fid02 You will likely "stand out from the crowd" by being one of very few users using Vanadium with Tor exit node IP addresses.
True, but I think we have some misunderstanding here. Let's start with what Tor/Tor Browser is to be used to access the darknet, then Talis or Whonix should be used, so neither Tor Browser on GOS, nor Vanadium+TorVPN. However, if Tor is to be used as a replacement for a classic VPN, or even by accessing the duckduckgo or crypton.is version of the site, but via an onion link, then such a set as I have provided is sufficient. I use TorVPN as a replacement for a classic VPN. However, if you want to protect yourself from fingerprinting, then currently just blending in with the crowd is not enough. You need to create several independent browser profiles. So you can even use Google Chrome, but in a profile that you will only use for YouTube, Gmail or other Google services. So Google will still know that it is you and what you are doing. For other types of sites, use a different profile with a different browser with a different VPN or Tor etc.
@cone-grill-dumping wrote:
I don't have a high threat model, but I would appreciate more security running Tor Browser because I like the privacy features of Tor.
I understand that such super anonymous settings are not necessary, but @cone-grill-dumping wants to achieve the maximum level of security. As I wrote earlier: Security is not the same as anonymity. So I gave the most secure settings, not the most anonymous ones.