114
You SHOULD connect to Tor via a VPN, actually | 2023 Tor Overview
yewtu.beIn which I respond to @MentalOutlaw's "Stop Using Tor With VPNs" video that somebody shared with me, and also talk more about Tor security I guess...
❤️ Support my work on Ko-Fi: https://ko-fi.com/jonaharagon
📧 Follow my Newsletter: https://jonaharagon.substack.com
This video is based on research from https://www.privacyguides.org/en/advanced/tor-overview/ and https://discuss.privacyguides.net/t/clarify-tors-weaknesses-with-respect-to-observability/3676
Timestamps:
0:00 Hot take alert
0:08 Mental Outlaw video
0:50 About myself
2:01 Misconceptions about VPNs and Tor
3:48 Why you want to hide Tor from your ISP
4:41 Sidenote about “criminals”
6:08 Censorship circumvention
6:53 Tor bridge safety & historical analysis
7:50 Tor bridge safety examples
9:15 Tor bridge safety conclusion
10:17 Censorship circumvention conclusion
10:43 Tor usage by “criminals” + opsec note
11:06 Global Passive Adversaries
12:38 Investigations into your Tor usage
14:49 Advanced “Traffic Analysis” techniques
16:01 VPNs which log
17:21 What actually makes you stand out on a network
18:41 My real advice on how to connect to Tor
19:36 Common Misconception #1 “VPN = 4 hops!!!”
20:11 Common Misconception #2 “Permanent Entry Node”
20:49 Common Misconception #3 “VPN must be disabled”
21:39 How to use a VPN with Tor properly
22:58 Additional notes on Tor safety
24:25 Where you can learn more
24:33 Remember to subscribe :)
🏠 https://www.jonaharagon.com
#tor #vpn #torproject #jonaharagon
The onion router was a clue in itself as to how you connect to the Internet, especially when you need to hide. Add more than a normal vpn into the mix, proxies, ssh tunnels, dns tunnels, net cat, and maybe i2p. Once done, you could even fire off an ion cannon in a particular orbit if you fancy.
Just bear in mind that some vpn companies are owned by companies who also own other companies that own large networks, so they don’t necessarily need the vpn to log traffic to get your meta data.