Stick with OpenVPN.
Lastly, if you want to know how to connect to TOR over a VPN. If you are using
OpenVPN like I recommended, thenit is really quite simple. Make sure you are connected
to your VPN, check your IP address to on any website such
as
WhatIsMyIpAddress.com
to make sure it has changed. Then, open TOR or open
TAILS and start using TOR and you are now connected to TOR over a VPN.
Connecting to a VPN over TOR is a trickier but is currently only able to be used by
Windows users.
CONNECTING TOR -> VPN FOR
WINDOWS USERS
After a long search, I have found a way you can connect TOR -> VPN. It is not perfect,
and some might not agree with doing things this way, but it works and I am giving it to
you as an option, but it only works for Windows users at this time.
If you look back at my previous chapters regarding combining VPN and TOR then you
will find the reasons why you would want to do so, and some of the reasons why you
might not want to do it. But I was unable to provide you with a way to connect to a VPN
using TOR so that the VPN does not know who you are. When it comes to TOR -> VPN,
if you cannot trust your VPN, which you rarely should, then keeping your identity
anonymous from your VPN is a good idea. Also, with more and more people using TOR,
but with only around 4000 TOR exit nodes, many of the exit node IP addresses are being
flagged as spammers on popular websites and limiting the usage of well-meaning TOR
users to post on message boards like Stack Exchange and so forth.
The way that I found you can do TOR -> VPN is by using a virtual machine, preferably
Virtual Box and running another instance of Windows, preferably one that uses less
memory than your current version. You also want to run TOR Expert and Tortilla on your
host OS. I talk about how to do this in previous chapters. Next set your Virtual Box to
route all its network traffic through Tortilla (bridge adapter), which routes it all through
TOR. Currently Tortilla is only supported by Windows, which is why this option is only
available to Windows users at this time. Doing this also makes it easier to do things like
watch videos on YouTube.
Now that you have your Windows Virtual Machine running on TOR, you can install a
VPN of your choice, preferably one using OpenVPN on your Windows Guest OS and
connect to it. Check your IP address before connecting and after and you should see a
different IP address. If all went well, you now have a virtual machine running TOR ->
VPN. Then if you want to add another layer, you can download TOR browser bundle onto
your virtual machine and run that as well giving you TOR -> VPN -> TOR for another
layer of security. Also you have the option using this method to use a VPN on your host
OS, then Tor Expert with Tortilla, then another VPN on your guest OS, then TOR browser,
giving you VPN -> TOR -> VPN -> TOR.
I am not advocating any which method, you need to make that decision on your own, I am
just giving you the knowledge necessary to make an informed decision and you can
ultimately choose which method you feel most comfortable with. Sometimes doing TOR -
> VPN is necessary because of the spam filter reasons I mentioned above and other times
having TOR as your last node to the internet is necessary like when accessing the onion
network. It is completely up to you and I know that we are trying to shy away from
Windows usage because of all the exploits and other reasons spoken about in the previous
chapters, but if you have no other way of staying anonymous from your VPN than this,
then I think it is a good compromise until we have something like Tortilla that is
compatible with Linux distributions.
Do'stlaringiz bilan baham: |