Open tim1234567 opened 4 years ago
See #1605.
In my case, I redirect all traffic to Tor transport port creating your own tor network
See #1605.
That partially solves the case, but better than nothing. Thanks!
In my case, I redirect all traffic to Tor transport port creating your own tor network
An interesting approach to tackle the problem, I'll take a look. Thanks!
Is your feature request related to a problem? Please describe. Advertisers and malicious actors can map your IP address with websites you visit. If an attacker can get control of the VPN server, or monitor the network of the server, they will be able to match VPN clients with their traffic, nullifying the privacy benefits of the VPN. In case of Algo it's even more important: all traffic from server's IP address completely belongs to VPN owner.
Such timing/correlation attacks are not difficult to accomplish. In countries with restrictive Internet regulations (China, Russia, Iran, Turkey, etc), or countries with broad surveillance powers (USA, UK, etc), state surveillance agencies typically have the legal ability to coerce either the VPN provider, or the network/server provider of the VPN provider, to assist with such network monitoring.
Describe the solution you'd like Create three instances of Algo in different locations and route all traffic through each of these servers (similar to Tor). For example:
Describe alternatives you've considered Similar solution is used by ProtonVPN Secure Core: https://protonvpn.com/support/secure-core-vpn/