tor nodes are publicly listed and well known, bridges are not, so to connect to Tor in case your ISP censors you you use a bridge.