I was reading somewhere about the differences between routing Tor through your VPN, and your VPN through Tor, the difference being who do you trust more, the Tor exit node, or the VPN, via these diagrams: Code: [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)--- Node 3 (exit node)--- destination site[/FONT] Code: [FONT=Helvetica Neue]User---Node 1 (Guard)---Node 2 (middle node)---Node 3 (exit node)---VPN---destination site[/FONT] Then there's this third diagram, which prevents Tor from knowing where you're from, and where you've been. Code: [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)---Node 3 (exit Node)---VPN---destination site[/FONT] Of course with the third option, you still have the problem of the first VPN knowing your IP, but you eliminate the tor exit node security thing with the VPN > Tor option. Of course if you went this route you'd still have to worry about the VPN not keeping logs, payment methods, etc, but it seems like the best bet. I'm just wondering how it works. Would you connect to your VPN, then load up Tor, only to connect to the second VPN, so it sees the masked Tor IP? If that's how it works, seems pretty legit to me. What do you guys think? Is the added cost and layer of precaution worth it?