Client anonymity
- Tor via VPN - if you need to hide the fact that you're using Tor from your ISP
- VPN over Tor - if the site doesn't allow you to connect via Tor
A VPN provides privacy from your Internet Service Provider (ISP), but:
- You're simply transferring trust from your ISP to your VPN provider.
- Your VPN provider can see your traffic.
The Tor network provides anonymity by routing your traffic through three random nodes around the world.
Benefits:
- decentralization
- distributed trust across different countries and jurisdictions
- there is a low probability that all 3 nodes are controlled by an attacker, which could lead to deanonymization
Usage depends on two factors:
- Client side (your country)
- Server side (website or service)
If Tor is allowed:
- you → Tor → website
- You → VPN → Tor
- the situation is extremely risky
- Possible bypass methods:
- V2Ray
- Cloak
If it allows:
- Tor → website
- Tor → VPN → website
- You can try residential proxies.
- or refuse to use
If Tor is allowed:
- you → Tor → website
- You → Tor → VPN → Website
- You → VPN → Tor → Website
- You → VPN → Tor → VPN → Website
You can test different configurations in separate virtual machines (VMs).
Note:
There's no point in using Tor twice—once is enough.
Scheme:
You → VPN → Tor → Website
Pros:
- The provider doesn't see Tor
- When deanonymizing, only the VPN IP is visible
- You need to trust your VPN provider
- no-log policy
- the possibility of anonymous payment (for example, cryptocurrency)
Even through a VPN, Tor can be identified by patterns.
Solution:
use DAITA (Defense Against AI-guided Traffic Analysis).
This:
- masks traffic
- protects against packet sniffing
Problem:
Websites block Tor node IPs
Solution:
You → Tor → VPN → Website
Result:
- the provider sees Tor
- VPN doesn't know who you are
- The site thinks you're a regular VPN user.
- VPN must be purchased anonymously
- it is necessary to segment activity
(eg China, Iran)
Problem:
- VPN and Tor blocking
- criminal liability
Special nodes not included in public lists.
Used for:
- bypassing blockages
- hiding Tor usage
Additional layer of obfuscation:
- masks Tor traffic
- complicates detection
Risk:
Even if you are not detected now, it may be discovered later that you were using Tor.
In countries with strict censorship:
- Using Tor is associated with high risks
- consequences are possible even after some time
in such circumstances, it's better to avoid anonymity than to risk your security.