Internet- Main Router- 2nd Router w/DDWRT- Connected to VPN (noLogsKept) Tails then TOR? This work or ???

So basically, will this work:::::: Main Internet Cable/DSL then to Main Wireless Router for regular clearnet shit, but connected to it is a 2nd router that has DDWRT. Then that ddwrt is connected to a VPN service (no logs kept) that is Router based meaning anything connected to 2nd router is through VPN (again no logs kept), then can I use tails to connect to the 2nd VPN (prefer wired but can be wireless) router then to TOR?

Just looking for info I am a "Perfect Law Abiding Citizen"

This research for my pet rock; whose name is spot; that likes to pee a lot; and is paranoid on pot.

Fire Away Please


Comments


[1 Points] None:

Seems overkill IMO. If you're just a buyer, using tails will be more than enough. If you connect to an onion site, everything stays encrypted inside the tor network.

Using a VPN will only hide that you're using tor from your ISP.


[1 Points] The_Madhouse:

Your taking way more precautions than needed imo. The main problem is that your VPN most likely keeps logs even though they say they dont. No one is going to go to jail to protect you. Tails plus tor is good enough for 99% of the community but maybe someone else can give you a better answer. The more complex the system the more vulnerabilities it has I go by keep it simple stupid


[1 Points] 1337WaylonJennings:

heres why you should drop the VPN (unless you're working through an 0wned machine thats clean and not keeping logs)

Even if they say they don't keep logs (they do), they do. Ya get me? It's great blackmail. Like lets say theoretically they don't keep logs. Go ahead and assume they do. As the other guy said, ain't nobody going to jail for your ass. In fact they might go to jail less if they can put you in there.

If you want to be more anonymous, you're going to need to own some other people's machines (hack them) and clean house on your tracks. Pretty much totally be an invisble fly on the wall on someone elses machine, and then from that machine hop through a few more, and on your final machine run some virtual machines with Tails and make your order through Tor. That's pretty much as good as you're going to get without getting into creating an anti-forensics filesystem on each box. At that point, people at the NSA and CIA will probably still have your ass though because their surveillance/offensive security is the 1337est around.