Search the Community
Showing results for tags 'vpn over tor'.
Found 5 results
-
Hi, as i've write in other topic, seems we can't launch eddie-ui GUI client in tails 3.7.1 without crash of app. (seems permission-related question, i've tried some change and the use of torsocks but none works) So i've to use command line interface; it's necessary to add specific option to connect to airvpn over tor ? I think i should add something to command line.. i cant use only : "airvpn -cli -login=mynick -password=mypassword" Could someone gently post the simple base command line to obtain vpn over tor connection ? i'm sure it would be very useful have a simple working command line for start the ball rolling.
-
Main Problem: How to verify AirVPN over Tor (ISP > TOR > VPN) is working??? #1) I have followed the minimal guide at https://airvpn.org/tor/ and after following the instructions to the best of my ability, am still left with the question of "How do I know if my data is really being routed through Tor before it then goes through AirVPN?" So, when I view the Client Area at https://airvpn.org/client/ it shows me the AirVPN server exit IP... but this doesn't tell me that my data was in fact routed through Tor. (For example, it could be that I didn't have Tor selected in the Proxy preferences, yet Client Area will display the same info just the same). So I wish (dear Staff) that the Client Area in addition would say something like, "AirVPN ENTRY IP was an --Tor Exit Node--", or "AirVPN ENTRY IP was NOT an --Tor Exit Node--" or such. Probably some people don't want their ISP's entry point posted on the web-page, but many people probably would appreciate if at least a generic description of the ENTRY IP was posted as well in the Client Area. (such as, "ENTRY IP was SSH/Tor/Proxy/etc"). Howbeit, since the above feature is currently not implemented, can anyone tell me how I might Know that my data is being routed through Tor before then going through AirVPN? Please respond with an actual method, rather than just saying, "make sure your settings are right." Suppose AirVPN's instructions were wrong, or that my system had an anomaly... what can I do to ascertain / verify that the data was routed through TOR first? Extra problems: #2) As Network Lock currently does not work with AirVPN over Tor, would the method described at https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/ suffice as an effective network lock, so that if AirVPN disconnected, no data would pass unencrypted to ISP (from Non-Tor Broswer)? #3) I am wishing to know the above for the purpose of purchasing another AirVPN account anonymously... having read the section on Tor Browser safety at: http://localbitcoins.net/faq , it implied that purchasing Bitcoins via Tor (so as to buy AirVPN anonymously) was subject to MITM (Man in the middle) attacks... and yet AirVPN prescribes just that... so my question is... will using AirVPN over Tor bypass the MITM attacks referenced in the above localbitcoins faq? Thanks. PS - Thanks in advance for any help, and if someone could respond ASAP I would appreciate it, as my account expires in a few days.
-
Hello, How do i setup AirVPN over Tor, if dont want to use Eddie, but only the ovpn files and Tor? Also, do you have some n00b-friendly help how to do that on Whonix (their article on that https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN is frighteningly complicated) Thank you in advance
-
Here I am with a technical problem with the setup "AIR VPN over TOR". This is working absolutely fine, I have installed TOR, opened TOR browser, then connected to AIR VPN client - right now my Entry IP is from TOR, and Exit IP is from AIR VPN server - this is exactly what I wanted and achieved, so no problem here. However, when the VPN connection gone down suddenly and it was trying to reconnect, my firefox browser showing IP from my local ISP, it means I am exposed already! I tried "Network lock", but it's not working with "VPN over TOR" setup. I then checked the guide page here https://airvpn.org/tor/ and found this "Warning: not compatible with Network Lock at the moment." Therefore, this setup currently is not full proof and giving a false sense of security. VPN disconnection is very common, and in that case, it will expose my true-identity any time without any notice. This only thing making all this setup absolutely vulnerable, yet you recommended this. In the guide you said, by this setup, my true IP won't be revealed even to you, but you forgot that if VPN gets disconnected, my true ip will be revealed to all other site/software which is consistently using data. Tell me what to do to make it full proof totally Waiting for your prompt reply, thanks.
-
Hi everbody, I wanna use VPN over TOR but there is no Internet traffic after successfully VPN connection. Besides VPN connection disconnects almost after 1 minute because of TCP connection timeout. I've configured proxies from Advanced section of NetworkManager and I'm using SOCKS protocol as proxy type. I'm using Linux OS and NetworkManager to manage my network interfaces and VPN connections. My OpenVPN version is 2.3.0. I've already read this manuel but I couldn't find any solution. Is there any suggestion to overcome this problem? https://airvpn.org/tor/ Solution: - Use Eddie client, - Enable control port and cookie authentication in your torrc file as described at this URL https://airvpn.org/tor/ - Set Tor as connection mode in AirVPN -> Preferences, don't use TCP + Socks Proxy as me (my first mistake) - Be careful with the port numbers; because default port numbers in manuel and Eddie client are respectively 9150 and 9151 but in my torrc file they are 9050, 9051 and it's very easy to overlook for example my situation. (my second mistake) - You can export ovpn configuration file which is special for "VPN over TOR" from Eddie client, so you can use that file to connect VPN from command line using openvpn command. For me it's more easy than using Eddie client.