M
M
Mellowtoy2016-06-11 02:53:22
VPN
Mellowtoy, 2016-06-11 02:53:22

TOR + VPN: Will there be encrypted traffic all the way?

Good afternoon!
As far as I know, if you work only through TOR and exchange data with the resource not via https, then there is a possibility of intercepting data at the output node of the TOR network.
What if you use the Internet connection scheme via TOR + VPN, will the problem of possible interception of data on the output node be solved in this case? Will the data be encrypted along the way? What will the provider see in this case?
Thank you.

Answer the question

In order to leave comments, you need to log in

1 answer(s)
X
xmoonlight, 2016-06-11
@xmoonlight

Will the problem of possible interception of data on the output node be solved in this case?
Are you talking about intercepting or reading data?
If the interception is not solved.
If reading data - depends on the protocol for creating an encrypted connection.
Will the data be encrypted along the way?
Will be only when using a certificate to establish a connection.
What will the provider see in this case?
The entire session of establishing an encrypted connection from you to the input node and the address of the final (requested) node (destination node).
Basic concepts:
Each subsequent node knows the address of the previous one.
The end node is the address of the last (output) node.
Everything that happens BEFORE leaving the 1st node is visible to the provider at a glance.
Therefore, if you connect to your server, it's easier to just use an encrypted connection without TOR.
TOR - only hides the initiating connection (client) IP, using at least a chain of 3 or more TOR nodes and more - nothing.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question