• Why can't you get on another vpn when you're already on vpn?

    From david@21:1/5 to All on Tue Sep 3 14:39:47 2024
    XPost: comp.sys.mac.system, alt.os.linux

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to david on Tue Sep 3 20:05:21 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 9/3/24 15:39, david wrote:
    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Theoretically you can.

    Technicalities come into play.

    Most VPNs add a default route to cause all traffic to run through the
    VPN. So when you start the second VPN it alters the default route to go through it thus usurping the first VPN. Humans can be smarter than this
    and work around it.

    The other common problem is related to NAT and the VPN protocol. Some
    NATing routers assume that all traffic for some VPN protocols goes
    specific places (stateful table) and the second VPN breaks this assumption.

    You probably can make multiple VPNs work. It's going to be annoying at
    best and difficult to impossible with wizards.



    --
    Grant. . . .

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to VanguardLH on Tue Sep 3 23:01:48 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 9/3/24 22:16, VanguardLH wrote:
    How are you going to tell the 1st VPN's exit node (that you don't
    know what it will be, or how to send redirection commands to it)
    where to find the 2nd VPN's entry node?

    That all has to do with routing.

    route add ${VPN_1_OUTSIDE_REMOTE_ENDPOINT} via ${ISP_GW}
    route add ${VPN_2_OUTSIDE_REMOTE_ENDPOINT} via
    ${VPN_1_INSIDE_REMOTE_ENDPOINT}
    route add default via ${VPN_2_INSIDE_REMOTE_ENDPOINT}



    Grant. . . .

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From VanguardLH@21:1/5 to david on Tue Sep 3 22:16:49 2024
    XPost: comp.sys.mac.system, alt.os.linux

    david <this@is.invalid> wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    How are you going to tell the 1st VPN's exit node (that you don't know
    what it will be, or how to send redirection commands to it) where to
    find the 2nd VPN's entry node?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Your Name@21:1/5 to Grant Taylor on Wed Sep 4 17:47:26 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 2024-09-04 01:05:21 +0000, Grant Taylor said:
    On 9/3/24 15:39, david wrote:
    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Theoretically you can.

    Technicalities come into play.

    Most VPNs add a default route to cause all traffic to run through the
    VPN. So when you start the second VPN it alters the default route to
    go through it thus usurping the first VPN. Humans can be smarter than
    this and work around it.

    The other common problem is related to NAT and the VPN protocol. Some
    NATing routers assume that all traffic for some VPN protocols goes
    specific places (stateful table) and the second VPN breaks this
    assumption.

    You probably can make multiple VPNs work. It's going to be annoying at
    best and difficult to impossible with wizards.

    Doesn't tak much wizardry really. Start a normal VPN under MacOS. Open
    your web browser and use a web-based VPN to then visti a website.
    You've got a double VPN. You could use that web0-based VPN to visit
    another web-based VPN, getting a triple VPN.

    Of course, each layer you add slows down your connection to the final
    website because it has to go through all those VPN systems. It's also
    pretty pointless (despite what crime-tech dramas like to use in their storylines about people hackers bouncing their conneciton all around
    the world).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Harry S Robins@21:1/5 to Your Name on Wed Sep 4 01:05:43 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On Wed, 4 Sep 2024 17:47:26 +1200, Your Name wrote:

    Open your web browser and use a web-based VPN to then visit a website.
    You've got a double VPN.

    Everyone already does that using the free Epic or Opera VPN browsers. https://epicbrowser.com/
    https://www.opera.com/features/free-vpn

    But what the OP is asking about is system-wide VPN, not browser VPN.
    Grant is answering the question of system-wide double VPN'ing.

    It would be nice to see an example of that working with one of the many available no-registration free VPNs out there, such as "vpngate.net".

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bill Powell@21:1/5 to Harry S Robins on Wed Sep 4 08:10:10 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On Wed, 4 Sep 2024 01:05:43 -0500, Harry S Robins wrote:

    Grant is answering the question of system-wide double VPN'ing.

    It would be nice to see an example of that working with one of the many available no-registration free VPNs out there, such as "vpngate.net".

    I'd like to see this vpn inside of vpn example running with one of the main free vpns like tunnelbear or vanwa.tech or protonvpn or freeopenvpn.org.

    If vpn inside of vpn actually works, it should work with one of those.

    None of them require registration so you don't have to physically agree to
    any of their terms, nor do you pay them, nor do you even need to register a credit card and they don't know what IP address you'll be coming from ahead
    of time, so they can't lock you out for coming from some other IP address
    like Google mail does when you use VPN.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Your Name@21:1/5 to Harry S Robins on Wed Sep 4 19:28:40 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 2024-09-04 06:05:43 +0000, Harry S Robins said:
    On Wed, 4 Sep 2024 17:47:26 +1200, Your Name wrote:

    Open your web browser and use a web-based VPN to then visit a website.
    You've got a double VPN.

    Everyone already does that using the free Epic or Opera VPN browsers. https://epicbrowser.com/
    https://www.opera.com/features/free-vpn

    But what the OP is asking about is system-wide VPN, not browser VPN.
    Grant is answering the question of system-wide double VPN'ing.

    It would be nice to see an example of that working with one of the many available no-registration free VPNs out there, such as "vpngate.net".

    I was answering the statement that you cannot use mutliple VPNs without
    some sort of wizardry. As I said, you can set-up a system wide VPN and
    *then* use a web-based VPN within the browser - that gives you a double
    VPN. Keep chain-linking web-based VPNs and you'll have multiple VPN
    layers. It's relatively easy and requires no wizardry, but is rather
    pointless.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J.O. Aho@21:1/5 to Harry S Robins on Wed Sep 4 12:10:10 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 04/09/2024 08.05, Harry S Robins wrote:
    On Wed, 4 Sep 2024 17:47:26 +1200, Your Name wrote:

    Open your web browser and use a web-based VPN to then visit a website.
    You've got a double VPN.

    Everyone already does that using the free Epic or Opera VPN browsers. https://epicbrowser.com/
    https://www.opera.com/features/free-vpn

    But what the OP is asking about is system-wide VPN, not browser VPN.
    Grant is answering the question of system-wide double VPN'ing.

    It would be nice to see an example of that working with one of the many available no-registration free VPNs out there, such as "vpngate.net".

    I guess this would be "simple" with a distribution like QubeOS, you
    should be a able to have one gateway-container that connects over vpn,
    then another one uses that gateway-container as it's gateway and setup
    it's own vpn and then you say other applications will use the last
    gaterway container as the gateway to the internet.

    For those that don't want to use QubeOS or don't want to experiment with containers of different types, then I would suggest use your routers vpn feature to setup first vpn (sure you need a bit better than just the
    cheapest one from alibaba), then you can set up your vpn as usually.

    This feels like you don't trust the first vpn but you trust the second
    one, then use the second one directly.

    --
    //Aho

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to J.O. Aho on Wed Sep 4 09:04:22 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On Wed, 9/4/2024 6:10 AM, J.O. Aho wrote:


    This feels like you don't trust the first vpn but you trust the second one, then use the second one directly.

    It's an attempt to "go through seven proxies" :-)

    "Don't worry I'm behind 7 proxies"

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David Brooks@21:1/5 to Paul on Wed Sep 4 16:12:35 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 04/09/2024 14:04, Paul wrote:
    <snip>
    Paul

    Hello Paul

    I've tried not to bother you for quite some time now! 🙂

    Right now, I simply wish to report that my cyber-friend, for many years,
    Philip 'Philo' Kastner, who lived in Milwaukee, Wisconsin, USA, was
    found dead on the floor of his workshop last week.

    He will be sadly missed.

    https://www.facebook.com/philip.kassner

    --
    Kind regards,
    David

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to david on Wed Sep 4 15:21:09 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 2024-09-03, david <this@is.invalid> wrote:
    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    What would be the benefit of doing that?

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marco Moock@21:1/5 to All on Thu Sep 5 23:35:39 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 03.09.2024 um 14:39 Uhr david wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    It is possible to do so with specific routing rules because VPN works
    at the routing level.

    You may need to change the routing table.

    E.g. you have a VPN-Server 1 on 2001:db8::1, you need a routing table
    entry like
    2001:db8::1/128 via - normal default router

    This will make sure traffic to VPN1 goes through the normal connection.

    Then you need VPN on 2001:db8:2::2.
    You now need a rule
    2001:db8:2::2/128 via <Tunnel-dev on VPN 1>

    From this one you get a default route (::/0) that goes through the
    VPN tunnel 2 device.

    ::/0 dev-vpn-tun2

    --
    kind regards
    Marco

    Send spam to 1725367187muell@cartoonies.org

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Bill Powell on Fri Sep 6 19:26:50 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 9/4/24 01:10, Bill Powell wrote:
    If vpn inside of vpn actually works, it should work with one of those.

    Using multiple VPNs that use the same protocol is almost certainly
    technically possible.

    But using different protocols will make configuration considerably easier.

    E.g. IPsec / OpenVPN / Wireguard



    --
    Grant. . . .

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From micky@21:1/5 to this@is.invalid on Sun Sep 8 00:20:15 2024
    XPost: comp.sys.mac.system, alt.os.linux

    In alt.comp.os.windows-10, on Tue, 3 Sep 2024 14:39:47 -0600, david <this@is.invalid> wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Why can't you have a girlfriend when you've already got a girlfriend?

    ...Oh, wait.

    Why can't you be riding on one train when you're already riding on
    another train? Yeah, let's go with that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Your Name@21:1/5 to micky on Sun Sep 8 17:39:34 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 2024-09-08 04:20:15 +0000, micky said:
    In alt.comp.os.windows-10, on Tue, 3 Sep 2024 14:39:47 -0600, david <this@is.invalid> wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Why can't you have a girlfriend when you've already got a girlfriend?

    ...Oh, wait.

    Why can't you be riding on one train when you're already riding on
    another train? Yeah, let's go with that.

    Technically you can ... if the first train is being carried as cargo by
    a second train. :-p

    But realistically that example doesn't work. It would be more like the
    second train pushing the first train. It's basically a daisy chain of
    VPN servers, each connecting to the next one, so you data has to pass
    through each one in turn.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Your Name on Sun Sep 8 02:19:40 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On Sun, 9/8/2024 1:39 AM, Your Name wrote:
    On 2024-09-08 04:20:15 +0000, micky said:
    In alt.comp.os.windows-10, on Tue, 3 Sep 2024 14:39:47 -0600, david
    <this@is.invalid> wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Why can't you  have a girlfriend when you've already got a girlfriend?

    ...Oh, wait.

    Why can't you be riding on one train when you're already riding on
    another train?   Yeah, let's go with that.

    Technically you can ... if the first train is being carried as cargo by a second train.  :-p

    But realistically that example doesn't work. It would be more like the second train pushing the first train. It's basically a daisy chain of VPN servers, each connecting to the next one, so you data has to pass through each one in turn.


    As long as you're behind seven proxies when playing
    with the trains, you're going to be fine.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J.O. Aho@21:1/5 to david on Sun Sep 8 10:06:04 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 03/09/2024 22.39, david wrote:
    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Yes you can, there is a number of solutions to this. but let's not go
    into details as many of the posts already poked on them.

    The real question is why would you want to do that? You tend to get no
    further "security" of "anonymity" of it. The last VPN will be the one
    that can decipher your traffic anyway.

    --
    //Aho

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Daniel70@21:1/5 to micky on Sun Sep 8 20:14:42 2024
    XPost: comp.sys.mac.system, alt.os.linux

    micky wrote on 8/9/24 2:20 pm:
    In alt.comp.os.windows-10, on Tue, 3 Sep 2024 14:39:47 -0600, david <this@is.invalid> wrote:

    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Why can't you have a girlfriend when you've already got a girlfriend?

    You can, of course you can ...... unless you are meaning Girlfriends
    WITH BENEFITS!! ;-P Some might suggest even then you can.

    ...Oh, wait.

    Why can't you be riding on one train when you're already riding on
    another train? Yeah, let's go with that.

    If one train is 'repositioning' the other train ... then Sure, you can!!
    --
    Daniel

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From D@21:1/5 to J.O. Aho on Sun Sep 8 13:58:39 2024
    On Sun, 8 Sep 2024 10:06:04 +0200, "J.O. Aho" <user@example.net> wrote:
    On 03/09/2024 22.39, david wrote:
    What I don't get is if you're on your isp, you can get on vpn.
    So why can't you get on another vpn when you're already on vpn?
    Or, maybe, you can?

    Yes you can, there is a number of solutions to this. but let's not go
    into details as many of the posts already poked on them.
    The real question is why would you want to do that? You tend to get no >further "security" of "anonymity" of it. The last VPN will be the one
    that can decipher your traffic anyway.

    too many variables; casual users like myself probably have little
    use for anonymity apart from avoiding website trackers and usenet
    trolls...but some may have more serious concerns about preventing "unauthorized" access to unencrypted content regardless of format
    or function, in such cases "whole message encryption" is strongly
    recommended https://www.danner-net.de/omom/tutorwme.htm see also:

    (using Tor Browser 13.5.3)
    https://support.torproject.org/faq/faq-5/
    Can I use a VPN with Tor?
    Generally speaking, we don't recommend using a VPN with Tor unless
    you're an advanced user who knows how to configure both in a way
    that doesn't compromise your privacy.
    You can find more detailed information about Tor + VPN at our wiki. >https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN
    TorPlusVPN
    Last edited by Alexander Faeroy 4 years ago
    TOC(depth=1)
    Introduction
    There are many discussions on the Tor Mailing list and spread over
    many forums about combining Tor with a VPN, SSH and/or a proxy in
    different variations. X in this article stands for, "either a VPN,
    SSH or proxy". All different ways to combine Tor with X have
    different pros and cons.
    General
    Anonymity and Privacy
    You can very well decrease your anonymity by using VPN/SSH in addition
    to Tor. (Proxies are covered in an extra chapter below.) If you know
    what you are doing you can increase anonymity, security and privacy.
    Most VPN/SSH provider log, there is a money trail, if you can't pay
    really anonymously. (An adversary is always going to probe the weakest
    link first...). A VPN/SSH acts either as a permanent entry or as a
    permanent exit node. This can introduce new risks while solving others.
    Who's your adversary? Against a global adversary with unlimited
    resources more hops make passive attacks (slightly) harder but active
    attacks easier as you are providing more attack surface and send out
    more data that can be used. Against colluding Tor nodes you are safer, >against blackhat hackers who target Tor client code you are safer
    (especially if Tor and VPN run on two different systems). If the VPN/
    SSH server is adversary controlled you weaken the protection provided
    by Tor. If the server is trustworthy you can increase the anonymity
    and/or privacy (depending on set up) provided by Tor.
    VPN/SSH can also be used to circumvent Tor censorship (on your end by
    the ISP or on the service end by blocking known tor exits).
    VPN/SSH versus Proxy
    The connection between you and the VPN/SSH is (in most cases, not all) >encrypted.
    On the other hand the connection between you and an OpenProxy is
    unencrypted. An 'SSL proxy' is in most cases only a http proxy which
    supports the connect method. The connect method was originally
    designed to allow you to use to connect using SSL to webservers but
    other fancy things such as connecting to IRC, SSH, etc. are possible
    as well. Another disadvantage of http(s) proxies is, that some of them, >depending on your network setup, even leak your IP through the 'http >forwarded for' header. (Such proxies are also so called 'non-anonymous >proxies'. While the word anonymous has to be understood with care
    anyway, a single OpenProxy is much worse than Tor).
    Also read Aren't 10 proxies (proxychains) better than Tor with only 3
    hops? - proxychains vs Tor.
    VPN versus SSH or Proxy
    VPN operates on network level. A SSH tunnel can offer a socks5 proxy.
    Proxies operate on application level. These technical details
    introduce their own challenges when combining them with Tor.
    The problematic thing with many VPN users is, the complicated setup.
    They connect to the VPN on a machine, which has direct access to the >internet.
    the VPN user may forget to connect to the VPN first
    without special precautions, when a VPN connection breaks down (VPN
    server reboot, network problems, VPN process crash, etc.), direct
    connections without VPN will be made.
    To fix this issue you can try something like VPN-Firewall.
    When operating on the application level (using SSH tunnel socks5 or
    proxies), the problem is that many applications do not honor the proxy >settings. Have a look into the Torify HOWTO to get an idea.
    The most secure solution to mitigate those issues is to use
    transparent proxying, which is possible for VPN, SSH and proxies.
    You -> X -> Tor
    Some people under some circumstances (country, provider) are forced to
    use a VPN or a proxy to connect to the internet. Other people want to
    do that for other reasons, which we will also discuss.
    You -> VPN/SSH -> Tor
    You can route Tor through VPN/SSH services. That might prevent your
    ISP etc from seeing that you're using Tor (VPN/SSH Fingerprinting
    below). On one hand, VPNs are more popular than Tor, so you won't
    stand out as much, on the other hand, in some countries replacing an >encrypted Tor connection with an encrypted VPN or SSH connection, will
    be suspicious as well. SSH tunnels are not so popular.
    Once the VPN client has connected, the VPN tunnel will be the
    machine's default Internet connection, and TBB (Tor Browser Bundle)
    (or Tor client) will route through it.
    This can be a fine idea, assuming your VPN/SSH provider's network is
    in fact sufficiently safer than your own network.
    Another advantage here is that it prevents Tor from seeing who you are
    behind the VPN/SSH. So if somebody does manage to break Tor and learn
    the IP address your traffic is coming from, but your VPN/SSH was
    actually following through on their promises (they won't watch, they
    won't remember, and they will somehow magically make it so nobody else
    is watching either), then you'll be better off.
    You -> Proxy -> Tor
    This does not prevent your ISP etc from seeing that you're using Tor
    because the connection between your and the proxy is not encrypted.
    Sometimes this prevents Tor from seeing who you are depending on the >configuration on the side of the proxy server. So if somebody does
    manage to break Tor and learn the IP address your traffic is coming
    from, but your proxy does not log an the attacker didn't see the
    unencrypted connection between your and the proxy, then you'll be
    better off.
    You -> Tor -> X
    This is generally a really poor plan.
    Some people do this to evade Tor bans in many places. (When Tor exit
    nodes are blacklisted by the remote server.)
    (Read first for understanding: How often does Tor change its paths?.) >Normally Tor switches frequently its path through the network. When
    you choose a permanent destination X, you give away this advantage,
    which may have serious repercussions for your anonymity.
    You -> Tor -> VPN/SSH
    You can also route VPN/SSH services through Tor. That hides and
    secures your Internet activity from Tor exit nodes. Although you are
    exposed to VPN/SSH exit nodes, you at least get to choose them. If
    you're using VPN/SSHs in this way, you'll want to pay for them
    anonymously (cash in the mail [beware of your fingerprint and printer >fingerprint], Liberty Reserve, well-laundered Bitcoin, etc).
    However, you can't readily do this without using virtual machines. And
    you'll need to use TCP mode for the VPNs (to route through Tor). In
    our experience, establishing VPN connections through Tor is chancy,
    and requires much tweaking.
    Even if you pay for them anonymously, you're making a bottleneck where
    all your traffic goes -- the VPN/SSH can build a profile of everything
    you do, and over time that will probably be really dangerous.
    You -> Tor -> Proxy
    You can also route proxy connections through Tor. That does not hide
    and secure your Internet activity from Tor exit nodes because the
    connection between the exit node to the proxy is not encrypted, not
    one, but two parties may log and manipulate your clear traffic now. If
    you're using proxies in this way, you'll want to pay for them
    anonymously (cash in the mail [beware of your fingerprint and printer >fingerprint], Liberty Reserve, well-laundered Bitcoin, etc) or use
    free proxies.
    One way to do that is proxychains. Another way would be to use a
    Transparent Proxy and then either proxify (set proxy settings) or
    socksify (use helper applications to force your application to use a
    proxy) the programs you want to chain inside your Transparent Proxy
    client machine.
    You -> X -> Tor -> X
    No research whether this is technically possible. Remember that this
    is likely a very poor plan because [#You-Tor-X you -> Tor -> X] is
    already a really poor plan.
    You -> your own (local) VPN server -> Tor
    This is different from above. You do not have to pay a VPN provider
    here as you host your own local VPN server. This won't protect you
    from your ISP of seeing you connect to Tor and this also won't
    protect you from spying Tor exit servers.
    This is done to enforce, that all your traffic routes through Tor
    without any leaks. Further read: TorVPN. If you want this, it may
    unnecessary to use VPN, a simple Tor-Gateway may be easier, for
    example Whonix.
    VPN/SSH Fingerprinting
    Using a VPN or SSH does not provide strong guarantees of hiding your
    the fact you are using Tor from your ISP. VPN's and SSH's are
    vulnerable to an attack called Website traffic fingerprinting ^1^. Very >briefly, it's a passive eavesdropping attack, although the adversary
    only watches encrypted traffic from the VPN or SSH, the adversary can
    still guess what website is being visited, because all websites have
    specific traffic patterns. The content of the transmission is still
    hidden, but to which website one connects to isn't secret anymore.
    There are multiple research papers on that topic. ^2^ Once the premise
    is accepted, that VPN's and SSH's can leak which website one is
    visiting with a high accuracy, it's not difficult to imagine, that
    also encrypted Tor traffic hidden by a VPN's or SSH's could be
    classified. There are no research papers on that topic.
    What about Proxy Fingerprinting? It has been said above already, that >connections to proxies are not encrypted, therefore this attack isn't
    even required against proxies, since proxies can not hide the fact,
    you're using Tor anyway.
    ,, ^1^ See Tor Browser Design for a general definition and
    introduction into Website traffic fingerprinting.
    ^2^ See slides for Touching from a Distance: Website Fingerprinting
    Attacks and Defenses. There is also a research paper from those
    authors. Unfortunately, it's not free. However, you can find free ones
    using search engines. Good search terms include "Website Fingerprinting
    VPN". You'll find multiple research papers on that topic.
    [end quote]

    for windows 10/11, recommend using tor browser with default settings
    and duckduckgo for search . . . but for windows 7/8, recommend using
    omnimix tor with another browser e.g. pale moon, kmeleon etc., since
    tor browser will no longer be supported after 1 october (next month);

    while most websites will open in tor browser, including "google.com",
    some websites will not, so using the most current windows 11 firefox,
    edge or other "mainstream" browser is recommended; test your browser:

    (using Tor Browser 13.5.3)
    https://duckduckgo.com/?q=browser+fingerprint+test
    ...
    https://coveryourtracks.eff.org/
    Test your browser to see how well you are protected from tracking and >fingerprinting:
    TEST YOUR BROWSER
    https://coveryourtracks.eff.org/kcarter?aat=1
    Test with a real tracking company ?
    Our tests indicate that you have strong protection against Web tracking.
    ...
    How does tracking technology follow your trail around the web, even if
    you've taken protective measures? Cover Your Tracks shows you how trackers >see your browser. It provides you with an overview of your browser's most >unique and identifying characteristics.
    Only anonymous data will be collected through this site.
    Want to learn more about tracking? Read how it works with our guide:
    LEARN MORE ABOUT FINGERPRINTING
    https://coveryourtracks.eff.org/learn
    ...
    (cf. any browser using Omnimix' built-in Tor)
    Our tests indicate that you have strong protection against Web tracking.
    ...
    (cf. any browser not using Tor)
    Our tests indicate that you are not protected against tracking on the Web. [end quote]

    (using Tor Browser 13.5.3)
    https://check.torproject.org/
    Congratulations. This browser is configured to use Tor.
    Your IP address appears to be: ###.###.###.###
    ...
    (cf. any browser using Omnimix' built-in Tor)
    Congratulations. This browser is configured to use Tor.
    Your IP address appears to be: ###.###.###.###
    However, it does not appear to be Tor Browser.
    Click here to go to the download page
    https://www.torproject.org/download/
    ...
    (cf. any browser not using Tor)
    Sorry. You are not using Tor.
    Your IP address appears to be: ###.###.###.###
    [end quote]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From david@21:1/5 to J.O. Aho on Sun Sep 8 11:39:28 2024
    XPost: comp.sys.mac.system, alt.os.linux

    Using <news:lk547cFesj4U1@mid.individual.net>, J.O. Aho wrote:

    The real question is why would you want to do that? You tend to get no further "security" of "anonymity" of it. The last VPN will be the one
    that can decipher your traffic anyway.

    Thank you and everyone for trying to point out that supposed futility.

    Maybe I fundamentally misunderstand everyone who said what you said, which
    is that the last VPN will be able to decipher your traffic no matter what.

    But isn't that dead wrong?

    Isn't that what double NAT'ing does, or, more to the point, TOR?

    I mean, isolating the nodes is what TOR does (among other things, of
    course, including a different encryption scheme for each TOR node).

    Why does it work perfectly for TOR and not work at all for VPN?
    Makes no sense to me that what works for TOR won't work for VPN.

    Maybe I misunderstand you when you say the last VPN node knows what you're doing, just as the last TOR exit node knows what you're doing.

    The anonymity part is that this last node doesn't know WHO you are.

    To be clear, whether it's TOR or VPN, if you have a node between you and
    that TOR node or VPN server, then they don't know who you are, I thought.

    TOR -> Node 1 -> Node 2 -> Node 3 -> google
    {Node 3 doesn't know your IP address which only Node 1 knows}
    {All google knows is the IP address of Node 3)
    {The encryption scheme is isolated between nodes}

    VPN -> VPN server 1 -> VPN server 2 -> https://Epic/Opera -> google
    {Server 2 doesn't know your IP address which only server 1 knows}
    {All google knows is the IP address of Epic/Opera)'
    {All Epic/Opera know is the IP address of VPN server 2)\
    {The encryption scheme is isolated between nodes}

    Or am I wrong?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J.O. Aho@21:1/5 to david on Sun Sep 8 20:15:58 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 08/09/2024 19.39, david wrote:
    Using <news:lk547cFesj4U1@mid.individual.net>, J.O. Aho wrote:

    The real question is why would you want to do that? You tend to get no
    further "security" of "anonymity" of it. The last VPN will be the one
    that can decipher your traffic anyway.

    Thank you and everyone for trying to point out that supposed futility.

    Maybe I fundamentally misunderstand everyone who said what you said, which
    is that the last VPN will be able to decipher your traffic no matter what.

    Exit points will be decrypting the data and forward the traffic to the
    intended server, then encrypt the reply and send it back. Sure this
    don't mean they will automatically be a man in the middle, but they know
    what server you tried to connect with, they may know what DNS requests
    (at least know which name server you used) you done if they go use the
    VPN/TOR.

    But isn't that dead wrong?

    Isn't that what double NAT'ing does, or, more to the point, TOR?

    It's just a try to hide the source, it don't hide the data you send, so
    if you use TOR and you use the same exit point for a number of requests
    they will know what you may be doing. There are or have been methods for
    exit nodes to figure out the origin, which nullifies the point of TOR.


    Why does it work perfectly for TOR and not work at all for VPN?

    They work differently

    When you tunnel a vpn over another vpn, it just makes the outer vpn to
    keep your data one layer encrypted from you to the server of that vpn
    (they will know which vpn you connect to), the there is the second
    layer between the two vpns, the last vpn will know more or less
    everything about you, so you don't get anything else than just an extra encryption of your date for a limited distance.

    Unless your end vpn uses a really crappy encryption, you will not gain
    any benefit from running vpn trough a vpn, just remember that the crappy encryption will still be there between the two vpns. The best is to just connect to the vpn you trust the most directly.

    1
    2 3
    (you) EEEEEEEEEEEEEEEEEE> vpn1 ===============> vpn2 ----------------------------->(site)

    Assuming the site you connect to uses https

    1. Your ISP will know you use VPN1
    Your data is encrypted 3 times

    2. VPN1 knows that you use VPN2
    The data is encrypted 2 times

    3. VPN2 knows which IP and most likely the domain name too you connect to
    The data is encrypted once


    Assume the site is just using http

    1. Your ISP will know you use VPN1
    Your data is encrypted twice

    2. VPN1 knows that you use VPN2
    The data is encrypted

    3. VPN2 can read your traffic
    The data is in plain text from the VPN2 to the site

    In all the cases the VPNs know your IP.


    --
    //Aho

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to J.O. Aho on Sun Sep 8 15:57:15 2024
    XPost: comp.sys.mac.system, alt.os.linux

    On 9/8/24 13:15, J.O. Aho wrote:
    In all the cases the VPNs know your IP.

    I question the veracity of that.

    Using your example:

    (you) EEEEEEEEEEEEEEEEEE> vpn1 ===============> vpn2 ----------------------------->(site)

    vpn1 knows (you) as the source and vpn2 the destination

    vpn2 knows vpn1 as the source and (site) as the destination

    (site) knows vpn2 as the source and itself as the destination

    Depending on the type of business arrangement you have with vpn2, they
    may not have any personally identifiable information about you and as
    such can't correlate who you are independent of your source IP.

    We see this type of nesting with Tor and Oblivious DoH.



    --
    Grant. . . .

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)