diff --git a/_items/1-Guide.md b/_items/1-Guide.md index 0b5b08b..5038446 100644 --- a/_items/1-Guide.md +++ b/_items/1-Guide.md @@ -59,6 +59,7 @@ _Disclaimer: This is for education / research._ -\>> [Important Concepts](#important-concepts)
- -\> _[Tor](#tor)_
+ - -\> _[Tor with VPN](#tor-with-vpn)_
- -\> _[Tor Usage](#tor-usage)_
- -\> _[Tor Operating Systems](#tor-operating-systems)_
- -\> _[Tor Browser(s)](#tor-browsers)_
@@ -147,6 +148,21 @@ If you are using an "amnesic" setup such as Tails or anon-whonix on Qubes OS, yo
+#### Tor with VPN + +Using Tor with a VPN has both upsides and downfalls. +This setup will vary from person to person based upon usage, threat models and other factors only you can determine. + +Using a VPN with Tor has its downfalls. +One of the main reasons you should use a VPN with Tor is if you are concerned with your ISP watching for Tor traffic and you can *reasonably* trust your VPN provider. + +To prevent your ISP or another adversary from viewing Tor traffic, you are also able to use Tor bridges for such, but if it is not critical to use bridges, do not as there are other people who benefit from bridges. +Using a VPN will proxy your Tor traffic to another ISP, which hopefully is less malicious than an adversary you are hiding this traffic from. + +Using a VPN will increase latency, along with potentially messing with the guard node selection. + +
+ #### Tor Usage Tor is extremely important for our setup.