Answer the question
In order to leave comments, you need to log in
How to hide real ip when using telephony(sip)?
There is a task. Hide real ip address when using ip-telephony . Moreover, options with vpn (double, triple, etc.) are not considered. This whole tangle can be unraveled. I originally wanted to send voice traffic through tor or i2p. The problem is that the resulting technology is unstable. When using the same torus when rebuilding chains, the connection naturally breaks. Then an idea arose. What if you take several of your servers , raise your relays and output node there and disable chain rebuilding, for example.
In this case, we say goodbye to security?! Or not?! Because after the creation of repeaters, they will also be publicly available and people using Tor will use one of several servers to build their chain in Tor. We will always use the same chain , and in theory, if they begin to unravel the chain of the torus (the very principle of the "onion" will interfere with this), then a bunch of connections will come to each server and it will not be possible to understand who is coming from.
Or am I thinking wrong? I just don't really rummage in the torus and traffic.Therefore, I would like to hear advice from a specialist.PS
I immediately want to discard the options: why do you need it, no one will bother, use vpn
Answer the question
In order to leave comments, you need to log in
But what if you make your own repeater, which will emulate the side of the opponent.
You install 2 such repeaters, and between them traffic can go any way and anywhere. And even tear.
That. The images of the opponent have a permanent connection with each other (the repeater), and the internal implementation of the transport - this should not bother any of the subscribers.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question