VPN discussion – ask all your VPN related Tor questions here

Not if bridges are being used.

Actually I haven’t seen it but thanks for mentioning it. I will go check it out!

I see all of these people doing these deep dives and long winded cases against VPN with TOR all the time but the most basic and fundamental part of it gets completely ignored.

When that very first entry node sees your address, what address do you want it to see? Thats it, nothing more or nothing less, yet this gets ignored and to the point where it makes me question on if it’s intentional.

Not to beat a dead horse but for anyone else reading this just ask yourself that basic question. What do I want the entry node to see?

Theres only 2 answers:

  1. The address of my ISP who we now know like 90% of other US based tech companies have burned us repeatedly being in bed with the US Government
  2. Some random address in some other country ran by some guys who every waking moment of their life are probably trying to evade LE in their own country and probably hate the United States.

I just wish more people would get back to the basics and explain this.

At the end of the day for me, I rarely if ever use TOR anymore at all as I just don’t see the value out of the headache for my use cases.

Sure, if the bridges are unknown to the adversary and never become known at any point in the future.

Then the attack applies.

The alternative to using Tor, to the best of my knowledge, is to use three chained VPNs: the first one on a VPN router made by GL-iNet (or similar company), the second one on a Linux host operating system, and the third on a Linux guest operating system (with Virtualbox in between the host and guest).

There are VERY thorough blog posts on IVPN.net about all of these topics. Yes, they also recommend combining Tor with VPNs.