Tor_and_The_Dark_Net_Remain_Anonymous_and_Evade_NSA_Spying_by_James
Tor
Tor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
HIDING TOR FROM YOUR ISP – PART
1 – BRIDGES AND PLUGGABLE
TRANSPORTS
People are more worried about hiding their tor usage from their ISP, than hiding it from a
VPN. There seems to be a back and forth debate about whether using a VPN will or will
not protect you. Whether or not the VPN can be convinced to log your connection, and so
forth. Those who rely on VPNs to protect them are historically known to end up in jail.
In my previous chapter about VPN -> TOR and TOR -> VPN, I tried to remain neutral in
that you should be able to make your own decisions about how you wish to protect
yourself. But just remember, at the end of the day, nobody is going to go to jail for you. If
you simply want to hide the fact that you are using tor from your ISP, then we have other
options than a VPN. We have bridges, and several different pluggable transports. What are
these, and how can we use them in Tails?
“What bridges are and when to use them
When using Tor with Tails in its default configuration, anyone who can observe the
traffic of your Internet connection (for example your Internet Service Provider and
perhaps your government and law enforcement agencies) can know that you are
using Tor.
This may be an issue if you are in a country where the following applies:
1. Using Tor is blocked by censorship: since all connections to the Internet are
forced to go through Tor, this would render Tails useless for everything except for
working offline on documents, etc.
2. Using Tor is dangerous or considered suspicious: in this case starting Tails in its
default configuration might get you into serious trouble.
Tor bridges, also called Tor bridge relays, are alternative entry points to the Tor
network that are not all listed publicly. Using a bridge makes it harder, but not
impossible, for your Internet Service Provider to know that you are using Tor.”
https://tails.boum.org/doc/first_steps/startup_options/bridge_mode/index.en.html
The first thing we are going to do is get some bridges. Let us do this before we configure
Tails to use bridges, because once Tails is in bridge mode, we will not be able to connect
to tor without working bridges. So the first thing we want to do is visit the following
webpage.
https://bridges.torproject.org/bridges
Enter the impossibly difficult captcha, and click “I am human”, and you should get a list
of bridges that look like this. These are actual bridges pulled from the tor bridges page.