Comments are now closed due to spamming and personal attacks.

Twitter: https://twitter.com/huffpoclub

Breaking News

COMBINING TOR WITH A VPN CONTINUED

Posted on Monday, 11th August 2014 @ 11:31 AM by Text Size A | A | A

COMBINING TOR WITH A VPN CONTINUED

inShare

Ok, now let us talk about why you may want to connect to a VPN over TOR.

The data flow would look like this. You -> Tor -> VPN -> Internet

The benefits of doing that are as follows. You are more anonymous to your VPN in case they happen to keep logs, or if you do something using the VPN that you are not supposed to and a website or server grabs your VPN IP address. In the case of this happening, even if the VPN manages to keep logs of everything you do, they can only identify you as an anonymous TOR user as long as you did not purchase the service like an idiot with your credit card or Paypal account. If you use Bitcoin, and made sure the the Bitcoin trail is not easily traceable you should be okay. Some websites block TOR users from connecting to their websites or servers, by using your VPN to appear as the exit node, you are hiding your TOR activity from the website you are visiting and hopefully bypassing their filters.

Another advantage, is that if your VPN connection does drop, your fall back will be your TOR IP address instead of your real IP address. And finally, if you are passing through a compromised TOR exit node, your information will remain encrypted through the VPN’s encryption protocol until it reaches the exit node of the VPN. This is a good thing if you are passing through a compromised exit node, but do not forget that the VPN could be logging everything you are doing anyways. Do not trust anybody who has access to your unecrypted data!

A few of the downsides of doing things this way, as mentioned in the previous post are that your ISP knows you are using TOR, when and for how long. This may or may not matter to you, but it is just something to consider. Second, you will be unable to visit hidden services websites. Remember those .onion sites we talked about in the beginning? You need to be connected to the TOR network to visit those hidden service websites.

But I am connected to TOR aren’t I? Yes you are, but your final method of communicating with the internet does not come from the TOR network, it comes from your VPN. And your VPN is likely not configured for TOR. In order for you to be able to connect to a hidden services, you must either be connected directly to TOR, or use a VPN to connect to TOR. TOR must be your final node of connectivity in order to visit onion websites.

The choice is ultimately up to you, and every person in every state, province and country will have different reasons for wanting to do VPN to TOR or TOR to VPN, or just TOR, or just VPN. Whatever choice you make, please keep all the things mentioned in this post and the previous post in mind. None of these methods will save you if you enter anything identifying about yourself online. Do not log into your Facebook account using your VPN. Do not check your email or search a nearby address on Google using your VPN. In fact, stay away from Google altogether unless absolutely necessary.

There are two other search engines out now that do not store information about their users.

#1 – DuckDuckGo. They have both a clearnet URL and a hidden services URL for both types of users.

https://www.duckduckgo.com

http://3g2upl4pq6kufc4m.onion/ – Please note the hidden services mirror is not HTTPS

#2 – StartPage. This server also does not store any information about its users.

https://www.startpage.com

Before we move on, I want to go back to how to choose a good VPN. When looking for a VPN provider, you will most likely come across two protocols to choose from. Find out which one your VPN provider is using before you sign up with them. PPTP and OpenVPN. At this time, I am going to highly recommend that you avoid PPTP and stick with OpenVPN providers. Check out this site for a quick comparison.

http://www.goldenfrog.com/vyprvpn/openvpn-vs-pptp

As you can see, PPTP uses a weaker encryption, 128-bit versus 160-bit to 256-bit for OpenVPN. It offers basic security versus a high level of security using something called digital certificates. This is basically a way to make sure they data coming in is sent from your VPN provider and not injected by some malicious third party because the incoming and outgoing data are signed using specially obtained certificates, similar to showing your ID to get into a a restricted area.

The only downside is that setting up OpenVPN can be a little challenging for the less technical users, but there are plenty of great tutorials online to set up OpenVPN providers and your VPN provider itself will likely help you get set up as well. PPTP has been abandoned by those who demand the highest level of security, so I would recommend to avoid it. A third option for VPN providers is L2TP/IPsec, but many users now believe it has also been compromised by the NSA due to its weaker levels of encryption and should be avoided as well. Stick with OpenVPN.

Lastly, if you want to know how to connect to TOR over a VPN. If you are using OpenVPN like I recommended, then you it is really quite simple. Make sure you are connected to your VPN, check your IP address to on any website such as WhatIsMyIpAddress.com to make sure it has changed. Then, open TOR or open TAILS and start using TOR and you are now connected to TOR over a VPN.

Connecting to a VPN over TOR is a more tricky and currently above my skill set since OpenVPN reconfigures your network routes so Tor can’t be running on the same host. As soon as I figure it out, I will post a tutorial, and if anybody can share an easy way to connect a VPN over TOR, then please share it with this thread.

UPDATE

A method of connecting to a VPN over TOR has been added to this thread but is currently only able to be used by Windows users. You can read it about it at the link below.

Related News On HPUB:

  • Newly Unearthed CIA Memo: Media Are The “Principal Villains”

    A new declassifed CIA report unearthed by the FOIA investigive cooperative MuckRock contains some shocking commentary on how the intelligence community views and interacts with the media. The 1984 series of internal memos, part of the…

  • The New National Anthem of the United States

    The US national anthem defends slavery in the fourth, all but forgotten stanza. http://hpub.org/Colin_Kaepernick_Is_Righter_Than_You_Know_The_National_Anthem_Is_a_Celebration_of_Slavery-53766/ The US national anthem is a disgrace that needs to be rewritten asap: Oh say can you see, by the dawn´s…

  • Black FBI Informant Darth PerryTells All

        Fascinating, must see old interview of black FBI informant “Darthard Perry” aka “Ed Riggs” on Like It Is, hosted by the late Gil Noble. “The FBI is very good at conspiracies and murders.”…

  • Electoral Science: The Winner of the 2016 Election Will be a Republican

    Originally published at Washington’s Blog in April, 2016   by Daniel Bruno   Electoral Science: The Winner of the 2016 Election Will be a Republican I was the first person in the world to proclaim…

... post your own so far 0 comments

Comments

No comments yet.

Leave a Comment

You must be logged in to post a comment.

 
  • Hpub asks

    • Will Trump Survive to January 1, 2018 ?

      View Results

      Loading ... Loading ...
  • Breaking News