In terms of OPSEC, which set up is better?
[OPSEC] VPN+Tor OR Tails+Tor?
In terms of OPSEC, which set up is better?
[1 Points] None:
[1 Points] DNM_Pilgrim:
I've read contradicting info on this - some sources have suggested that using a VPN with TOR can leave your OPSEC open at some point...
So I too would like to know this
[1 Points] Wanted_drugs_2day:
It really depends on what you're trying to do.
VPN>TOR hides TOR usage from your ISP while tails>TOR does not.
Tails spoofs Mac addresses and "wipes the slate clean" so anything malicious will not phone home next time, a VPN does not.
A VPN will make it look like your connection is in another state or country, tails will not.
Ultimately I would agree that going tails>dd-wrt router(VPN)>TOR to be the safest without setting up VMS and such.
They have to get through TOR, subpeona or compromise the VPN and hope they keep connection logs (even if they are in a cooperative nation) and then they would have your home IP.
I've always wanted to run a VPN on host, go through a ddw RT router, then to TOR so they have two vpn's to get through but I hear tale the speed sucks
[1 Points] None:
Just using tails with no vpn. VPN's introduce a single point of weakness, security professionals do not recommend using a VPN to connect to tor.
[1 Points] huzibizi:
Why not Tails+VPN +tor
[0 Points] SunnyBadlands:
Tails, VPN, TOR. End of story. Lol at anyone who would just use VPN & Tor without tails.
[0 Points] lordredvampire:
You can try VPN over TOR via OpenVPN GUI while leaving your TOR browser open. That will work.
Niffy guide from cryptostorm (HOWTO: VPN over TOR):
TAILS.....VPS for the most part are shit!!!!
https://www.htbridge.com/blog/90-percent-of-ssl-vpns-use-insecure-or-outdated-encryption.html