I was reading somewhere about the differences between routing Tor through your VPN, and your VPN through Tor, the difference being who do you trust more, the Tor exit node, or the VPN, via these diagrams: Code: User---VPN---Node 1 (Guard)--- Node 2 (middle node)--- Node 3 (exit node)---destination site Code: [FONT=Helvetica Neue]User---Node 1 (Guard)---Node 2 (middle node)---Node 3 (exit node)---VPN---destination site[/FONT] Then there's a third diagram, where you prevent Tor from knowing where you're coming from, and where you've been: Code: [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)---Node 3 (exit Node)---VPN---destination site[/FONT] Of course with the third option, you have the problem of the first VPN knowing your IP, but you eliminate the whole "tor exit node security" thing of the VPN > Tor option. Of course if you went this route you'd still have to worry about the VPN not keeping logs, being out of jurisdiction, payment methods, multi hop routing and all, but it seems like the best bet. I'm just wondering how it works. Would you connect to your VPN, then boot up Tor, only to connect to the second VPN, so it sees the masked Tor IP? If that's how it works, seems pretty legit to me. What do you guys think?