Yes, you should connect to Tor via a VPN

Jonah Aragon
29 Nov 202325:03

Summary

TLDREl video aborda la polémica sobre si utilizar un VPN antes de conectarse a Tor, argumentando a favor de esta práctica. Se desmiente la idea de que un VPN y Tor juntos son innecesarios o perjudiciales, y se explica que conectarse a un VPN antes de Tor puede proporcionar ventajas significativas en términos de privacidad y seguridad. El contenido destaca que, en la mayoría de los casos, la configuración VPN+Tor no hace que el usuario se destaque negativamente, y ofrece plausibles argumentos para aquellos que desean ocultar su uso de Tor a proveedores de servicios de internet o administradores de red. Además, se abordan errores comunes y se proporciona orientación sobre cómo utilizar un VPN con Tor de manera adecuada, subrayando la importancia de la confianza en el proveedor de VPN y la utilización de HTTPS para proteger la privacidad en línea.

Takeaways

  • 🔒 Utilizar un VPN antes de conectarse a Tor puede ser una buena idea, especialmente si te preocupa la privacidad y la seguridad de tu conexión.
  • 🌐 El proyecto Tor reconoce los beneficios de usar un VPN para no destacar tanto en la red, aunque no lo recomiende activamente.
  • ❌ Una de las confusiones es que Tor nunca recomienda el uso de un VPN o puente de Tor, pero en la realidad, usar un VPN con Tor proporciona ventajas legítimas.
  • 🚫 El uso de Tor es observable por tu red local, lo que puede representar un riesgo real para muchas personas.
  • 🏛️ En el caso de Harvard, un administrador de red deanonimizó a un usuario de Tor basado en los metadatos del tráfico, demostrando que los administradores de red o el ISP pueden representar una amenaza.
  • 🎭 Muchos escenarios en los que las personas podrían querer ocultar su uso de Tor no son relacionados con el gobierno, como el caso de un denunciante utilizando Tor en la red de su empleador.
  • 📡 Al usar un VPN antes de Tor, tu tráfico se mezcla mejor con el tráfico de usuario de VPN común, proporcionándote un nivel de denegación plausible al ocultar el hecho de que estás conectando a Tor desde tu ISP.
  • 🔍 Los puentes de Tor son efectivos para eludir la censura en el momento, pero no para ocultar el uso de Tor en el análisis de la red histórica.
  • 🚨 No existe evidencia de que las agencias como Interpol puedan actuar como adversarios globales pasivos en el mundo real, lo que implica que la configuración VPN+Tor no los expone más que el uso de Tor solo.
  • 🛡️ La conexión a Tor a través de un VPN ofrece una mejor denegación plausible, ya que tu ISP no captura todos los datos de paquetes y los almacena para siempre.
  • ✅ Mi consejo es conectarte primero a tu VPN y luego a Tor a través de ese VPN, lo que te proporciona una capa adicional de privacidad frente a tu ISP.

Q & A

  • ¿Por qué podría ser una buena idea usar un VPN antes de conectarse a Tor?

    -Usar un VPN antes de Tor puede proporcionar ventajas legítimas, como hacer que el tráfico sea menos sospechoso y proporcionar una cierta plausibilidad de negación al ocultar el hecho de que se está conectando a Tor desde el ISP.

  • ¿Por qué el proyecto Tor reconoce los beneficios de usar un VPN?

    -El proyecto Tor reconoce que usar un VPN puede ayudar a que un usuario no se destaque en la red, simplificando el consejo y evitando que Tor sea visto como una red sospechosa.

  • ¿Cuáles son las dos situaciones que Mental Outlaw menciona donde las personas podrían necesitar ocultar su uso de Tor a su ISP?

    -Mental Outlaw menciona a personas que son criminales y a personas en países que bloquean Tor como las dos situaciones donde podrían necesitar ocultar su uso de Tor.

  • ¿Por qué se podría considerar peligroso que un administrador de red o un ISP pueda observar el uso de Tor?

    -Un administrador de red o un ISP que pueda observar el uso de Tor podría representar una amenaza similar a la de un ente global pasivo, pudiendo deanonymizar a un usuario basado en los metadatos del tráfico en la red.

  • ¿Cómo es que el uso de Tor puede no proporcionar la anonimato completo que muchas personas creen?

    -El uso de Tor es observable en una red local, lo que representa un riesgo real para muchas personas, y el hecho de que el tráfico de Tor sea modificado o monitoreado por nodos de salida maliciosos también puede llevar a la deanonimización.

  • ¿Por qué se recomienda en algunos casos usar un puente obfuscado (bridge) de Tor junto con un VPN?

    -Un puente obfuscado puede ayudar a ocultar la huella del tráfico y a proteger contra el análisis de tráfico, ofreciendo una capa adicional de privacidad incluso si un adversario obtiene visibilidad en el túnel VPN.

  • ¿Cuál es la configuración recomendada para conectarse a un VPN y luego a Tor?

    -La configuración recomendada es conectarse primero a su VPN y luego conectarse a Tor a través de ese VPN, lo que permite que el tráfico se mezcle con el tráfico de otros usuarios de VPN y brinde una mejor plausibilidad de negación.

  • ¿Por qué no se recomienda conectarse a un VPN a través de la red de Tor?

    -Conectar a un VPN a través de Tor elimina la ventaja de que Tor cambie frecuentemente la ruta del circuito a través de la red, lo que drásticamente perjudica la anonimato del usuario.

  • ¿Cómo puede un usuario estar expuesto al riesgo de deanonimización si su tráfico Tor no está cifrado?

    -Si el tráfico no está cifrado, como el tráfico HTTP plano, puede ser modificado por un nodo de salida malicioso de Tor y puede contener información personal que pueda llevar a la deanonimización del usuario.

  • ¿Por qué es importante siempre usar HTTPS al navegar sobre Tor?

    -Es importante usar HTTPS para proteger el tráfico de ser modificado o monitoreado por nodos de salida de Tor, lo que podría exponer información personal y llevar a la deanonimización del usuario.

  • ¿Cómo puede un usuario estar más expuesto al análisis de tráfico si utiliza un VPN antes de Tor?

    -El uso de un VPN antes de Tor no aumentará la huella del tráfico, pero si el ISP o el administrador de red puede detectar el tráfico de Tor a través del túnel VPN, podría requerir más recursos para intentar deanonimizar al usuario.

  • ¿Qué son algunos de los mitos comunes que se desacreditan en el video sobre el uso de un VPN con Tor?

    -Algunos mitos desacreditados incluyen la idea de que usar un VPN con Tor hace que el tráfico sea más fácil de detectar, que se pierde la ventaja de Tor al usar un VPN, y que desactivar el VPN antes de conectarse a Tor es necesario, lo cual no es cierto.

Outlines

00:00

🔒 VPN antes de Tor: ¿Por qué y cómo?

El video discute si se debe usar un VPN antes de conectarse a Tor, con la conclusión de que sí, probablemente debería hacerlo. Se aborda la crítica de Mental Outlaw sobre el uso de VPN con Tor, argumentando que existen escenarios donde ocultar el uso de Tor es crucial, y que un VPN puede proporcionar ventaja adicional. Además, se aclara que Privacy Guides no tiene afiliación con proveedores de VPN, y que su enfoque es basado en evidencia y transparencia.

05:03

🚧 VPN y Tor: Aclaraciones y Consideraciones

Se abordan malentendidos sobre el uso de un VPN con Tor, como la idea de que un VPN hace que el tráfico sea más sospechoso o que los criminales son los principales beneficiarios de la privacidad. Se argumenta que el uso de un VPN antes de Tor puede ser beneficioso para evitar la censura y para obtener una denegación plausible ante posibles análisis de tráfico por parte de ISP o administradores de red.

10:07

🌐 Adversarios Globales y el Uso de VPN con Tor

Se desmiente la afirmación de que usar un VPN para conectarse a Tor hará que un usuario sea más visible para entidades internacionales como Interpol. Se aclara que no hay evidencia de que tales entidades puedan actuar como Adversarios Globales Pasivos, y que en el peor de los casos, un usuario no estaría peor con un VPN+Tor que solo con Tor.

15:11

🛡️ Protegiendo tu Tráfico con VPN y Tor

Se discute la posibilidad de que un ISP o administrador de red detecte el uso de Tor a través de un VPN a través de técnicas de huella dactilarización de tráfico. Se sugiere el uso de un transporte plúggable (puente) para aumentar la protección contra la huella dactilarización. Además, se destaca que el uso de un VPN proporciona una mejor denegación plausible que el uso de Tor solo.

20:12

🏠 Uso de VPN con Tor: Consejos y Precauciones

Se proporciona consejo sobre el uso de un VPN con Tor, destacando que si bien en algunos países se puede conectar directamente a Tor sin preocupación, en otros casos, el uso de un VPN antes de Tor es altamente recomendado. Se aclaran algunos mitos comunes sobre la combinación de VPN y Tor, y se ofrecen recomendaciones para usarlos de manera segura y efectiva.

Mindmap

Keywords

💡VPN

Una VPN, o Red Privada Virtual, es una tecnología que permite a los usuarios cifrar y redirigir su tráfico de Internet a través de un servidor remoto, logrando así la privacidad y la seguridad de sus comunicaciones. En el video, se discute la importancia de usar una VPN antes de conectarse a Tor para mejorar la privacidad y ocultar el tráfico de Tor a los ISPs, proporcionando un nivel de denegación plausible.

💡Tor

Tor es una red de Internet de código abierto y anónima que permite a los usuarios navegar por la web sin revelar su identidad o ubicación. Se utiliza para proteger la privacidad y evitar la censura, pero también es vulnerable a ciertas formas de análisis de tráfico. En el video, se argumenta que conectarse a Tor a través de una VPN puede proporcionar una capa adicional de privacidad.

💡Privacidad

La privacidad es el derecho a estar libre de la observación no deseada o interferencia, especialmente en lo que respecta a la información personal. El video aborda cómo el uso de una VPN y Tor en conjunto puede aumentar la privacidad en línea, ocultando el tráfico de los usuarios a los proveedores de servicios de Internet (ISP).

💡Seguridad en línea

La seguridad en línea se refiere a la protección de la información personal y la identidad en la red. El video discute la combinación de VPN y Tor como una práctica recomendada para mejorar la seguridad en línea, al proteger contra el análisis del tráfico y la identificación de los usuarios por parte de actores malintencionados.

💡Denegación plausible

La denegación plausible es la capacidad de negar legalmente haber llevado a cabo una acción, debido a la falta de evidencia concluyente. En el contexto del video, se sugiere que usar una VPN antes de Tor proporciona denegación plausible, ya que oculta la intención del usuario de conectarse a la red de anonymización Tor.

💡ISP

Un ISP, o Proveedor de Servicios de Internet, es una compañía que proporciona acceso a la red de Internet a los usuarios. En el video, se destaca que los ISPs pueden ser una amenaza para la privacidad, ya que pueden monitorear y registrar el tráfico de sus clientes, y se argumenta que usar una VPN puede ayudar a ocultar el uso de Tor de los ISPs.

💡Análisis de tráfico

El análisis de tráfico se refiere a la práctica de examinar y monitorear el tráfico de red para detectar patrones o actividades específicas. El video menciona que, aunque el análisis de tráfico puede ser un riesgo, el uso de una VPN puede dificultar la capacidad de actores malintencionados para determinar el contenido de los datos transmitidos a través de Tor.

💡Tor Bridges

Las Tor Bridges, también conocidas como puente de entrada o nodos de entrada, son servidores que ayudan a los usuarios a conectarse a la red Tor cuando están bloqueados o bajo censura. Aunque son útiles para eludir la censura, el video señala que no proporcionan protección contra el análisis del historial de tráfico de los ISPs.

💡Censura en Internet

La censura en Internet se refiere a la práctica de restringir el acceso a ciertos contenidos o servicios en línea por parte de gobiernos o entidades controladoras. El video discute cómo el uso de una VPN puede ayudar a evitar la censura en países donde Tor y otros servicios de anonymización son bloqueados.

💡Privacidad Guides

Privacy Guides es una organización sin fines de lucro y orientada a la comunidad que promueve la privacidad y la seguridad en línea a través de recursos educativos y colaborativos. En el video, se menciona Privacy Guides como una fuente de información y orientación sobre la privacidad, y se destaca su enfoque basado en la evidencia y el compromiso con la transparencia.

💡Threat Model

Un modelo de amenazas (threat model) es una herramienta utilizada para identificar y priorizar las posibles amenazas que pueden afectar la seguridad y privacidad de un sistema o individuo. En el video, se hace referencia a diferentes modelos de amenazas para discutir cuándo y por qué usar una VPN antes de Tor puede ser una buena estrategia para protegerse contra ellas.

Highlights

Probablemente sí, deberías usar un VPN antes de conectarte a Tor.

El proyecto Tor reconoce los beneficios de usar un VPN para ser menos显眼 (conspicuous) en tu red.

Usar un VPN con Tor ofrece ventajas legítimas que usar Tor solo no ofrece.

Usar una configuración VPN+Tor es, en el peor de los casos, solo regresar al "punto de partida" y aún se benefician de las otras protecciones que proporciona Tor.

Hay muchas situaciones en el mundo real donde ocultar tu uso de Tor de tu ISP o administrador de red es deseable, incluso sin una motivación gubernamental.

Los administradores de red o ISP pueden representar la misma amenaza que el uso de Tor, como demuestra el caso de un usuario de Tor anonimizado por Harvard.

El uso de Tor es observable en tu red local, lo que representa un riesgo real para muchas personas.

La mayoría de la literatura en línea sobre Tor sugiere que conectarse a Tor te hace completamente anónimo, pero eso no es el caso en la realidad.

Usar un VPN con Tor no es un consejo para eludir la censura en países que también bloquean VPNs.

Los puentes (bridges) de Tor son decentes para eludir la censura, pero no ofrecen protección contra el análisis de tráfico histórico.

Si bien los puentes de Tor pueden ser una buena opción en ciertos casos, es importante tener en cuenta sus limitaciones.

No hay evidencia de que las agencias como Interpol puedan actuar como adversarios globales pasivos (GPA) en el mundo real.

Tor y un VPN no protegen contra un adversario global pasivo, ya que la seguridad de Tor depende de la no existencia de tal adversario.

La conexión a Tor a través de un VPN no te hace destacar más en tu red, a menos que tu proveedor de VPN esté recopilando registros o la agencia de aplicación de la ley ya esté monitoreando ese tráfico.

El análisis del tráfico, como el dedo impresionado de tráfico (Traffic Fingerprinting), no es un riesgo realista en escenarios del mundo real según expertos reputados.

Si te preocupa el dedo impresionado de tráfico, siempre tienes la opción de usar un VPN con un puente obfuscador (pluggable transport) para proteger aún más tu tráfico.

Usar un VPN antes de Tor te proporciona una mejor denegación plausible y te ayuda a no destacar en tu red.

Si vives en un país libre y no te preocupa que tu ISP sepa que usas Tor, puedes conectarte directamente a Tor sin un VPN.

Si tu modelo de amenaza incluye a un adversario capaz de obtener información de tu ISP o si incluyes a tu ISP o administradores de red locales, deberías conectarte a Tor a través de un VPN.

Transcripts

play00:01

Time for my hot take of the month: Should you use a VPN before connecting to Tor?

play00:06

Probably yes, actually!

play00:07

A Privacy Guides community member recently shared a video with me from Mental Outlaw

play00:11

titled “Stop Using Tor With VPNs”, and serendipitously, I happened to be looking

play00:16

into this exact topic at the time for a big rewrite of our Tor-related recommendations

play00:21

at Privacy Guides.org.

play00:22

Mental Outlaw is a pretty big name in the Privacy YouTubers space, and he makes some

play00:26

decent points in his video, but I think he misses some important nuance when it comes

play00:31

to who needs to be using Tor safely and where they’re doing so, and draws the wrong conclusion

play00:35

about the topic as a whole.

play00:37

So, I want to present my counter-argument to his claims, and then present more information

play00:42

about why using a VPN before connecting to Tor is a better idea than many seem to believe.

play00:47

This is not an attack on Mental Outlaw’s character or his other content, which I haven’t

play00:48

watched, and I of course don’t believe his video was published with malicious intent,

play00:49

I just don’t think he adequately addressed the topic here.

play00:50

Before we get started, my channel’s still a bit new here so I’ll share a little about

play00:51

myself.

play00:52

I’m the founder and a team contributor to privacyguides.org, an open-source collaborative

play00:57

resource on privacy and security, and an online community where people can share advice and

play01:02

learn more about privacy-related concepts.

play01:04

The content I’ll be presenting in this video today is mainly from my research into this

play01:08

topic as part of a rewrite of a large section of our website about Tor, and I felt this

play01:13

was important to note, because a common criticism you’ll hear when the idea of using a VPN

play01:18

with Tor is being discussed is that many resources on the topic come from people or channels

play01:23

who are closely affiliated with VPN providers themselves.

play01:26

I think it’s a mistake to dismiss arguments you see online solely based on the affiliation

play01:30

of the authors rather than the content of their argument, but regardless of that I want

play01:34

to make it clear that I and Privacy Guides are not and have never been affiliated with

play01:40

any VPN providers.

play01:41

Or with any of the providers, tools, and services we recommend on our website for that matter.

play01:46

Privacy Guides is a non-profit, volunteer-driven organization that operates on an evidence-based,

play01:51

transparency-focused approach, and we’d never have a vested interest in recommending

play01:55

one service over another outside of a genuine belief that such a service is better for your

play01:59

privacy and security.

play02:01

With that out of the way, it is still our shared opinion that using a VPN is an important

play02:06

part of improving your privacy and security posture online, and that doesn’t change

play02:11

when you use Tor.

play02:12

I’ll get into more about all that later on.

play02:14

The first misconception I see a lot, including in Mental Outlaw’s video, is that Tor never

play02:20

recommends the use of a VPN or anything other than Tor and Tor bridges.

play02:24

The reality is that Tor Project themselves do acknowledge the benefits of using a VPN

play02:29

to stand out less on your network.

play02:30

There are probably two reasons Tor doesn’t proactively recommend such a solution, it

play02:35

makes their current advice much simpler, and in an ideal world there wouldn’t be an issue

play02:41

with just using Tor, and Tor wouldn’t be seen as a suspicious network, so of course

play02:46

Tor would like to advocate for such a solution.

play02:49

These things don’t change the fact that today, right now in the real world, using

play02:52

a VPN with Tor provides legitimate advantages that using Tor alone does not, and I think

play02:58

those advantages are worth discussing.

play03:00

The other factor here is that even if the benefits of using a VPN before Tor are negated,

play03:06

you’ll virtually never be worse off with a VPN+Tor configuration like I’m suggesting

play03:12

here.

play03:13

At worst you’ll merely be “back to square 1” and still benefitting from the other

play03:17

protections that Tor provides.

play03:18

I’ll get into more about why this is the case later on.

play03:21

The second misconception, or wrong assumption Mental Outlaw makes in his video, is that

play03:27

there are very few scenarios in which people might need to hide their Tor usage from their

play03:31

ISP, he calls out two such cases: people who are criminals, and people in countries which

play03:37

block Tor.

play03:39

Ignoring the fact that these two scenarios are very common among vulnerable populations

play03:44

like political activists and journalists around the world, I believe that there are plenty

play03:49

of other real world situations where you’d want to hide your Tor usage from your ISP

play03:53

or network administrator, which are not government-related at all!

play03:57

Consider the fact that Harvard network administrators were able to deanonymize a Tor user based

play04:02

on his traffic metadata on the University’s network.

play04:05

Yes, this was a criminal case, but the fact that this occurred in the first place should

play04:10

demonstrate to you that a network administrator or your ISP can pose the same exact threat

play04:15

in any scenario!

play04:17

If Harvard can use this data to assist the FBI, you bet they (and anyone else with network

play04:22

access) can also do it for whatever reason they’d like!

play04:25

Imagine a whistleblower connecting to Tor on their employer’s network to post something

play04:26

about the company they work for, for example.

play04:27

A lot of online literature about Tor tends to suggest that merely connecting to Tor makes

play04:30

you completely anonymous, but of course this isn’t the case in reality.

play04:35

The fact that your Tor use is observable by your local network poses a real risk to many

play04:40

people.

play04:41

play04:42

Let’s take an aside here and talk about criminals for a second.

play04:44

When talking about privacy and security, we tend to reference a lot of criminal news stories

play04:48

and court cases in our research.

play04:50

I want to explain why this is the case and why you shouldn’t misconstrue this advice

play04:55

and privacy advice in general as being geared towards defending criminals.

play04:59

First off, it’s simply more newsworthy when criminals fail at privacy, and court cases

play05:03

are well-documented, so there are simply more real-world examples to point to when explaining

play05:10

privacy failures.

play05:12

This does not mean that criminals are the only people who need stronger privacy protections,

play05:16

it’s just that when the average person’s privacy protections are broken the impact

play05:21

isn’t necessarily shared with the rest of the world.

play05:24

It does not mean that the impact in non-criminal real-world situations doesn’t exist.

play05:30

Secondly, what’s lawful in one country can be criminal in another, and there are a lot

play05:34

of gray areas where it is almost certainly morally acceptable and even encouraged to

play05:39

break some laws in especially repressive countries, so the knowledge on how to do so is still

play05:44

fairly important on a societal level.

play05:46

So basically despite all this theoretical talk about “evading law enforcement,”

play05:51

this advice isn’t intended for actual criminals to evade law enforcement.

play05:55

I want you to use these examples and think about ways in which they might apply to your

play05:59

regular, every-day life, and I think you’ll find that it’s more common than you’d

play06:06

think.

play06:07

Back to the video!

play06:08

play06:09

I’ll cover the points he does make about those two scenarios first though.

play06:12

When it comes to evading censorship we’re in agreement.

play06:15

Using a VPN with Tor is not censorship circumvention advice for people in countries which block

play06:21

VPNs as well.

play06:22

The reason I do generally recommend using a VPN before Tor is to make your traffic blend

play06:27

in better with commonplace VPN user traffic, and provide you with some level of plausible

play06:32

deniability by obscuring the fact that you’re connecting to Tor from your ISP.

play06:37

Connecting to a VPN is almost always less suspicious, because commercial VPN providers

play06:42

are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions,

play06:49

even in countries with heavy internet restrictions.

play06:51

However, I do want to make an important distinction between blocking Tor bridges, and identifying

play06:58

Tor bridges here, because Mental Outlaw at least implies that if you are able to find

play07:02

a bridge which is not blocked, your connection will be safe.

play07:06

In reality, there is a danger this could pose to you if the fact that you’re using Tor

play07:10

is discovered in the future poses a risk within your threat model.

play07:13

Let me explain:

play07:15

Bridges are fairly decent at circumventing censorship, because they are unpublished and

play07:22

make efforts to obfuscate the fact that they are indeed Tor bridges.

play07:27

However, these are only transient protections because Tor bridges are virtually always eventually

play07:32

identified and blocked.

play07:34

This fact is very bad for people who want to hide past Tor usage from their ISP, which

play07:39

is almost certainly logging basic metadata like IP addresses and connection times indefinitely.

play07:46

Let me give you two examples:

play07:50

Number 1: You connect to Tor via a bridge, and your ISP doesn’t detect it because they

play07:56

are not doing sophisticated analysis of your traffic, so things are working as intended.

play08:03

4 months go by, and the IP of your bridge has been made public (as they almost inevitably

play08:11

are).

play08:12

Your ISP wants to identify Tor users 4 months ago, and with their limited logging they can

play08:21

see that you connected to an IP address which was later revealed to be a Tor bridge.

play08:27

You have virtually no excuse to be making such a connection, so the ISP can say with

play08:34

very high confidence that you were a Tor user at that time.

play08:38

Number 2: You connect to Tor via a VPN, and this works fine.

play08:43

4 months later your ISP again wants to identify Tor users 4 months ago.

play08:49

Their logs almost certainly can identify your traffic 4 months ago, but all they would likely

play08:54

be able to see is that you connected to a VPN’s IP address.

play08:58

Because your ISP almost certainly is not capturing all packet-level data and storing it forever,

play09:03

they have no way of performing advanced traffic analysis techniques after the fact to determine

play09:08

what you connected to with that VPN, and you could have plausible deniability.

play09:13

Therefore, bridges are only good at circumventing censorship in the moment, but not from hiding

play09:20

Tor usage in historical network analysis.

play09:23

Of course, this doesn’t protect you if they perform advanced traffic analysis in real

play09:27

time and are able to determine what you are doing with your VPN through some fingerprinting

play09:33

tactic, as Mental Outlaw does mention in his video as well.

play09:38

And this is not advice against using Tor bridges, you should just be aware of this limitation.

play09:44

In some cases bridges may be your only option (if all VPN providers are blocked, for instance),

play09:49

so you can still use them in those circumstances with this limitation in mind.

play09:57

The other thing you can do if very advanced traffic fingerprinting is a concern is use

play10:02

a VPN in conjunction with an obfuscating Tor bridge, that way you are still protected by

play10:07

the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility

play10:13

into your VPN tunnel.

play10:14

I’ll talk more about this later in the video.

play10:17

The last thing I’ll point out in regard to this scenario is that in the real world,

play10:21

there actually are plenty of real-world network censors who do block Tor and don’t block

play10:26

VPNs, so it’s not like a circumstance where a VPN is a valid censorship circumvention

play10:30

technique is inconceivable.

play10:33

I would still suggest that people try to use a reputable VPN to bypass censorship, and

play10:38

explore other options if that isn’t feasible on your specific network.

play10:42

play10:43

Alright, now let’s respond to his arguments regarding criminals.

play10:46

Of course we can both agree that opsec failures are much more likely to be the reason criminals

play10:50

get caught rather than network analysis, I don’t have much to add there.

play10:54

However, then he makes the argument that using a VPN to connect to Tor is going to make you

play11:01

stand out more on your network, and this is where I disagree.

play11:06

His first claim is that international entities like Interpol are Global Passive Adversaries.

play11:11

He doesn’t use that term exactly, but he describes them as if they are.

play11:16

For context, a “Global Passive Adversary” (GPA) is an entity which can monitor the network

play11:21

traffic of every Tor node, every VPN, and every ISP.

play11:25

There’s no evidence to suggest anybody, including law enforcement agencies like Interpol,

play11:31

have the capability to actually act as global passive adversaries in the real world.

play11:36

Merely having global jurisdiction doesn’t imply that your organization has on-demand

play11:41

global access to every single ISP on Earth, which would be required to perform the analysis

play11:47

he’s suggesting.

play11:48

An investigative agency would have to coordinate with every single ISP on the chain separately,

play11:53

and there are plenty of situations where that would be an impossible task.

play11:57

However, let’s give the benefit of the doubt for a second and look at a scenario where

play12:01

a global passive adversary does exist and you’re worried about defending against them.

play12:05

In that scenario, the facts are very clear: Tor does not protect you, using Tor with a

play12:11

VPN does not protect you, you are not protected against global passive adversaries in any

play12:16

scenario using Tor.

play12:18

This is very clearly defined in Tor’s threat model, and the security of Tor does hinge

play12:24

on the idea that such an adversary does not exist.

play12:28

So whether agencies like Interpol are able to act as global passive adversaries is actually

play12:33

irrelevant to this discussion in the first place.

play12:38

Let’s move on assuming that a global passive adversary doesn’t exist though, and think

play12:42

about how this would work if an international agency like Interpol was conducting an investigation

play12:48

after the fact: The ability for a law enforcement agent to determine that a VPN user connected

play12:53

to Tor (and thus, appear more suspicious according to Mental Outlaw) hinges on either your VPN

play13:00

collecting logs, or the law enforcement agency to already be monitoring traffic from that

play13:04

VPN.

play13:05

In the first case (best-case), this is avoided by virtue of the fact that your VPN provider

play13:11

isn’t collecting logs.

play13:14

Maybe a shady VPN provider will be collecting logs secretly, but I am reasonably confident

play13:19

that the VPN providers we recommend at Privacy Guides are not, and the entire point of using

play13:25

them in the first place is that you trust them to not log more than you trust your ISP

play13:30

to not log.

play13:31

However, for the sake of the argument let’s pretend your VPN provider is secretly logging.

play13:37

Then it becomes the same situation as the second case:

play13:41

In our second, worst-case scenario, the agency already has some sort of in with your VPN

play13:47

provider and is logging all that traffic.

play13:51

That means they can likely see you’re using a VPN to connect to Tor, oh no!

play13:55

However, they could just as likely do this to your regular ISP too if you don’t use

play13:59

a VPN!

play14:00

In this scenario, all this means is that you’re back to square one, and they know you connected

play14:05

to Tor but not what you connected to (because Tor obfuscates this information, of course).

play14:11

So, worst-case scenario you’re in the same place as you were without using a VPN, you’re

play14:16

not worse off than if you had just connected to Tor.

play14:19

Then he claims that connecting to Tor via a VPN will make you stick out like a sore

play14:23

thumb, and that most Tor users connect directly to Tor.

play14:27

However, this hinges on either our worst-case scenario from earlier being true, or the—frankly

play14:33

absurd—idea he poses that they can tell that you’re connecting to Tor via that VPN

play14:39

because they’ve broken the encrypted tunnel and can read your traffic.

play14:42

This scenario is unrealistic, but we can cover some possibilities here:

play14:49

The first way your ISP or network admin may be able to determine you’re connecting to

play14:53

Tor through your encrypted VPN tunnel is through analysis called Traffic Fingerprinting, perhaps

play14:59

the most realistic way to detect Tor usage inside a VPN.

play15:03

This isn’t to say that it’s realistic at all though!

play15:05

Lots of research is done into traffic fingerprinting, and many reputable experts including Tor Project

play15:10

themselves don’t believe that it is a realistic threat in real-world scenarios, because the

play15:15

research on this subject is often conducted in highly controlled, perfect environments

play15:20

that don’t correspond to actual traffic.

play15:25

If you are still concerned about the possibility of traffic fingerprinting methods being used

play15:29

to detect that you’re using Tor through your VPN provider however, you again always

play15:32

have the option to use a VPN in addition to a pluggable transport (bridge) to obfuscate

play15:39

your traffic’s fingerprint further.

play15:41

That way you are still protected by the pluggable transport's obfuscation techniques even if

play15:46

an adversary gains some level of visibility into your VPN tunnel.

play15:50

And as an aside, if you do decide to go this route, I’d recommend connecting to an obfs4

play15:55

bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake.

play16:01

The second way they could determine you’re using Tor through a VPN is the scenario we

play16:05

talked about earlier where your VPN provider is compromised or provides such logs to your

play16:09

adversary.

play16:10

As I explained earlier, this scenario is both unlikely and not going to provide much information

play16:14

to law enforcement because they still need to take the additional step of determining

play16:18

what your Tor traffic actually was.

play16:21

That being said, it’s still a potentially valid argument that if all of this occurs,

play16:25

it will make your traffic potentially more valuable to decrypt and therefore law enforcement

play16:30

might spend additional resources on decrypting your Tor traffic after they determined that

play16:35

you made the initial connection through a VPN.

play16:37

I still don’t agree this is a realistic concern for two reasons:

play16:40

First, Many people connect to Tor via a VPN already for various reasons, I don’t think

play16:46

you will stand out significantly more from other Tor users even if you do use a VPN in

play16:51

addition to Tor, as he posits, based on this factor alone.

play16:55

Second, Even if they do put extra effort into decrypting your traffic, this is still a very

play16:59

challenging task to complete.

play17:01

There’s no evidence to suggest that determining what you connected to via Tor with traffic

play17:05

analysis during investigations like this is even possible, so in our worst-case scenario,

play17:12

investigators are still posed with a virtually impossible task anyways.

play17:16

Let’s step back from all of these theories for a second anyways.

play17:20

You know what else makes you stick out on your network?

play17:24

Using Tor!

play17:25

Tor is very easy to identify on your local network if you connect to it directly, and

play17:30

using a bridge doesn’t change that by the way.

play17:32

And unlike a commercial VPN provider, most network monitors unfortunately interpret Tor

play17:37

connections as people who are likely trying to evade authorities, that is just the reality

play17:42

of the situation.

play17:43

In a perfect world, Tor would be seen by authorities as a tool with many uses, like how VPNs are

play17:49

viewed, thanks to the incessant marketing of VPNs as a tool to do mundane things like

play17:53

stream videos.

play17:56

Using a real VPN provides you with better plausible deniability along the lines of “I

play18:00

was just using it to watch Netflix” that Tor simply doesn’t at this time.

play18:06

The ultimate point I’m trying to make with my VPN before Tor recommendation is that such

play18:10

a configuration only provides you with additional privacy protections from your ISP, with the

play18:15

understanding that you all should in theory trust your VPN provider over your ISP anyways.

play18:21

Therefore, any of the potential risks of using a VPN before Tor are basically irrelevant

play18:26

anyways, because we’ve already established that the risks of your ISP having that knowledge

play18:30

are almost certainly higher.

play18:32

If you want more information about that topic, I would suggest reading the VPN overview articles

play18:39

on Privacy Guides.org.

play18:41

play18:42

Alright, we’re at the point where I want to share with you my actual advice on this

play18:45

topic.

play18:48

If you live in a free country, are accessing mundane content via Tor, and you aren't worried

play18:54

about your ISP or local network administrators having the knowledge that you're using Tor,

play18:58

you can likely connect to Tor directly via standard means like Tor Browser without worry

play19:03

and without using a VPN.

play19:06

This is helpful on a large scale, because it helps de-stigmatize Tor usage for other

play19:10

users, and gets us closer to the perfect ideal world Tor envisions that we talked about earlier.

play19:17

However, if you already use a trusted VPN provider, or if your threat model includes

play19:22

an adversary which is capable of extracting information from your ISP, or your adversaries

play19:27

include your local ISP itself, or any local network administrators before your ISP, then

play19:33

I think you should almost certainly connect to Tor through a VPN.

play19:35

play19:36

Let’s quick run through a few common misconceptions:

play19:39

#1: Using a VPN with Tor makes you stand out more because you’re sending your traffic

play19:43

through “4 hops” - This doesn’t make sense because of how Tor is designed.

play19:51

If you could stand out on the Tor network based on what your network configuration looks

play19:54

like before the Tor connection, this would obviously defeat the purpose of Tor in the

play19:59

first place, because you could be fingerprintable based on your ISP’s configuration.

play20:04

Using a VPN before Tor should not increase your fingerprintability to either the destination

play20:10

or to Tor relays.

play20:12

#2: Similarly, another one is that using a VPN with Tor gives you a “permanent entry

play20:18

mode” - This misunderstands the role that a VPN plays in this situation.

play20:23

Your VPN is replacing your ISP, not any Tor nodes.

play20:28

The reality is that things on your network before your Tor entry node can’t be detected

play20:33

and fingerprinted by observers on the Tor network or at your destination.

play20:37

This is basically the same thing as #1, but I just want to reiterate here that as long

play20:41

as your last three connections are through the Tor network, you’re not losing any benefits

play20:46

of the Tor network by using a VPN too.

play20:48

#3: Is that need to disable the VPN you already use before connecting to Tor.

play20:54

This is basically the crux of what we’ve been talking about throughout this video,

play20:57

but I want it to be clear that if you use a VPN already, there is no reason to disable

play21:02

it before connecting to Tor.

play21:04

Many online resources take the guidance about using a VPN with Tor too far and claim that

play21:09

it’s actively dangerous to do this, and there are no situations where a VPN and Tor

play21:13

can be combined.

play21:15

This isn’t true when you’re connecting to that VPN before Tor, and disconnecting

play21:20

from your VPN just to connect to Tor will only serve to make your network traffic more

play21:24

suspicious, and potentially cause other things on your system which were previously protected

play21:29

by your VPN to leak information.

play21:32

There is no added danger to keeping your VPN connection enabled at all times.

play21:37

play21:38

Alrighty!

play21:39

Now that all of this is finally out of the way, let me talk to you about using a VPN

play21:43

with Tor properly.

play21:44

To be absolutely clear, the configuration I’m recommending is that you connect to

play21:49

your VPN first, and then connect to Tor through that VPN.

play21:54

Some VPN providers and other online resources occasionally recommend the other way around,

play21:59

making a connection to your VPN through the Tor network.

play22:02

This is commonly recommended to circumvent things like websites blocking Tor exit node

play22:07

IP addresses, however, this is extremely ill advised.

play22:11

Normally, Tor frequently changes your circuit path through the network.

play22:15

When you choose a permanent destination VPN (connecting to a VPN server after Tor), you're

play22:21

eliminating this advantage and drastically harming your anonymity.

play22:25

It’s difficult to set up a bad configuration like this accidentally, because it usually

play22:32

involves you making deliberate changes to your proxy settings in Tor Browser, or or

play22:36

setting up custom proxy settings inside your VPN client which routes your VPN traffic through

play22:41

the Tor Browser.

play22:42

As long as you avoid these non-default configurations, you're probably fine, but you can always double-check

play22:47

by visiting Tor’s IP check website in Tor Browser.

play22:53

play22:54

I hope we’ve established the reasons why I think it makes sense for most people to

play22:56

use a VPN alongside Tor.

play22:58

I just want to leave you with a few final notes:

play23:02

- Tor never protects you from exposing yourself by mistake, such as if you share too much

play23:06

information about your real identity.

play23:29

- Tor exit nodes can modify unencrypted traffic which passes through them.

play23:34

This means traffic which is not encrypted, such as plain HTTP traffic, can be changed

play23:39

by a malicious exit node.

play23:54

Never download files from an unencrypted http:// website over Tor, and ensure your browser

play24:00

is set to always upgrade HTTP traffic to HTTPS.

play24:05

- Tor exit nodes can also monitor traffic that passes through them.

play24:09

Unencrypted traffic which contains personally identifiable information can deanonymize you

play24:15

to that exit node.

play24:17

Again, we recommend only using HTTPS over Tor.

play24:25

If you want to learn more about improving your privacy and security habits overall,

play24:29

again I suggest reading through the knowledge base at privacyguides.org.

play24:32

Finally, thank you for being interested enough in your personal privacy to watch through

play24:36

this video, I hope to post more content on this topic in the future, so get subscribed

play24:41

so you don’t miss out.

play24:42

And please share this video with others who don’t understand the implications of using

play24:46

a VPN before Tor, I hope that this content is able to spur further discussion about this

play24:51

topic.

play24:52

Be sure to leave a comment if you have anything to add or ask, or consider joining the Privacy

play24:56

Guides forum, a great place to get perspectives from many different sources.

play25:00

I’ll see you all in my next video!

Rate This

5.0 / 5 (0 votes)

相关标签
VPNTorPrivacidadSeguridadVPN antes de TorPrivacidad en líneaAnálisis de tráficoEvadir censuraPrivacidad de datosRedes de monitoreoAnonimato digital
您是否需要英文摘要?