Billbill 2 Posted ... Main Problem: How to verify AirVPN over Tor (ISP > TOR > VPN) is working??? #1) I have followed the minimal guide at https://airvpn.org/tor/ and after following the instructions to the best of my ability, am still left with the question of "How do I know if my data is really being routed through Tor before it then goes through AirVPN?" So, when I view the Client Area at https://airvpn.org/client/ it shows me the AirVPN server exit IP... but this doesn't tell me that my data was in fact routed through Tor. (For example, it could be that I didn't have Tor selected in the Proxy preferences, yet Client Area will display the same info just the same). So I wish (dear Staff) that the Client Area in addition would say something like, "AirVPN ENTRY IP was an --Tor Exit Node--", or "AirVPN ENTRY IP was NOT an --Tor Exit Node--" or such. Probably some people don't want their ISP's entry point posted on the web-page, but many people probably would appreciate if at least a generic description of the ENTRY IP was posted as well in the Client Area. (such as, "ENTRY IP was SSH/Tor/Proxy/etc"). Howbeit, since the above feature is currently not implemented, can anyone tell me how I might Know that my data is being routed through Tor before then going through AirVPN? Please respond with an actual method, rather than just saying, "make sure your settings are right." Suppose AirVPN's instructions were wrong, or that my system had an anomaly... what can I do to ascertain / verify that the data was routed through TOR first? Extra problems: #2) As Network Lock currently does not work with AirVPN over Tor, would the method described at https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/ suffice as an effective network lock, so that if AirVPN disconnected, no data would pass unencrypted to ISP (from Non-Tor Broswer)? #3) I am wishing to know the above for the purpose of purchasing another AirVPN account anonymously... having read the section on Tor Browser safety at: http://localbitcoins.net/faq , it implied that purchasing Bitcoins via Tor (so as to buy AirVPN anonymously) was subject to MITM (Man in the middle) attacks... and yet AirVPN prescribes just that... so my question is... will using AirVPN over Tor bypass the MITM attacks referenced in the above localbitcoins faq? Thanks. PS - Thanks in advance for any help, and if someone could respond ASAP I would appreciate it, as my account expires in a few days. Quote Share this post Link to post
zhang888 1066 Posted ... This depends on which client you are using. If you use Eddie and choose Tor, it will always go via the opened Tor circuit. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
Beetking 0 Posted ... I had the same question as original poster. I am new to AirVPN. The question is not about trusting that when TOR is selected in Eddie, it will always go via open TOR circuit. It is about verification. The https://airvpn.org/tor/, the very first bullet under the advantage states: Additional privacy layer: our VPN server will not see your real IP address but the IP of the Tor exit node (you can check your Tor exit IP in the Client Area) Only exit IP in the client area, I see is that of the VPN server. Based on above I was expecting the client area to also show the IP of the TOR Exit node that connects into AirVPN server. Am I missing something or what I quoted from https://airvpn.org/tor/ is incorrect? Quote Share this post Link to post
Staff 10018 Posted ... Am I missing something or what I quoted from https://airvpn.org/tor/ is incorrect? It's incorrect and you're right. We prevented displaying the IP address on the web site client area some time ago. Kind regards Quote Share this post Link to post
jonstevens 0 Posted ... So, there is no way (website check, etc.) to see/verify that traffic is, in fact, going through TOR while I am connected as such? Quote Share this post Link to post