Hey, folks! Please, tell me what you think about Tornet + VPN combination. To be exact in-browser VPN extention. If you connect to TOR proxy first and then connect to VPN you don’t expose your real IP to a VPN-provider and conceal the fact you’re using TOR (to prevent captchas on sites etc ). This way you could use any VPN (even free tear propriety) Am i right?


I have a feeling you’re on to something, but also feel this might be needed for a niche use case.
And like another comment pointed out, in-browser extensions obviously only impact the browser. But like you said you’ll be using it to prevent sites from knowing you’re using tor so that should be alright.
I like this idea for using “free” or suspicious VPNs. But all this routing would totally slow down the connection, especially on the already limited free vpn connections.
Excellent! Thank you so much for such a comprehensive answer.
I appreciate that you broke it down for me and mentioned few other nuances worth considering. If i understood it correctly, this combination (in this particular order) is not so reasonable because a VPN would still see what i’m doing and i just would be trading off my traffic data for option to hide Tor from sites i visit (in case if i use a “free” VPN). Unfortunately my network managing skills are very limited. Ideally one day i’d like to set up something like: own proxy 1 (or VPN) - Tor - own proxy 2 (or VPN). This way i could eliminate ISP snooping and make entry and exit proxies unfamiliar with each other.
Thank you for shearing your opinion!
I tried it because i felt like it makes sense and decided to ask what people think about it. Browsing with Tornet terminal tool for Linux feels more than pleasantly. Also I was surprised when i found out that many websites let me in after captchas or don’t inspect my connection at all. But i have not tried it with VPN on top for extensive session.