Thread: pf.conf help?
View Single Post
Old 23rd January 2018
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

Quote:
Originally Posted by Prevet View Post
They also offer Tor use with the VPN. You connect to them with Tor so not even they know who you are.
That *is* Interesting. Though up above you previously discredited Tor.
Quote:
Originally Posted by e1-531g View Post
...If it is from the outside and many connecting people are using that I think it would be not enough to be seen as ultimate proof/evidence for doing something. Maybe a clue, but not as 100% incriminating evidence.
I think it depends on the degree of certainty any investigator may have, and I agree that it might be considered a corroboration, but that consideration may depend on jurisdiction.
Quote:
Without logs from the inside we don't know which output connection maps to which input connection.
In my example above, I chose an investigator with logs of both public and VPN traffic. Easy enough to obtain for any state actor.
Quote:
...this is not a case where police is going to put significant resource to track somebody.
And that is the hammer on the nail's head. What is the investigating party's cost/benefit analysis?
Reply With Quote