1
00:00:00,760 --> 00:00:05,010
so this is probably one of the more important videos throughout this course.

2
00:00:05,010 --> 00:00:08,170
and it's talking about vpns and tor.

3
00:00:08,170 --> 00:00:15,320
there's a lot of discussion about the benefits of using a vpn or the drawbacks, especially when using a vpn in conjunction with tor.

4
00:00:15,340 --> 00:00:26,480
in previous videos, we talked about using vpns and how it's a good alternative for safer, more anonymous browsing and hiding your browsing data from your isp, but how it might not be perfect in every situation.

5
00:00:27,180 --> 00:00:41,160
now this video is specifically going to be discussing using tor and a vpn together so that you might be able to hide your tor usage from an isp while also further protecting your tor browsing and creating a secure session.

6
00:00:41,740 --> 00:00:44,930
earlier we talked about the process tor goes through to connect.

7
00:00:44,930 --> 00:00:51,510
you connect to your internet provider, your traffic goes to the tor, tor then sends back information about the nodes.

8
00:00:51,510 --> 00:01:04,570
so then it can create a circuit and then you get the circuit information and a connection is made pretty straightforward, high level overview of the tor connection process and a vpn layered on top of that.

9
00:01:04,569 --> 00:01:11,310
there's a couple ways you could do a vpn, but you could essentially connect to your vpn provider 1st before you configure tor.

10
00:01:11,310 --> 00:01:14,400
and in that case, you would still connect to your isp like normal.

11
00:01:14,500 --> 00:01:22,320
you would then connect to the vpn and then that connection tor would happen and they would send the data through the circuit the same way and you would be connected.

12
00:01:24,660 --> 00:01:28,560
on tor's website, it discusses vpns with tor.

13
00:01:28,660 --> 00:01:31,330
again, there's two methods to connect to a vpn.

14
00:01:31,330 --> 00:01:33,610
there's you to the proxy to tor.

15
00:01:33,610 --> 00:01:34,680
that's the 1st method.

16
00:01:34,780 --> 00:01:41,920
and then you to tor to anything else and vpn proxy, the end website.

17
00:01:42,940 --> 00:01:47,150
it's important to read through what they say and we will read it here to talk about it.

18
00:01:47,150 --> 00:01:54,750
so it says, if you connect to a vpn, the vpn machine default internet connection will be through the vpn, right?

19
00:01:54,750 --> 00:01:58,090
so the tor browsing bundle or tor client will route through it.

20
00:01:58,090 --> 00:02:05,040
this can be a fine idea, assuming your vpn and ssh provider network is in fact sufficiently safer than your own network.

21
00:02:05,460 --> 00:02:09,680
another advantage here is that it prevents tor from seeing who you are behind the vpn.

22
00:02:10,180 --> 00:02:22,710
so if somebody does manage to break tor and learn the ip address your traffic is coming from, but your vpn or ssh provider was actually following through on their promise that they don't watch you don't remember and will somehow magically make it.

23
00:02:22,710 --> 00:02:25,670
so nobody else is watching easier, then you'll be better off.

24
00:02:25,670 --> 00:02:29,790
you can read more about this from that link at the bottom, right?

25
00:02:29,790 --> 00:02:37,640
it will also be attached to the lesson module if you want to learn more, but essentially there's a few reasons why you might use a vpn.

26
00:02:37,900 --> 00:02:41,270
if you want to hide tor use from your isp, that might be a good reason.

27
00:02:41,270 --> 00:02:51,280
if you want to add some additional security, which it alluded to in that previous description, talking about how well if tor breaks and your ip does leak, if you're going through a vpn, it is a bit better.

28
00:02:51,780 --> 00:03:04,250
you can access sites that block tor exit nodes if you're using a vpn on the back end and you can double encrypt your traffic and add more hops, thus making your sessions generally more secure, but much slower.

29
00:03:04,250 --> 00:03:05,120
keep that in mind.

30
00:03:05,700 --> 00:03:10,950
it's also important to note that while they sound good, hiding from your isp isn't really what it's for.

31
00:03:10,950 --> 00:03:16,610
doubly encrypting your traffic just makes things more complicated and adding more hops just makes you slower.

32
00:03:16,610 --> 00:03:20,880
so not a lot of great reasons to add a vpn if those are your main selling points.

33
00:03:21,220 --> 00:03:28,510
so if you have tor going to a vpn or if you have your vpn and then tor, there's a couple different considerations.

34
00:03:28,510 --> 00:03:33,510
if you connect tor 1st and then connect to your vpn, some benefits is the exit node.

35
00:03:33,510 --> 00:03:35,690
can't see the data you're sending, right?

36
00:03:35,690 --> 00:03:36,850
because now you're encrypting it.

37
00:03:36,850 --> 00:03:43,430
so on the tour network itself, that last hop to the exit node, if it happens to be unencrypted, it's not anymore.

38
00:03:43,430 --> 00:03:44,720
it's now encrypted.

39
00:03:45,140 --> 00:03:48,530
some drawbacks though, vpn logging and profiling exist.

40
00:03:48,530 --> 00:03:55,160
vpn providers do and can log in profile doesn't mean every single one does, but do you know for sure they don't?

41
00:03:55,300 --> 00:03:59,790
blocking of vpn services is a very common practice by endpoints and websites.

42
00:03:59,790 --> 00:04:07,680
so you have to be considering that and bottlenecks and network speed tor is already slow and adding another layer on top of that is going to make it slower.

43
00:04:08,580 --> 00:04:22,840
on the flip side though, if you connect to a vpn 1st and then tor, your isp might not see that you're using tor now, considering you're using a vpn that's encrypted and backtracking, meaning if they find your actual ip, it leads back to the vpn.

44
00:04:22,980 --> 00:04:32,970
however, the drawbacks are similar here where vpn logging and profiling still exist and your isp can still fingerprint you when using the vpn and get information through the browser.

45
00:04:32,970 --> 00:04:35,200
so it's important to use the tor browser here.

46
00:04:36,940 --> 00:04:40,050
and generally the idea of encryption works something like this.

47
00:04:40,050 --> 00:04:48,490
if you were to connect through your isp to tor, there's a session there and then through tor to a vpn and then a vpn to where you're going.

48
00:04:48,490 --> 00:04:51,960
you're essentially creating what is the three hop steps?

49
00:04:52,140 --> 00:04:54,040
there's just multiple in the way.

50
00:04:54,500 --> 00:05:04,040
similar idea for a vpn and then tor, but notice the security there where you're now encrypting your session between you and the vpn.

51
00:05:04,100 --> 00:05:08,760
and then it's encrypting between you and tor and the outside world.

52
00:05:09,140 --> 00:05:17,880
so generally, if you're going to use a solution, generally, if you're going to use a solution using a vpn and then tor might be the only useful one.

53
00:05:17,900 --> 00:05:27,840
and unless you know specifically why you're going to do it, if you have specific needs or reasons, i wouldn't really use a vpn with tor at all, unless you just have a vpn on most of the time.

54
00:05:28,060 --> 00:05:34,760
if you are going to use a vpn, the solution number two here where you're connecting to a vpn 1st and then tor is not a bad solution.

55
00:05:34,980 --> 00:05:38,870
just be aware of network speeds and be aware that you're using a good vpn.

56
00:05:38,870 --> 00:05:47,250
if you go to darkwebacademy dot com vpn, you can find information about a vpn we support and a vpn that does not keep logs.

57
00:05:47,250 --> 00:05:50,120
and they've proved this in federal court, which is why we like them.

58
00:05:50,420 --> 00:05:53,330
but if you have any questions about this, be sure to let me know.

59
00:05:53,330 --> 00:05:55,690
happy to hear discussions or disagreements.

60
00:05:55,690 --> 00:06:11,090
if someone disagrees with my assessment here, we didn't dive too deep into the technical weeds about how it might work, the different encryption methods, the different ways you could use vpn or a proxy and combination using public wi- fi, then using tor and then a vpn or vice versa.

61
00:06:11,090 --> 00:06:18,680
all of those are different methods to connect, but generally using tor on its own is going to be fine unless you have a specific need in mind.

62
00:06:18,860 --> 00:06:20,930
so with that, we'll wrap this video up.

63
00:06:20,930 --> 00:06:22,430
if you have any questions, let me know.

64
00:06:22,430 --> 00:06:23,960
otherwise, i'll see you in the next one.