OPSEC wizards, activate! Settle the great VPN > Tor debate!

I'm starting this post to hopefully draw the attention of the most knowledgeable of our members to settle concerns on this topic as it's become an active discussion on another thread:

VPN provider trustworthiness concerns aside, are (actual) VPN providers at any point able to decrypt or otherwise actively monitor/track Tor activity performed using their connections?

At any step in the VPN > Tor connection, is there a decryption/re-encryption of Tor traffic data, or do we simply have a VPN encrypted connection housing an additionally Tor-encrypted connection within it?

Thanks in advance to all with the wisdom and resources to fully settle this for any and all concerned.

Stay safe out there.


Comments


[9 Points] None:

[deleted]


[3 Points] None:

[deleted]


[1 Points] lordredvampire:

This explains it all:

VPN over TOR - Hide your IP from Cryptostorm, protect yourself from Tor exit nodes

https://cryptostorm.org/viewtopic.php?f=37&t=8826

Admin was spot-on.


[1 Points] None:

[deleted]


[1 Points] dee65c:

Does Tor traffic look like encrypted traffic (HTTPS, SSL etc..) or is Tor traffic unique?


[1 Points] Clix828:

[deleted]

What is this?


[1 Points] buddy_dwyer:

I have a router that I've flashed with DD-WRT and created a virtual wireless AP that routes all traffic to a VPN. This is what I connect to while using Tails. I feel better using the VPN to mask the presence of TOR since the FBI has sniffed packets in the past in order to correlate your TOR usage with the time periods your user was logged into a server, or website, etc.

The VPN is paid with bitcoin that was tumbled and using a false name obviously.

I don't see any benefit to connecting to a VPN while already being connected to TOR.


[-1 Points] None:

everyone can decrypt everything


[-4 Points] None:

go away


[-9 Points] billy5x5:

God reddit fucking sucks.