looking to beef up my internet security and have a few questions. I’m looking into running TOR on a live OS like Tails. I also want to run the signal through a VPN provider, paid for with anonymous bitcoin. Ideally, I like the idea of running VPN over Tor so that I have the anonymity of TOR with the encryption and privacy of the VPN. My issue is this, everywhere I look, it says TOR won’t access .onion sites running this method since the final exit node of the internet traffic would be the VPN and not a TOR exit node. Can anyone confirm or deny this? Are there any workarounds to this that someone is aware of?
Try NordVPN with tor. It has specific settings and instructions that are so easy even a caveman can do it I would look on infosec sites for this info.
Thank you Thai stick. I know NordVPN has built in servers/configurations for TOR over VPN traffic to make it seamless and easy. My question though is: can I do VPN over TOR while also retaining the ability to access .onion sites?
@Docd187123 I believe the answer is yes to both questions. I'm no expert and not advocating any particular VPN provider but Nord is the cheapest I found based outside the US with a no logging policy ($99 for 3 yrs). Hope these are helpful to you and others: nordvpn.com/blog/5-linux-distributions-for-privacy-and-security/ tails.boum.org/blueprint/vpn_support/ nordvpn.com/blog/tor-over-vpn/ nordvpn.com/features/onion-over-vpn/ I intentionally did not post active links to commercial sites.
Thanks for the help MSL! I’ve looked into nord but the problem. Is that those are talking about tor over vpn. I’m trying to get vpn over tor going.
One more caveat: I have never visited any of the sites mentioned at the bottom of my third reference and DO NOT suggest anyone else do so. The diagram in the middle of the page helped me visualize the server connection pattern and what I hoped was the answer to Docd's exit node question. That is my only reason to mention it.
You need to think of VPN over TOR separately from TOR over VPN or VPN / TOR individually. You are correct that .onion sites will not work if you route VPN over TOR, which is why you would always run TOR browser anyway after initiating the VPN. It would defeat the process to access .onion sites over a normal browser even though the actual connection is onion routed, and would only work if the Tor browser is used anyway. Tor relies on a series of encrypted layers, where only the exit node can complete the chain. VPN over Tor terminates at a VPN endoint by which it is forwarded from the exit node, which could be in a completely different geographical location entirely and will never be the same server. Does this answer your question?
Yes and no lol, but it’s orovided good insight. So there is no workaround for VPN over tor to access .onion sites? I guess that’s my main question at this point? Sounds like that’s a negative. What would you do to protect yourself online then?
You would use VPN over Tor, then open a Tor browser which would route a second time over the Onion network. That’s how you would access .onion sites whether using a VPN, a VPN over Tor, or just Tor itself.
Burner, prepaid smartphone paid in cash balance paid cash too Use it only at crowded areas (not sparely populated suburbs) wrap it in Aluminum foil when not in use, turning it off ain't safe enough.
Yep but post office in shithole countries (where most sources are located) routinely open and steal valuables in mail.