Jump to content
Not connected, Your IP: 18.224.73.157
Sign in to follow this  
engagement

Connection Question

Recommended Posts

If one cannot trust the AirVPN servers and wants a further partition of trust is the following true:

1.Connect to VPN (HM)

2. Connect to VPN (VM)

3. Connect to Tor (VM)

So in effect you would have Tor over VPN over VPN.

I understand that if one just uses Tor over VPN that one needs to place trust in AirVPN (or equivalent) to not sniff my data. Does the above set-up avoid BOTH VPN's from being able to see my actual IP address and what data can both of the VPN's involved in my setup see datawise?

a) What data/info can VPN in step 1 see?

What data/info can VPN in step 2 see?

I know about VPN over Tor and am wondering if I setup like this who can see what data/info? Also, what about VPN over VPN over Tor?

Share this post


Link to post

If one cannot trust the AirVPN servers and wants a further partition of trust is the following true:

1.Connect to VPN (HM)

2. Connect to VPN (VM)

3. Connect to Tor (VM)

So in effect you would have Tor over VPN over VPN.

Hello!

Yes, with the above setup you would have TOR over VPN (VM) over VPN (HM).

I understand that if one just uses Tor over VPN that one needs to place trust in AirVPN (or equivalent) to not sniff my data.

No, that's not correct. With TOR over VPN, the VPN server sees your real IP address, but can't sniff the data sent/received by the applications tunneled over TOR.

Does the above set-up avoid BOTH VPN's from being able to see my actual IP address and what data can both of the VPN's involved in my setup see datawise?

No. In order to hide to any VPN server both your IP address and the packets payloads and real headers, you need TOR over VPN over TOR. In order to do that you need for example to:

- connect over OpenVPN over TOR in the Host Machine https://airvpn.org/tor AND

- connect over TOR in the VM

- finally, use ONLY applications configured to tunnel over TOR in the VM

Kind regards

Share this post


Link to post

I understand that if one just uses Tor over VPN that one needs to place trust in AirVPN (or equivalent) to not sniff my data.

No, that's not correct. With TOR over VPN, the VPN server sees your real IP address, but can't sniff the data sent/received by the applications tunneled over TOR.

Thanks for the lightning response!

1. Just to confirm, is Tor over VPN over VPN more anonymous/secure that just Tor over VPN. Or is the 2nd VPN a waste of money?

2. I am considering using Tor over VPN over Tor. I imagine you cannot connect to onion sites with this setup?

3. Just to confirm again, when you have Tor over VPN, that the VPN can ONLY see your ip address but can NEVER see any of the websites you visit in Tor? If this is true then I assume the answer to question 1 (above) will be "its a waste of money".

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...