Hi, > Tor -> VPN For this way, your real Internet requests will be made by your VPN server. So you just expose directly your identity : given the IP the server at the other side will see, itâs possible to back to your VPN provider, and so on to your real identity (VPN logs, VPN auth, billing informationsâ). Tor is not really usefull in this case. > VPN -> Tor On this way, you still have to provide billing infos or other to your VPN provider, so if VPN server is seized, your identity can be found. And all your data requests are available in clear form on the VPN server. Tor not really protect your identity too. So in both cases, just avoid VPN behind or in front of Tor. (As always, depends of your threat model :D) -- Aeris ProtÃgez votre vie privÃe, chiffrez vos communications GPG : EFB74277 ECE4E222 OTR : 922C97CA EC0B1AD3 https://cafÃ-vie-privÃe.fr/
Description: This is a digitally signed message part.
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk