Em sábado, 18 de abril de 2020 16:24:22 UTC-3, Chris Laprise escreveu: > > On 4/18/20 9:26 AM, Anhangá wrote: > > But is it possible to somehow make TOR Browser to access clearnet using > > a VPN connection after the TOR routing? Do I have to do some special > > config in the TOR Browser to allow that? > > > > Em sábado, 18 de abril de 2020 10:07:16 UTC-3, Jarrah escreveu: > > > > > My goal is connect to my VPN after the TOR routing (Bypass the > > > tor censorpship in some websites). > > This somewhat defeats the purpose of using TOR. You now have an > > identifiable address due to having a (hopefully paid) vpn. They can > > track you. Any anonymity provided by TOR is taken away by the VPN. > > > The problem is, when I set mt whonix-workstation to connect to > > sys-VPN over > > > whonix-gw, My Tor Browser do not work anymore. If I disconnect > > the VPN > > > inside sys-VPN, the Tor Browser start working as usual, but when > > my VPN is > > > connected, it stops. > > > > This is by design. TOR browser assumes it can speak TOR protocols > and > > connect to .onion addresses (etc). However, the VPN will come out > onto > > the clearnet, rather than TOR's network. TOR browser cannot lookup > TOR > > addresses, nor can it connect to anything relying on TOR. > > > > If you want to do this to access clearnet sites, you'd have to use a > > standard browser. The VPN should work just fine, so long as you're > not > > trying to connect to TOR specific services through it. Though, > please > > see above warning about doing so. > > > > The only reason I can think of to do this is if you live in a > location > > that blocks VPNs, but is fine with TOR. Otherwise, you have exactly > the > > same security model as just using the VPN, plus the overhead and > attack > > surface of TOR/Whonix. > > Someone on the Whonix forums might know the definitive answer to your > question. But I'd guess there is little or no advantage to using > Torbrowser over Firefox when it can't speak to the Tor router. > > Note that Firefox has recently incorporated some Torbrowser features, so > you could use it with Tracking Protection set to Strict, and > 'privacy.firstparty.isolate' set to True, 'privacy.resistFingerprinting' > set to True, in addition to using the User-Agent Switcher extension. I > think these are a good idea whether or not you use a tunnel or proxy. > > -- > Chris Laprise, tas...@posteo.net <javascript:> > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 >
Thank you for the answer Chris. I'm not planning to use Firefox over a TOR connection. I just want to use the TOR browser but, in the tor end node, route my traffic to a VPN and then to the Internet. I set the ProxyVM as you said in the qubes-vpn-support and it worked just fine. LINK IS UP and running. But if my ProxyVM is running my VPN connection, TOR browser in the Whonix-WS do not work. If I disconnect the VPN inside my ProxyVM, TOR browser also works just fine. The problem is only when I'm trying to use TOR Browser with VPN link UP. So, I'm guessing that is some config that I have to do inside TOR Browser to use my VPN The newest firefox has some really good anti-fingerprint features, but nothing compares to TOR Browser, like in-depth fingerprinting combining settings as Screen Resolution and viewport... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b7389565-ee2c-4f65-aea4-c9efc2fe7ca2%40googlegroups.com.