Jump to content


Photo

Tor over AirVPN - Tor entry node always the same

Tor AirVPN

Best Answer Phoenix3, 09 November 2017 - 01:05 PM

Tor was up-to-date.

 

The fixed entry node is a new feature called entry guards aimed at preventing locating Tor hidden servers.

Go to the full post


  • Please log in to reply
5 replies to this topic

#1 Phoenix3

Phoenix3

    Newbie

  • Members
  • Pip
  • 7 posts

Posted 08 November 2017 - 03:25 PM

I upgraded to 2.13.6 and since then I noticed the Tor entry node remains constant regardless of what I try.

 

Shouldn't the Tor circuit "This browser" to first Tor node change whenever I request a new Tor circuit?

 

Does this mean Tor browser does not go through AirVPN first?

 

How can I fix this? :good:



#2 zhang888

zhang888

    Donald Trump of IT/Security

  • Moderators
  • 2205 posts

Posted 08 November 2017 - 09:11 PM

Tor over VPN has nothing to do with your underline ISP, which is in this case the VPN tunnel.

Make sure to upgrade Tor Browser to the latest version as well, some nodes may refuse older clients.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.


#3 Phoenix3

Phoenix3

    Newbie

  • Members
  • Pip
  • 7 posts

Posted 09 November 2017 - 01:05 PM   Best Answer

Tor was up-to-date.

 

The fixed entry node is a new feature called entry guards aimed at preventing locating Tor hidden servers.



#4 iwih2gk

iwih2gk

    Advanced Member

  • Members
  • PipPipPip
  • 274 posts

Posted 09 November 2017 - 10:44 PM

Tor was up-to-date.

 

The fixed entry node is a new feature called entry guards aimed at preventing locating Tor hidden servers.

 

 

Just to explain for the OP.  Gov agencies with great power can jam up the TOR network in a way where many normal entry servers are busy and conveniently their servers are available for you to connect to.  Then they do the same thing on the exit node server.  If a 3 letter agency gains control of your entry AND your exit relay SIMULTANEOUSLY they can completely unmask you in short order.  Many/some advanced users edit their torrc files to only permit entry servers they KNOW.  This is a debatable practice but in either regard it prevents traffic capture available to an "agency" with control of entry and exit nodes.  Your TOR bundle doesn't limit you to ONE entry forever, but it does prevent random cycling through tons of relays, where you could be captured as described above.



#5 Phoenix3

Phoenix3

    Newbie

  • Members
  • Pip
  • 7 posts

Posted 10 November 2017 - 08:05 PM

What are the pros and cons of using a fixed set of entry nodes, possibly those funded by AirVPN for added trustworthiness?



#6 OmniNegro

OmniNegro

    Advanced Member

  • Members
  • PipPipPip
  • 277 posts
  • LocationThe Fiery Pits of Texas, USA.

Posted 30 December 2017 - 01:37 AM

It is all a matter of who you trust more. Do you trust a random alphabet soup agency with an interest in depriving you of your privacy "for your protection"? Or would you trust your own choice of entry nodes more? I doubt many here would pick the former, and that is a good thing. Choose wisely.


Debugging is at least twice as hard as writing the program in the first place.

So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it.






Similar Topics Collapse


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Servers online. Online Sessions: 13451 - BW: 39631 Mbit/sYour IP: 54.224.11.137Guest Access.