Stop Using Tor With VPNs

Mental Outlaw
16 Oct 202311:41

Summary

TLDRIn this video, the host discusses the controversial topic of using a VPN with the Tor network. While some argue that a VPN adds an extra layer of security, the host points out that Tor is already highly effective at anonymizing traffic through its multi-hop encryption system. The video also addresses concerns about ISPs detecting Tor usage and the potential risks of using a VPN, especially in countries with strict internet censorship. The host advises against mixing VPNs with Tor, suggesting that it may actually draw more attention from authorities. Instead, they recommend running one's own Tor relay to contribute to the network's privacy and security. The video concludes with a call to action to support the channel and a reminder of the importance of privacy in the digital age.

Takeaways

  • 🌐 The first layer of accessing the dark web using Tor is basic, involving connecting to the Tor browser on Windows.
  • 🛡️ Layer Two involves using a VPN before connecting to the Tor browser, which is a common question and generally discouraged by the Tor community.
  • 🔒 Tor (The Onion Router) provides a higher level of privacy and anonymity compared to VPNs by routing traffic through three different servers with three layers of encryption.
  • 🔑 The decentralized nature of Tor allows anyone to run a relay, making it difficult for traffic logs to be compared and users de-anonymized.
  • 🔒 Tor establishes new circuits every 10 minutes, further enhancing user privacy by changing the servers through which the traffic passes.
  • 🕵️‍♂️ People who should be concerned about hiding their Tor usage from their ISP are those involved in criminal activities or living in countries that block Tor connections.
  • 🚧 In countries like Iran and China, using a VPN or accessing Tor through bridges can be risky due to government surveillance and control.
  • 🔎 Law enforcement often catches criminals on the dark web due to operational security mistakes unrelated to Tor, such as using personal accounts for clearnet and darknet activities.
  • ⚠️ Using a VPN to connect to Tor can actually make users more conspicuous, especially if the VPN provider is required to keep logs or can be compelled to provide user information.
  • 💡 For those who want to enhance their privacy, running their own Tor relay on a VPS can be a more effective and altruistic approach than using a VPN.
  • 💰 The money spent on VPN subscriptions could be better used to support the Tor network by running a relay, which benefits the entire community.
  • 📉 Using VPNs with Tor is generally not recommended due to the potential risks and the fact that Tor is designed to provide strong anonymity on its own.

Q & A

  • What is the title of the video posted by Network Chuck?

    -The title of the video is 'How to access the dark web in 2023 three layers'.

  • Why does Network Chuck recommend using a VPN for the second layer when accessing the dark web?

    -Network Chuck recommends using a VPN for the second layer to potentially increase security and privacy, although it is a debated topic within the Tor community.

  • What is the general consensus in official Tor forums and subreddits regarding the use of a VPN with Tor?

    -The general consensus in official Tor forums and subreddits is that using a VPN with Tor is not necessary and could even be a bad idea.

  • How does Tor provide privacy and anonymity compared to a VPN?

    -Tor provides privacy and anonymity by routing traffic through three different servers with three layers of encryption, making it more secure than chaining VPN servers together.

  • Why might someone want to hide the fact that they are using Tor from their ISP?

    -People might want to hide their Tor usage from their ISP to avoid scrutiny or potential legal issues, especially if they are in countries that block or monitor Tor connections or if they are involved in activities that could attract law enforcement attention.

  • What are the two main categories of people who should be concerned with hiding their Tor usage from their ISP?

    -The two main categories are people who are engaging in criminal activities or organizing protests on the dark web, and those who are in countries like Iran or China where connections to Tor are blocked.

  • How does using a VPN with Tor potentially make a user more visible to authorities?

    -Using a VPN with Tor can make a user more visible because the traffic from a VPN to Tor stands out and may be targeted for scrutiny by law enforcement or intelligence agencies.

  • What is the author's recommendation for a VPN service that could be used with Tor if someone insists on doing so?

    -The author recommends using a VPN service like Mulvad, which accepts Monero for payment and doesn't require an email address to create an account.

  • Why does the author suggest that running one's own Tor relay on a VPS might be a better use of money compared to paying for a VPN?

    -Running a Tor relay helps the Tor network by increasing the diversity of entry points, making it harder for traffic analysis and surveillance. It also contributes to the privacy of all Tor users and can be a more ethical use of resources.

  • What is the author's final conclusion on mixing VPNs with Tor?

    -The author concludes that mixing VPNs with Tor is a bad idea, as it is unnecessary and likely to make the user stand out, potentially attracting unwanted attention.

  • What is the significance of Tor establishing new circuits every 10 minutes?

    -The practice of establishing new circuits every 10 minutes ensures that a user's traffic is routed through different servers, enhancing privacy by making it more difficult to track or analyze a user's activity.

  • Why does the author suggest that using a VPN to connect to Tor might lead to more information being revealed to authorities?

    -The author suggests that VPN providers, especially those like NordVPN that enforce Know Your Customer (KYC) policies, may be compelled to share user information with authorities, which could include personal details and home IP addresses.

Outlines

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Mindmap

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Keywords

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Highlights

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Transcripts

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now
Rate This

5.0 / 5 (0 votes)

Related Tags
VPN SecurityTor NetworkPrivacy ConcernsCybersecurityDark Web AccessISP TrackingQuantum ResistanceVPN RecommendationsCriminal ActivityGlobal SurveillanceTechnical Tutorial