I don't use any VPN because I trust my ISP more than VPN providers... Joking. I use what others mentioned on this thread, quite funny how we live in such a chaotic world

214b9821
Yeah, I'm using the exact configuration for myself but it may not be suitable for everyone because it presumes you trust your home ISP.

Relaks TOR is a hell of a lot faster than it used to be. As the networks that people who participate in TOR get better, so does TOR along with it.

csis01 My suggestion for VPN in terms of anonymity/privacy, is to use Orbot

This is a suggestion I hear on this forum a lot, and its absolutely a terrible suggestion.

Orbot is not a good suggestion for people for general use. It is not an alternative to a VPN.

  1. VPNs are fast, TOR is slow.
  2. TOR gets blocked on may sites. VPNs don't.
  3. VPNs give you a lot of IP choices. TOR doesn't.
  4. With a VPN you can specifically pick an IP from a particular country. With TOR you can't, or is limited, and often doesn't work as good as a VPN.
  5. TOR nodes are heavily surveilled. Less likely with VPNs.
  6. TOR is definitely "partly" compromised. Not so with VPNs.

TOR and VPNs are two different things, for different uses, each with their own benefits and use cases. TOR is NOT a definite alternative to VPNs.

bartenderstoneware
Good VPNs I know of: Mullvad, proton, iVPN.

A cheap option is surfshark, but don't expect privacy. I think they are a false flag business though, not to be trusted. (nothing to backup that claim though). But good for things like torrenting. Used to have them. Forcefully keeps your credit card info.

    I would not be so presumptuous as to recommend, due to limited experience and technical knowledge.

    I have used Proton’s free VPN for more than a year, and found it satisfactory.

    Not being important enough to attract more than the most casual attention from the routine snoops, I may be more easily satisfied than those who have a real problem.

    User2288 VPNs are fast, TOR is slow.

    Tradeoff, safety for speed.

    TOR gets blocked on may sites. VPNs don't.

    Same as above.

    VPNs give you a lot of IP choices. TOR doesn't.

    False. Change endpoints as much as you like, you can even pick where it comes out.

    With a VPN you can specifically pick an IP from a particular country. With TOR you can't, or is limited, and often doesn't work as good as a VPN.

    Reverse actually, TOR is the one that gives you choice of endpoint.

    TOR nodes are heavily surveilled. Less likely with VPNs.

    You think that phoney "privacy" VPNs aren't? Very naive perspective.

    TOR is definitely "partly" compromised. Not so with VPNs.

    On the contrary, you have NO IDEA how compromised any of those phoney VPNs are. You could be using a service that is provided BY THE FBI!

      User2288 A cheap option is surfshark, but don't expect privacy. I think they are a false flag business though, not to be trusted

      what gives you this impression? currently using them (not for anything high security), and am always curious why they don't get mentioned, wondered if there was something up.

        csis01 you have NO IDEA how compromised any of those phoney VPNs are.

        True. We don't know how compromised any VPN is. However we do know that TOR is FOR SURE "partly" compromised. I'd rather take my chances with the VPN.

        And for the rest of your comments, some I partly I agree, the rest I disagree.

        Any user doubting what I say is welcome to use TOR as their VPN (as I have in the past), and soon reach the same conclusions as mine. Once you see that you can't watch a basic youtube video with ease, and can't do your banking, you'll come around.

          itsjpb what gives you this impression? currently using them (not for anything high security), and am always curious why they don't get mentioned, wondered if there was something up.

          Well I didn't like that they forcefully keep your CC info and don't let you delete it. The rest is purely a gut feeling. As I said, I have nothing to back that claim up with. I have the same distrust of most VPNs (PIA, Express, etc..)

          • [deleted]

          • Edited

          csis01 User2288
          Being a little pedantic: Orbot is not a VPN and there is no VPN version of it. What you are talking about is a system wide proxy that routes all traffic through Tor. There are multiple different tools for that.

          Verifiable info from there website:

          Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

            It's a common school of thought that combining VPNs with Tor reduces anonymity. There are a number of articles about that. Yet I never fully understood that logic. Say you sign up for Mullvad over Tor, pay with XMR or cash and connect to Mullvad VPN from Tor exit node. How exactly that's worse than 1) using only Tor or 2) using only Mullvad? Can someone please explain me like I am 5?

              • [deleted]

              evalda
              TorPlusVPN TorProject

              You -> VPN/SSH -> Tor
              You can route Tor through VPN/SSH services. That might prevent your ISP etc from seeing that you're using Tor (VPN/SSH Fingerprinting below. On one hand, VPNs are more popular than Tor, so you won't stand out as much, on the other hand, in some countries replacing an encrypted Tor connection with an encrypted VPN or SSH connection, will be suspicious as well. SSH tunnels are not so popular.
              Once the VPN client has connected, the VPN tunnel will be the machine's default Internet connection, and TBB (Tor Browser Bundle) (or Tor client) will route through it.
              This can be a fine idea, assuming your VPN/SSH provider's network is in fact sufficiently safer than your own network.
              Another advantage here is that it prevents Tor from seeing who you are behind the VPN/SSH. So if somebody does manage to break Tor and learn the IP address your traffic is coming from, but your VPN/SSH was actually following through on their promises (they won't watch, they won't remember, and they will somehow magically make it so nobody else is watching either), then you'll be better off.

              You -> Tor -> VPN/SSH
              You can also route VPN/SSH services through Tor. That hides and secures your Internet activity from Tor exit nodes. Although you are exposed to VPN/SSH exit nodes, you at least get to choose them. If you're using VPN/SSHs in this way, you'll want to pay for them anonymously (cash in the mail [beware of your fingerprint and printer fingerprint], Liberty Reserve, well-laundered Bitcoin, etc).
              However, you can't readily do this without using virtual machines. And you'll need to use TCP mode for the VPNs (to route through Tor). In our experience, establishing VPN connections through Tor is chancy, and requires much tweaking.
              Even if you pay for them anonymously, you're making a bottleneck where all your traffic goes -- the VPN/SSH can build a profile of everything you do, and over time that will probably be really dangerous.

              You -> your own (local) VPN server -> Tor
              This is different from above. You do not have to pay a VPN provider here as you host your own local VPN server. This won't protect you from your ISP of seeing you connect to Tor and this also won't protect you from spying Tor exit servers.
              This is done to enforce, that all your traffic routes through Tor without any leaks. Further read: TorVPN. If you want this, it may unnecessary to use VPN, a simple Tor-Gateway may be easier, for example Whonix.

                [deleted] Thanks for taking the time to repost. There is no compelling argument on how adding a VPN (paid anonymously) after Tor makes things worse.

                  • [deleted]

                  • Edited

                  evalda Indeed it is, but in there and my own experience, establishing a VPN connections through Tor is chancy, and requires much tweaking. But if you pay for them anonymously, you're making a bottleneck where all your traffic goes -- so the VPN can technically build a profile of everything you do, and over time that will probably be really dangerous IMO.

                    [deleted] I see, this makes some sense. Of cause you won't want to use the same VPN server/account for everything you do. I still don't see a reason not to use VPN after Tor in certain cases like accessing a website that blocks Tor. You certainly don't want to mix different activities on the same VPN (with Tor or not).

                    I would recommend being cautious and skeptical of anyone who pushes those commercial VPNs so hard. In privacy terms VPNs are privacy by promise and not really by design. They are a pretty dangerous thing to normalise.

                    On topic, paid Proton plan with a lot of privacy & security features. The app has no trackers indeed some permissions what can be changed in the menu.
                    Off topic

                    Tor is nice, but need to keep focused what you do and where you go there with the right settings.

                    Faster, more private and secure is Lokinet the way to go!

                    https://lokinet.org/