On 4/18/20 9:26 AM, Anhangá wrote:
But is it possible to somehow make TOR Browser to access clearnet using
a VPN connection after the TOR routing? Do I have to do some special
config in the TOR Browser to allow that?
Em sábado, 18 de abril de 2020 10:07:16 UTC-3, Jarrah escreveu:
> My goal is connect to my VPN after the TOR routing (Bypass the
> tor censorpship in some websites).
This somewhat defeats the purpose of using TOR. You now have an
identifiable address due to having a (hopefully paid) vpn. They can
track you. Any anonymity provided by TOR is taken away by the VPN.
> The problem is, when I set mt whonix-workstation to connect to
sys-VPN over
> whonix-gw, My Tor Browser do not work anymore. If I disconnect
the VPN
> inside sys-VPN, the Tor Browser start working as usual, but when
my VPN is
> connected, it stops.
This is by design. TOR browser assumes it can speak TOR protocols and
connect to .onion addresses (etc). However, the VPN will come out onto
the clearnet, rather than TOR's network. TOR browser cannot lookup TOR
addresses, nor can it connect to anything relying on TOR.
If you want to do this to access clearnet sites, you'd have to use a
standard browser. The VPN should work just fine, so long as you're not
trying to connect to TOR specific services through it. Though, please
see above warning about doing so.
The only reason I can think of to do this is if you live in a location
that blocks VPNs, but is fine with TOR. Otherwise, you have exactly the
same security model as just using the VPN, plus the overhead and attack
surface of TOR/Whonix.
Someone on the Whonix forums might know the definitive answer to your
question. But I'd guess there is little or no advantage to using
Torbrowser over Firefox when it can't speak to the Tor router.
Note that Firefox has recently incorporated some Torbrowser features, so
you could use it with Tracking Protection set to Strict, and
'privacy.firstparty.isolate' set to True, 'privacy.resistFingerprinting'
set to True, in addition to using the User-Agent Switcher extension. I
think these are a good idea whether or not you use a tunnel or proxy.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/166b78ec-c061-dcb9-f6fe-d31a797b6bcb%40posteo.net.