VPN + TOR Bridge or Exit Node?

Discussion in 'privacy technology' started by Brosephine, Feb 13, 2016.

  1. Is either Whonix or Tails possible to somehow attach a VPN IP routed through these? Am I correct in that they both are types of virtual machines?
     
  2. Hi Mirimir; is there anyway to get this effect with the VPN being the IP address that interacts with the world eg being what your connecting to the web with?
     
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, you can run VPN through Tor. Just create a VPN client in the Whonix workstation VM. It will connect through Tor. The hardest part is actually using it, because all apps in Whonix are configured to use Tor, and only Tor. It's simplest to just install different apps to use with the VPN.
     
  4. Thanks Mirimir for your advice; that seems like a good place to start; hopefully the learning curve won't be too steep;
     
  5. Kirov

    Kirov Registered Member

    Joined:
    Mar 4, 2017
    Posts:
    2
    Location:
    Earth
    I already installed Debian on 64 gb encrypted USB Flash as a host and i installed Whonix workstation and gateway VM. So the rules for using this according to this discussion is :

    1. Don't use host other than run updates, and manage VMs
    2. Install VPN on host, in my case Debian and run it before Whonix. VPN --> Whonix Gateway --> Whonix Workstation
    3. Don't use it in your home perhaps.?

    Am i conclude it right.? or there is something more to add to enhance the security and anonymity.?
     
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, that seems fine. Do use iptables (firewall) rules to prevent leaks. IVPN just put up my guide here: https://www.ivpn.net/knowledgebase/191/How-do-I-prevent-VPN-leaks-using-iptables.html

    As described in my other guides, you can chain multiple VPNs, using pfSense VMs, to protect in case Tor circuits get deanonymized, or you end up with a malicious entry guard.

    Yes, you could avoid using the setup from home. But in my experience, that gets old fast, unless you're in a large city with lots of public hotspots, that you can hit anonymously. And then there are the cameras :( So anyway, for a one-time dump of hot XYZ leakage, sure. But for frequent use, it's not practical to do effectively enough to be worth it.
     
  7. Kirov

    Kirov Registered Member

    Joined:
    Mar 4, 2017
    Posts:
    2
    Location:
    Earth
    planning to use it with 4G Sim Card tho fake registered very easy to get it don't know if it works, i need familiarize this linux and whonix first before digging into more deeper net thank you sir.!
     
  8. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Well, hey, please do share what works :)
     
  9. Brosephine

    Brosephine Registered Member

    Joined:
    Dec 4, 2015
    Posts:
    181
    Location:
    Metropolis
    I'm looking back over some old content because I still feel uncertain regarding Tor + VPN. My isp doesn't block my access Tor, they just send me emails and notifications warning me to stop. Due to this, my first step is always to connect to VPN. Once connected through a VPN I then fire up Tor. In this order I do not receive notifications from my ISP. After rereading some of your old content on the subject I'm now realizing that all of my Tor sessions were only as anonymous and untraceable as my VPN. Is this correct? A couple days ago I started experimenting with bridges. I don't fully understand them but I'm using them.

    Would I be better off eliminating the VPN and just connecting Tor on my home network using a bridge?

    Nowadays, I do use a VM in some situations. Never with Tor. I have been under the impression that connecting the classic Tor browser within a VM is bad. Is this not true? I plan to learn and set up Tails soon.
     
  10. Brosephine

    Brosephine Registered Member

    Joined:
    Dec 4, 2015
    Posts:
    181
    Location:
    Metropolis
  11. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Woah! I've never heard of that. Honestly. That's crazy. So what do they say? That it's dangerous? Potentially illegal?
    No, that's not correct. When you connect first to the VPN server, and then to Tor, you're still anonymized by Tor. The VPN just keeps your ISP from seeing that you use Tor, and it also keeps Tor entry guards from knowing your ISP-assigned IP address.

    However, if you connect to Tor first, and then connect the VPN via Tor, you lose Tor anonymity, and only have whatever the VPN gives you.
     
  12. Brosephine

    Brosephine Registered Member

    Joined:
    Dec 4, 2015
    Posts:
    181
    Location:
    Metropolis
    It's not overt or aggressive. It's just a generic notification warning that it could be harmful to my computer. I receive the exact same notification when i visit a number of legitimate sites that may run a questionable script or something.
     
  13. sdmod

    sdmod Shadow Defender Expert

    Joined:
    Oct 28, 2010
    Posts:
    1,086
    SecurityKiss has five plans and only one of them (The green plan) is free

    It has a data limit of 300MB/day






     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.