Domain changed to archive.palanq.win . Feb 14-25 still awaits import.
[2 / 2 / ?]

Security Question

No.816326 View ViewReplyOriginalReport
Say a desktop is tethered to a mobile device for a wired internet connection, rather than connected directly to a router via Wi-Fi or LAN cable.

Case 1: the mobile device is connected only to its own service provider's 3G/4GLTE/5G cell towers

Case 2: the mobile device is connected to its cell service like above and simultaneously to a home Wi-FI network hosted by some Internet router.

Now my understanding of encryption via Tor/Onion browsers and VPNs is that you either have your destination encrypted upon leaving your device (tor/onion), and/or you have your destination hidden from your destination (VPN/Proxy) and its up to your middleman to decide if you are really going to be anonymous to your destination. Its safe to trust that between your middleman like your proxy or vpn and your destination that no one will eaves drop on communication unless someone impersonates the website your trying to visit, but how exactly does someone eavesdropping on you between you and your VPN/Proxy not know what you're doing, for example, when you submit to your proxy or VPN towards its client side where you want its server side to go?

Secondly, what are the potential security complications and vulnerabilities with using a VPN/Proxy via a tethered mobile device thats simultaneously connected to both Wi-Fi and cell carrier service?
Im aware that some creative thigns can be done that wear away at anonymity when using tor, for example, seeing the file size or size in general of messages bouncing around a onion network and matching up the times of those messages can hint at a possible set of servers that the message took which implicate who the tor client is that visited a certain site.

Just got to thinking that perhaps being connected to wifi and cell service simultaneously could complicated the status of security more than i initally thought, perhaps someones got some insight on this.