Hello TorWhores, I recently watched a Defcon 24 conference video on the subject of how Tor users were caught. One aspect of many convictions (such as Ross's) was that the users logged into their gmail at the same location as they were using Tor. Given that ISP's can see encrypted Tor traffic, is using a vpn enough protection to obscure the location of your origin when using Tor and email (for bitcoin purposes) at one location?
Would both scenarios protect against gmail/tor correlation investigations: 1. Be using a vpn on public wifi when accessing Tor, and logging into your email on a different wifi network 2. Use public wifi for email on clearnet, then on the same public wifi use a vpn to access Tor?
My OpSec against correlation attacks.
Leave one computer connected to Tor 24/7/365 and never use it
Use a different box with Tails or Whonix as needed
Use a separate laptop without Tor on it as my daily driver