How to Me>VPN>TOR>remote website?

Discussion in 'privacy technology' started by ams963, May 21, 2012.

Thread Status:
Not open for further replies.
  1. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Hi,

    I just want to know how can I connect to my vpn through TOR like others do for better privacy as mentioned here, here and here?

    Best Wishes,
    ams963
     
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    That one's easy. Just start your VPN, get and install the Tor Browser Bundle (TBB), and open the TBB browser. Tor (like any other app) will connect through the VPN tunnel.

    To connect to your VPN through Tor, you can either configure the VPN to use the Tor SOCKS proxy (see AirVPN howto) or use VMs ;)
     
  3. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    So that would be tor>vpn>remote website right? And not the one mentioned by others in post #1 right?
     
  4. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    So which one do you think is more safe?
     
  5. redcell

    redcell Registered Member

    Joined:
    Sep 27, 2010
    Posts:
    126
    In simple terms, it connecting TOR thru VPN. Not the other way around.

    Lets say you're running single PC on Windows XP SP3 and decided not to have VM:

    Install your VPN client.
    Install TOR Vidalia bundle.
    Reboot your computer.
    Launch your VPN and login successfully.
    Launch your TOR Vidalia bundle.
    Your IP should reflect that from TOR network.

    Use TOR at your own risk. TOR is not for privacy because it's a nest of hackers trying to take advantage of weak users. Make sure you have a decent firewall turned on (at least Comodo).
     
  6. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Ah I see.
     
  7. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Oh thanks. But I have paid for VPN Ip. So if TOR network's IP is shown in websites or they get only tor's ip then my money is wasted, right?
     
  8. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Holy smoke! I do not want to use tor at my own risk! I better leave the whole tor idea then. Phew. Thank for warning me.
     
  9. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    That I'm still working on. My firewall(Online Armour Premium) does not let my vpn work or connect to the internet in it's presence. :'(
     
  10. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    So I guess there is no other option than to use my vpn in a vm. :doubt:
     
  11. kupo

    kupo Registered Member

    Joined:
    Jan 25, 2011
    Posts:
    1,121
    FUD, lol. I do agree that TOR is not for privacy, it's for anonymity.
     
  12. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Actually, if you want the "separation of trust" as described in the AirVPN document, you would want to start up either the TBB (easier and portable if needed) or the Vidalia bundle and connect to the Tor network first. Then you want to connect to your VPN using the TCP Port 9050 Proxy option that Mirimir mentioned. Your VPN will see you coming from a Tor IP, and the Tor Exit Node will only see encrypted traffic.

    PD
     
  13. EncryptedBytes

    EncryptedBytes Registered Member

    Joined:
    Feb 20, 2011
    Posts:
    449
    Location:
    N/A
    I believe what Redcell was referring to was sniffing exit nodes* which do exist. (*These are nodes that scan and pull data of interest transmitted in the clear through their networks) Other than those, there exists a portion of Tor users who do use the network itself for nefarious means (DDOS mostly), as well as the .onion domain.

    It is important when using Tor to make sure your connection is fully encrypted end-to-end, not just up to the exit node, and when possible chose trusted exit nodes.
     
  14. No_script

    No_script Registered Member

    Joined:
    May 12, 2012
    Posts:
    97
    TOR is seedy as, just a bunch of pedo's and druggies.

    MITM attacks are common in TOR, mostly done by governments around the world. + Why the hell are there all those nodes in Washinton DC? NSA maybe?

    + Didn't Anonymous expose the lead programmer as the guy behind Freedom Hosting aka the pedo's hosting solution.
     
  15. EncryptedBytes

    EncryptedBytes Registered Member

    Joined:
    Feb 20, 2011
    Posts:
    449
    Location:
    N/A
    Realistically it wouldn't be that simple IP geolocation by itself is a poor way to identify the owner of a tor node. Most well established global governments have assets worldwide, not just where their capital cities are located. What you probably see in the DC area is academia, research groups, or individuals setting up nodes.
     
  16. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    He was in no way the "lead programmer", or even one of them!
     
  17. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,635
    Location:
    European Union
    Not only that, but it's also controlled by man eating aliens !! :rolleyes:
     
  18. hashed

    hashed Registered Member

    Joined:
    May 5, 2012
    Posts:
    53
    Unfortunately, that doesn't work if you are routing through VPN at the hardware level (DD-WRT) :(
     
  19. hashed

    hashed Registered Member

    Joined:
    May 5, 2012
    Posts:
    53
    Agree completely, anyone can use TOR for nefarious purposes, but please don't use generalities to defile the overall goal of the service :) A lot of good comes from TOR (just ask some dissidents).

    ~h
     
  20. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    You are correct. My usage scenario is in a multi-user environment...who want their full speed Netflix :D But if I lived alone... LOL.

    PD
     
  21. hashed

    hashed Registered Member

    Joined:
    May 5, 2012
    Posts:
    53
    Actually, I too am in a multi-user environment, so I have a dedicated DD-WRT device for accessing my VPN's through the DMZ of my primary hard router. All I have to do is switch from one wireless connection to another :) Paying close attention though to which connection I happen to be on.

    ~h
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.