OK, here we go. Back to soft sockets. In the decades that have past the topic of soft sockets has been beaten to death. However, my op-sec is changing. I am behind a relatively good VPN. I have plugged as many leaks as I possibly can. My remaining issue is innate windows vulnerability. I know Linux would be a better choice but I don't want to go there (the devil you know argument). Whonix? No. Tails is a maybe. I am really hoping you guys can suggest something that I am willing to implement. I don't want data leaks out svchost. The svchost process comment dates me. I am paranoid for certain. This day in age its the only way that works. That being said, I have made my bed by my stated use of windows! Is there any reasonable way I can stop leaks from svchost or am I just screwed unless I completely abandon windows? I have read launching TOR inside a VPN identifies you much like customizing a browser can. If I decide to use TOR inside a VPN to bypass the SVChost soft socket in favor of Socks5, in theory a more trustworthy soft socket, would it be a security benefit to me? I do not have any three letter agency concerns at all. Having stated that am I going too paranoid? What do you guys think? Commentary please.
Is Windows only a must? You could set up a Virtual Machine for browsing and use Windows for all else.
If the VM is Windows how would that handle the innate windows vulnerability? Are you suggesting a Linux VM? I run too many windows centric apps. I'm also 60 and really don't want the learning curve. The days of my willingness to give ms the shove have past. I should have done it years ago and didn't. What about the socks5 - TOR / SVChost potential workaround I suggested? I really need something more secure. I need to discuss.
+1 It doesn't matter what it is inside VM. You should probably ask more about specific VM configuration than guest OS.
I meant to suggest that the VM be Linux but that's what happens when you are doing multiple things at a time and leave out details...