Stop Using Tor With VPNs

Mental Outlaw
16 Oct 202311:41

Summary

TLDRIn this video, the host discusses the controversial topic of using a VPN with the Tor network. While some argue that a VPN adds an extra layer of security, the host points out that Tor is already highly effective at anonymizing traffic through its multi-hop encryption system. The video also addresses concerns about ISPs detecting Tor usage and the potential risks of using a VPN, especially in countries with strict internet censorship. The host advises against mixing VPNs with Tor, suggesting that it may actually draw more attention from authorities. Instead, they recommend running one's own Tor relay to contribute to the network's privacy and security. The video concludes with a call to action to support the channel and a reminder of the importance of privacy in the digital age.

Takeaways

  • 🌐 The first layer of accessing the dark web using Tor is basic, involving connecting to the Tor browser on Windows.
  • 🛡️ Layer Two involves using a VPN before connecting to the Tor browser, which is a common question and generally discouraged by the Tor community.
  • 🔒 Tor (The Onion Router) provides a higher level of privacy and anonymity compared to VPNs by routing traffic through three different servers with three layers of encryption.
  • 🔑 The decentralized nature of Tor allows anyone to run a relay, making it difficult for traffic logs to be compared and users de-anonymized.
  • 🔒 Tor establishes new circuits every 10 minutes, further enhancing user privacy by changing the servers through which the traffic passes.
  • 🕵️‍♂️ People who should be concerned about hiding their Tor usage from their ISP are those involved in criminal activities or living in countries that block Tor connections.
  • 🚧 In countries like Iran and China, using a VPN or accessing Tor through bridges can be risky due to government surveillance and control.
  • 🔎 Law enforcement often catches criminals on the dark web due to operational security mistakes unrelated to Tor, such as using personal accounts for clearnet and darknet activities.
  • ⚠️ Using a VPN to connect to Tor can actually make users more conspicuous, especially if the VPN provider is required to keep logs or can be compelled to provide user information.
  • 💡 For those who want to enhance their privacy, running their own Tor relay on a VPS can be a more effective and altruistic approach than using a VPN.
  • 💰 The money spent on VPN subscriptions could be better used to support the Tor network by running a relay, which benefits the entire community.
  • 📉 Using VPNs with Tor is generally not recommended due to the potential risks and the fact that Tor is designed to provide strong anonymity on its own.

Q & A

  • What is the title of the video posted by Network Chuck?

    -The title of the video is 'How to access the dark web in 2023 three layers'.

  • Why does Network Chuck recommend using a VPN for the second layer when accessing the dark web?

    -Network Chuck recommends using a VPN for the second layer to potentially increase security and privacy, although it is a debated topic within the Tor community.

  • What is the general consensus in official Tor forums and subreddits regarding the use of a VPN with Tor?

    -The general consensus in official Tor forums and subreddits is that using a VPN with Tor is not necessary and could even be a bad idea.

  • How does Tor provide privacy and anonymity compared to a VPN?

    -Tor provides privacy and anonymity by routing traffic through three different servers with three layers of encryption, making it more secure than chaining VPN servers together.

  • Why might someone want to hide the fact that they are using Tor from their ISP?

    -People might want to hide their Tor usage from their ISP to avoid scrutiny or potential legal issues, especially if they are in countries that block or monitor Tor connections or if they are involved in activities that could attract law enforcement attention.

  • What are the two main categories of people who should be concerned with hiding their Tor usage from their ISP?

    -The two main categories are people who are engaging in criminal activities or organizing protests on the dark web, and those who are in countries like Iran or China where connections to Tor are blocked.

  • How does using a VPN with Tor potentially make a user more visible to authorities?

    -Using a VPN with Tor can make a user more visible because the traffic from a VPN to Tor stands out and may be targeted for scrutiny by law enforcement or intelligence agencies.

  • What is the author's recommendation for a VPN service that could be used with Tor if someone insists on doing so?

    -The author recommends using a VPN service like Mulvad, which accepts Monero for payment and doesn't require an email address to create an account.

  • Why does the author suggest that running one's own Tor relay on a VPS might be a better use of money compared to paying for a VPN?

    -Running a Tor relay helps the Tor network by increasing the diversity of entry points, making it harder for traffic analysis and surveillance. It also contributes to the privacy of all Tor users and can be a more ethical use of resources.

  • What is the author's final conclusion on mixing VPNs with Tor?

    -The author concludes that mixing VPNs with Tor is a bad idea, as it is unnecessary and likely to make the user stand out, potentially attracting unwanted attention.

  • What is the significance of Tor establishing new circuits every 10 minutes?

    -The practice of establishing new circuits every 10 minutes ensures that a user's traffic is routed through different servers, enhancing privacy by making it more difficult to track or analyze a user's activity.

  • Why does the author suggest that using a VPN to connect to Tor might lead to more information being revealed to authorities?

    -The author suggests that VPN providers, especially those like NordVPN that enforce Know Your Customer (KYC) policies, may be compelled to share user information with authorities, which could include personal details and home IP addresses.

Outlines

00:00

🔒 Controversy Over Using VPNs with Tor

The video discusses the debate around using Virtual Private Networks (VPNs) with the Tor browser. Network Chuck's video on accessing the dark web using a VPN has sparked controversy. While Tor is designed to provide privacy and anonymity through multiple layers of encryption and IP address changes, some experts argue that adding a VPN to the mix is unnecessary and could even be counterproductive. The video explains that Tor's decentralized nature and frequent circuit changes make it superior to VPNs for maintaining privacy. It also addresses concerns about hiding Tor usage from ISPs, especially in countries where Tor is censored, and suggests that using a VPN could actually make users more conspicuous to authorities.

05:03

🚨 Risks of Using VPNs for Dark Web Activities

The video elaborates on the potential risks of using VPNs, especially for individuals engaging in criminal activities or political protests on the dark web. It points out that most criminals caught on the dark web were apprehended due to operational security mistakes unrelated to Tor, such as using personal email addresses. The video argues that VPNs are not likely to offer protection against law enforcement, as evidenced by court records. It also highlights that VPN connections can be easily identified and monitored, making users who connect to Tor through a VPN more suspicious. The video advises against using VPNs like NordVPN for Tor due to their requirement for personal information and suggests using VPNs that accept anonymous payment methods and do not require an email address for an account.

10:06

🛡️ Alternatives to Using VPNs with Tor

The video concludes by advising against the use of VPNs with Tor, stating that it is unnecessary and could potentially expose users. Instead, it recommends using Tor as intended, which allows users' traffic to blend with the millions of others using the network, enhancing its effectiveness. The video also suggests that the money spent on VPN subscriptions could be better used to run one's own Tor relay on a Virtual Private Server (VPS), which would contribute to the network's resilience against surveillance. The host encourages viewers to support privacy by running a Tor relay and offers a discount on merchandise for using the cryptocurrency Monero.

Mindmap

Keywords

💡Dark Web

The 'Dark Web' refers to a part of the internet that is not indexed by traditional search engines and requires specific software, configurations, or authorization to access. It is often associated with increased privacy and anonymity, but also with illegal activities. In the video, the main theme revolves around accessing the dark web and discussing the safety and privacy concerns associated with it.

💡Tor Browser

The 'Tor Browser' is a free and open-source web browser that enhances privacy and security by enabling users to browse the internet anonymously. It is a core component of the Tor network, which is mentioned as the first layer for accessing the dark web in the video. The script discusses the use of the Tor browser in the context of privacy and anonymity.

💡VPN (Virtual Private Network)

A VPN is a service that creates a secure, encrypted connection between your device and a server over the internet. It is used to protect online privacy by hiding your internet activity and making it appear as though you are in a different location. The video discusses the use of a VPN as part of a layered approach to accessing the dark web and questions its effectiveness and safety.

💡Layer

In the context of the video, 'Layer' refers to the different stages or steps involved in accessing the dark web. The script outlines three layers, starting with the Tor browser, then a VPN, and finally the dark web itself. Each layer represents an additional step for privacy but also raises questions about the necessity and potential risks.

💡De-anonymization

De-anonymization is the process of identifying an anonymous entity. In the video, it is mentioned in the context of the low probability of successfully de-anonymizing a user of the Tor network due to its decentralized and encrypted nature. The concept is central to the discussion on the security of using the dark web.

💡ISP (Internet Service Provider)

An ISP provides customers with internet access services. The video discusses the visibility of a user's activities to their ISP, particularly when accessing the Tor network. It raises concerns about whether using a VPN can effectively hide the fact that a user is connecting to the Tor network from their ISP.

💡

💡Threat Model

A 'Threat Model' is a theoretical framework used to design systems with a focus on security and to identify, quantify, and prioritize risks. The video establishes a threat model to understand who should be concerned about hiding their Tor usage from their ISP, such as criminals or activists.

💡Criminal Activity

The term 'Criminal Activity' is used in the video to describe actions that are illegal and subject to prosecution. It is discussed in the context of people who might be using the dark web for illicit purposes and the potential risks associated with being detected by law enforcement.

💡Law Enforcement

Law enforcement refers to the organizations and authorities responsible for upholding the law. In the video, it is mentioned in the context of how they might monitor and track individuals using the dark web, particularly those using VPNs to connect to Tor, which could make them stand out.

💡Quantum-resistant

Quantum-resistant refers to cryptographic algorithms that are believed to be secure against attacks by quantum computers. The video discusses the use of quantum-resistant tunnels in VPNs as a way to protect user information, although it also notes that such users might still be easily identifiable.

💡Running a Tor Relay

Running a Tor relay involves contributing to the Tor network by allowing traffic to pass through one's own server, which can enhance the overall privacy and security of the network. The video suggests that instead of using a VPN, users could run their own Tor relay to support the network and maintain privacy.

Highlights

Network Chuck has posted a video on how to access the dark web in 2023, which has become one of his most viewed videos this year.

The video suggests using a VPN in conjunction with the Tor browser, which is a common question and topic of debate within the Tor community.

Many official Tor forums and subreddits advise against using a VPN with Tor, suggesting it's unnecessary and could be counterproductive.

Tor provides a high level of encryption and anonymity by routing traffic through three different servers, making it superior to chaining VPNs.

The decentralized nature of Tor allows anyone to run a relay, further enhancing privacy by reducing the chance of traffic log correlation.

Using a VPN primarily to hide Tor usage from an ISP may not be effective, especially in countries where Tor is blocked.

Criminals on the dark web are often caught due to operational security mistakes unrelated to Tor, such as using personal accounts to advertise hidden services.

A VPN connection to Tor stands out more than a direct connection and could attract unwanted attention from law enforcement.

Law enforcement can monitor edge traffic from Tor nodes and VPNs, making VPN-to-Tor connections highly suspicious.

Using a VPN like NordVPN with Tor is not recommended due to its requirement for personal information and lack of anonymous subscription options.

Instead of using a VPN with Tor, it's suggested to use Tor as intended, blending traffic with millions of other users for better anonymity.

Running your own Tor relay on a VPS can be a more beneficial use of resources, enhancing the network's resilience against surveillance.

Using a VPN to connect to Tor is deemed unnecessary and potentially harmful to privacy, as it can make users more conspicuous.

The video recommends against mixing VPNs with Tor, especially when using services like NordVPN that require extensive personal information.

For those concerned about privacy, the video suggests using a VPN like Mulvad that accepts cryptocurrency and doesn't require an email for account creation.

Mulvad's app is open-source and supports quantum-resistant tunnels, providing a higher level of security.

Despite these options, using a VPN with Tor still makes users stand out and is not advised for those seeking to blend in with regular Tor traffic.

The video concludes that using a VPN with Tor is not recommended and suggests contributing to the Tor network by running a relay instead.

Transcripts

play00:00

a couple of weeks ago Network Chuck

play00:01

posted this video to his channel titled

play00:03

how to access the dark web in 2023 three

play00:07

layers and this is already one of the

play00:09

more popular videos that he's uploaded

play00:11

this year at least by view count and of

play00:13

course Network Chuck has one of the most

play00:15

popular Tech tutorial channels on the

play00:18

whole platform I mean his hacking of the

play00:19

YouTube algorithm has been way more

play00:22

impressive than most other channels in

play00:24

this space and his production quality is

play00:26

actually way better as well but anyway

play00:29

this how to to access the dark Web video

play00:32

it really stood out to me because the

play00:34

first layer is pretty basic right you're

play00:37

connecting to the tour browser on

play00:38

Windows that's pretty normal but then

play00:41

for Layer Two we're involving a VPN

play00:44

we're first connecting to a VPN and then

play00:46

to the tour browser now whether or not

play00:49

you should use a VPN with tour is

play00:51

actually one of the most common

play00:52

questions asked about tour in recent

play00:54

years in fact if you Google that

play00:56

question you're going to get like 20

play00:58

million results and when you look at

play01:00

results from the official tour forums

play01:03

and from the tour subreddit most of the

play01:06

time the people there are going to tell

play01:07

you no don't do this it's not necessary

play01:10

and it's possibly even a bad idea so why

play01:15

is it that our boy Chuck is recommending

play01:17

that we involve a VPN for layer 2 and

play01:21

layer three dark web activity is he

play01:24

purposefully trying to get people that

play01:26

want to visit the dark web to do so in

play01:29

an unsafe way or people want to increase

play01:31

their security is he trying to make them

play01:33

unsafe probably not but I'm going to go

play01:36

over the details of using a VPN with

play01:38

tour so that you can make an informed

play01:41

decision for yourself if you want to use

play01:43

a configuration that even the tour devs

play01:46

don't recommend so tour and vpns do the

play01:50

same thing in terms of encrypting

play01:52

traffic and changing your IP address but

play01:55

T does this three times over because

play01:58

you're going through three different

play01:59

hops three different servers with three

play02:01

different layers of encryption so tour

play02:03

is kind of like chaining three different

play02:05

VPN servers together except it's even

play02:07

better than that because of the

play02:08

decentralized hosting anybody with an

play02:11

internet connection and a computer can

play02:13

run a tour relay I've done so myself so

play02:17

if you connect to tour one hop might

play02:19

belong to an FBI controlled server the

play02:22

second hop might be my server and the

play02:24

third might be a KGB controlled server

play02:26

but the odds of us three getting

play02:29

together and comparing our traffic logs

play02:31

on our servers in order to De anonymize

play02:33

you is very very slim and even if it did

play02:37

happen T establishes new circuits every

play02:40

10 minutes meaning every 10 minutes or

play02:42

so your traffic is going through three

play02:44

completely different servers so tour is

play02:47

clearly much much better at keeping your

play02:50

traffic private and Anonymous than using

play02:52

one or many vpns chain together but what

play02:56

if you wanted to hide the fact that you

play02:58

are using tour in in the first place

play03:00

from your ISP if you connect to tour

play03:03

then your ISP can see that you're doing

play03:05

that and maybe that's an issue that evpn

play03:08

can mitigate well first let's establish

play03:11

what our threat model here is because

play03:13

the way I see it there's really only two

play03:16

kinds of people who should be concerned

play03:17

with hiding the fact that they're using

play03:19

tour from their ISP and that is people

play03:22

that are actually doing crime or you

play03:24

know organizing protest on tour or

play03:27

anything that might actually cause a

play03:29

global entity like interpole to come

play03:31

after you or if you're in a country like

play03:35

Iran or China where they block

play03:37

connections to T and so you have to go

play03:39

through some kind of Bridge to get to

play03:41

tour in the first place well for the

play03:44

folks in countries like Iran and China

play03:47

Tor actually has Aus gated bridges that

play03:50

serve that very purpose there are

play03:52

servers that put a great deal of effort

play03:55

into trying to hide the fact that

play03:57

they're associated with the tour Network

play03:58

they're not on a list that you can look

play04:00

up their traffic doesn't really look

play04:01

like tour traffic um so blocking those

play04:05

or is pretty difficult but it is

play04:08

possible to identify these off you

play04:10

skated Bridges with very aggressive

play04:12

scanning and deep packet inspection and

play04:14

this is actually something that China

play04:17

has had a great deal of success with

play04:19

doing in blocking tour with the great

play04:22

firewall but they've also had a

play04:24

tremendous amount of success with

play04:25

blocking VPN connections because those

play04:29

are just as easy to identify as a tour

play04:32

Bridge there's no special

play04:34

technology that makes it harder to

play04:36

identify a VPN user than a tour user and

play04:40

so the result is only vpns or the only

play04:43

vpns that you can use in China are ones

play04:46

where the government has approved them

play04:48

which should make you ask some questions

play04:51

like hey are they keeping logs on

play04:53

Chinese citizens or not or you know are

play04:56

these servers that the Chinese

play04:57

government just has direct access access

play04:59

to themselves uh so the only other ones

play05:03

that you're able to connect to VPN wise

play05:06

are ones that they haven't identified

play05:09

yet ones that they haven't identified as

play05:10

an unsanctioned VPN but they're going to

play05:14

be just as difficult or just as easy to

play05:17

identify as new ausc tour Bridges so I

play05:20

don't really think you're gaining

play05:22

anything by using a VPN if your country

play05:25

censors tour now let's talk about people

play05:28

that are using tour

play05:30

uh who are likely to get targeted by

play05:31

interpole or their government right

play05:33

people who are criminals or whatever

play05:36

would a VPN protect them probably not in

play05:38

fact we actually have a lot of data

play05:41

available to answer this question

play05:42

because criminals on the dark web when

play05:44

they get persecuted the techniques that

play05:47

law enforcement used to catch them come

play05:49

out in court records and 99% of the time

play05:52

people get caught through very simple

play05:54

opsc mistakes that had nothing to do

play05:57

with tour like Dread pirate Roberts the

play05:59

founder of Silk Road he got caught

play06:01

because he signed up to a clear web drug

play06:03

user Forum with his personal Gmail

play06:05

account and he used it to advertise his

play06:08

hidden service there and I think he also

play06:10

used that same Gmail account on stack

play06:12

Overflow to solicit help with building

play06:14

the hidden Service uh pom pom purin so

play06:18

he also revealed his real Gmail account

play06:20

and private messages that he had with I

play06:23

think it was omnipotent you know another

play06:25

hacker several years ago so when the FBI

play06:28

seized that other hacker 's website they

play06:31

got the DMS and then they were able to

play06:33

find that real email associated with pal

play06:36

and there's been dozens of other cases

play06:38

like this where people left traces

play06:41

behind of their dark web activity they

play06:43

didn't keep their clear web activity

play06:45

completely separate from their dark web

play06:47

activity so your ISP knowing that you

play06:49

connect to tour sometimes that's not

play06:52

going to be the piece of evidence that

play06:54

gets you caught or makes you seem more

play06:57

suspicious uh in fact a VPN that's

play07:00

connecting to tour is going to stand out

play07:03

way more than just you know a regular

play07:05

Home Connection going directly to tour

play07:08

and if your adversary is a global one

play07:10

like interpole then they can monitor the

play07:13

edge traffic of every tour node and

play07:15

every VPN and every ISP and I can tell

play07:18

you right now the most interesting

play07:19

traffic is going to be those connections

play07:21

going from a VPN to tour because

play07:24

whoever's on the other end of that

play07:25

traffic is very paranoid and really

play07:28

doesn't want you to see what they're

play07:30

doing so if I was a federal agent

play07:33

observing all this Edge traffic the VPN

play07:35

toour packets are going to be the first

play07:37

ones that I'm going to try to break with

play07:39

a quantum computer or better yet just

play07:42

send some of our agents over to your VPN

play07:44

provider tell them that I think they're

play07:46

routing traffic for terrorist into the

play07:48

dark web and your VPN provider is going

play07:51

to comply they're going to give us

play07:53

access to all the information that they

play07:55

have on you which is going to be your

play07:57

home IP address at the very least and if

play08:00

you use nordvpn like Network Chuck here

play08:03

I'm probably also going to get your

play08:04

email address your full name and the

play08:06

credit card that you use to sign up with

play08:08

nordvpn with since Nord enforces kyc so

play08:13

my conclusion with this mixing vpns with

play08:16

tour idea is that it's a bad one

play08:19

especially the way that Network Chuck

play08:21

did it with using nordvpn which you know

play08:24

that they're very hard to get an

play08:26

anonymous subscription from uh you can't

play08:28

pay them with cash or Monero and they

play08:30

force you to create an account with your

play08:32

email address and he's also using the

play08:36

proprietary nordvpn app to connect to

play08:39

Nord instead of putting their server

play08:41

info into openvpn and connecting that

play08:44

way so this is definitely not the way

play08:46

that I would recommend to use a VPN

play08:48

withour really I wouldn't recommend

play08:50

doing that at all but if you're really

play08:53

really wanted to for some reason uh I

play08:56

would say use a VPN like mulvad that

play08:58

accepts Monera and doesn't require you

play09:00

to give them an email address in order

play09:02

to create an account uh and even then I

play09:06

don't really like using VPN apps because

play09:08

of the added bloat that you know they

play09:11

add to it but mad's app is at least GPL

play09:15

licensed and earlier this year they

play09:17

added support for Quantum resistant

play09:19

tunnels in the app so at least with this

play09:23

you can avoid revealing sensitive

play09:25

information like your name and email to

play09:28

get mulvad and then at least the bridge

play09:30

that you're getting into the tour

play09:32

network is going to be Quantum resistant

play09:34

and you know won't be broken with a

play09:36

quantum computer but you're still going

play09:38

to stick out like a sore thumb because

play09:41

millions of people are connecting

play09:42

directly to the tour Network every

play09:44

single day where while you can probably

play09:47

count the people that are going into

play09:49

tour through a Quantum resistant tunnel

play09:51

on your fingers and toes and uh those

play09:54

people they're going to be at the very

play09:56

tip top of the fed's list of connections

play09:59

to crack um or they might just use the

play10:02

$5 wrench method you know nobody even

play10:06

mulvad is going to take a smack with a

play10:07

wrench for you so don't use vpns to

play10:10

connect to tour it's unnecessary and

play10:12

it's probably going to make you stick

play10:14

out like a sore thumb and you know

play10:17

instead of using vpns if you know

play10:20

someone who is using a VPN to connect a

play10:23

tour or just uses a VPN to hide their IP

play10:25

from services that don't block tour

play10:27

recommend them to just use tour like a

play10:30

normal person so that their traffic can

play10:32

be mixed with the millions of other

play10:34

people that are using tour normally

play10:36

every single day which is a big part of

play10:38

what actually makes this network work

play10:40

you everyone's connection looks the same

play10:43

uh so you can't Point anyone out and

play10:44

also that $5 a month that you're going

play10:47

to pay for an average VPN connection

play10:49

could easily go towards you running your

play10:52

own tour relay on a cheap VPS which

play10:54

helps everybody that's using the tour

play10:56

network uh since it further reduces is

play10:59

the likelihood of all three hops being

play11:01

government controlled servers for the

play11:03

cost of one spooky VPN subscription you

play11:07

could be routing a couple terabytes of

play11:09

traffic every single month for other

play11:11

privacy enthusiasts like you you enjoyed

play11:14

this video please like it and share it

play11:16

in order to hack the algorithm follow me

play11:18

on Odyssey and get yourself the come and

play11:22

find it hoodie it's starting to get cold

play11:24

I've actually been wearing it every

play11:25

single day on the farm for the past

play11:27

couple of weeks so get the hoodie so

play11:29

that you can keep yourself warm and

play11:31

support my channel by getting it on

play11:33

base. win and you also get 10% off

play11:35

storewide when you use Monero XMR at

play11:38

checkout have a great day

Rate This

5.0 / 5 (0 votes)

Связанные теги
VPN SecurityTor NetworkPrivacy ConcernsCybersecurityDark Web AccessISP TrackingQuantum ResistanceVPN RecommendationsCriminal ActivityGlobal SurveillanceTechnical Tutorial
Вам нужно краткое изложение на английском?