1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Anonymity via Tor & VPN

Discussion in 'BlackHat Lounge' started by gmp123, Aug 6, 2015.

  1. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    I was reading somewhere about the differences between routing Tor through your VPN, and your VPN through Tor, the difference being who do you trust more, the Tor exit node, or the VPN, via these diagrams:
    Code:
    User---VPN---Node 1 (Guard)--- Node 2 (middle node)--- Node 3 (exit node)---destination site

    Code:
    [FONT=Helvetica Neue]User---Node 1 (Guard)---Node 2 (middle node)---Node 3 (exit node)---VPN---destination site[/FONT]
    Then there's a third diagram, where you prevent Tor from knowing where you're coming from, and where you've been:
    Code:
    [FONT=Helvetica Neue]User---VPN---Node 1 (Guard)--- Node 2 (middle node)---Node 3 (exit Node)---VPN---destination site[/FONT]
    Of course with the third option, you have the problem of the first VPN knowing your IP, but you eliminate the whole "tor exit node security" thing of the VPN > Tor option. Of course if you went this route you'd still have to worry about the VPN not keeping logs, being out of jurisdiction, payment methods, multi hop routing and all, but it seems like the best bet.

    I'm just wondering how it works. Would you connect to your VPN, then boot up Tor, only to connect to the second VPN, so it sees the masked Tor IP? If that's how it works, seems pretty legit to me. What do you guys think?
     
  2. gmp123

    gmp123 Newbie

    Joined:
    Jan 23, 2015
    Messages:
    9
    Likes Received:
    0
    Anyone have any ideas on if this is possible/would be worth it?