Hello!
I’ve had that same question myself. One solution I have been thinking about is the use of a VPN-esque system like “Yggdrasil Network” which was apparently based on another project called “cjdns.”
This software allows you to deploy your own end to end encrypted IPV6 network on top of the existing internet.
It’s open source, lightweight and is super easy to configure. Each computer gets its own public key.
The idea is to set up a Tor bridge with a listener on Yggdrasil, and use Yggdrasil to connect to the bridge. An adversary would just see Yggdrasil and the directly connected Yggdrasil peers.
You might be able to hide from adversaries looking for Tor, and adversaries looking for VPN traffic. It’s a different protocol. Adversaries would still see unknown encrypted traffic though.
With all of that being said...
I didn’t know about the Tor pluggable transports. That would be superior to a VPN or Yggdrasil as transports to Tor.
Britney
On Jun 3, 2019, at 12:54 PM, wayward waywardwyrd@riseup.net wrote:
Hey, community!
I've written up a sort of harm-reduction-style document about how to hide the fact that you're using Tor (in the case where you need to). This is meant to show people alternatives to using a VPN together with Tor. I've also linked to some previous resources written by Tor contributors and members of the community, so that readers can learn more about why using a VPN with Tor isn't necessarily a good idea.
All this to say that I'd love to hear any feedback on this document. If you'd like to chip in, please take a look at the draft here: https://pad.riseup.net/p/torvpnreview-keep
My goal is to send this off for translation by Friday, June 7th. If you have any comments, please send them to me by email or via this thread before then.
Thanks!
- wayward
--
pronouns: she/they
tor-community-team mailing list tor-community-team@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-community-team