1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Anonymity, Tor vs VPN (or both)?

Discussion in 'Black Hat SEO Tools' started by gmp123, Aug 6, 2015.

  1. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    I was reading somewhere about the differences between routing Tor through your VPN, and your VPN through Tor, the difference being who do you trust more, the Tor exit node, or the VPN, via these diagrams:

    Code:
    [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)--- Node 3 (exit node)--- destination site[/FONT]
    Code:
    [FONT=Helvetica Neue]User---Node 1 (Guard)---Node 2 (middle node)---Node 3 (exit node)---VPN---destination site[/FONT]
    Then there's this third diagram, which prevents Tor from knowing where you're from, and where you've been.

    Code:
    [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)---Node 3 (exit Node)---VPN---destination site[/FONT]
    Of course with the third option, you still have the problem of the first VPN knowing your IP, but you eliminate the tor exit node security thing with the VPN > Tor option. Of course if you went this route you'd still have to worry about the VPN not keeping logs, payment methods, etc, but it seems like the best bet.

    I'm just wondering how it works. Would you connect to your VPN, then load up Tor, only to connect to the second VPN, so it sees the masked Tor IP? If that's how it works, seems pretty legit to me. What do you guys think? Is the added cost and layer of precaution worth it?
     
  2. ekapek

    ekapek Jr. VIP Jr. VIP Premium Member

    Joined:
    Aug 2, 2010
    Messages:
    266
    Likes Received:
    47
    Home Page:
    Tor used correctly is anonymous so you don't need anything more
     
  3. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    True, but exit nodes are vulnerable, you don't know who's operating them, so a VPN on the other end would make sense, right?
     
  4. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    Any other opinions on the matter, or if something like this is even doable/worth it?


    User---VPN---Node 1 (Guard)--- Node 2 (middle node)---Node 3 (exit Node)---VPN---destination site
     
  5. blackball

    blackball Junior Member

    Joined:
    Apr 29, 2015
    Messages:
    110
    Likes Received:
    26
    Location:
    internet
    100% anonymity, security, cryptography, ...(you name it) doesn't exist. There always are vulnerabilities, leaks and your mistakes. It's just the matter of cost and time to find you. So don't rely on that too much.
     
    Last edited: Aug 7, 2015
  6. SEO20

    SEO20 Elite Member

    Joined:
    Mar 25, 2009
    Messages:
    2,017
    Likes Received:
    2,260
    Depends on what you want to do. Remember VPN usually only have one IP. Tor will have more.
    I personally don't use TOR as it CAN reverse engineered with several techniques - just google away.
     
  7. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    I know (and always preach) that 100% real anonymity​ doesn't exist on the internet, because it wasn't built for anyone to do so. I'm just doing some research to find the next best thing. Do you know if that's how a VPN > Tor > VPN would work, or if it's possible? Connecting to your VPN, to load up Tor, only to connect to the second VPN, so it sees the masked Tor IP?
     
  8. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    Thank's for your opinion, I know Tor can be traced back to you, which is why I'm wondering if a VPN > Tor > VPN solution would be worth paying for two VPNs, or if it's even possible. Thank's for your opinion. As far as what I want to do? I'm researching for a little project of mine, and only want to be able to remain anonymous whilst working on such project online, no hacking or anything like that, just remaining anonymous while on a laptop, connecting to websites.