Stop Using Tor With VPNs

Ғылым және технология

In this video I discuss whether or not you should use a VPN before connecting to Tor and why this isn't a good idea in most situations.
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Пікірлер: 2 400

  • @MentalOutlaw
    @MentalOutlaw8 ай бұрын

    some people are asking me about Orbot in VPN mode. Using Orbot does NOT connect you to a VPN separate from the Tor network, it treats the Tor network like a VPN in the sense that it routes all traffic through Tor (Browser, message apps, games, etc) like a VPN app would, very similar to how TAILSOS routes all of its traffic through Tor.

  • @oofyeetmcgee

    @oofyeetmcgee

    8 ай бұрын

    Hey, what are your thoughts on Invidious?

  • @Ulvis_B

    @Ulvis_B

    8 ай бұрын

    How many times NordVPN got hacked?

  • @rayers1000

    @rayers1000

    8 ай бұрын

    I thought Orbot was considered a honeypot or some such these days??

  • @pipbernadotte6707

    @pipbernadotte6707

    8 ай бұрын

    Network Chuck? More like Fedwork Chuck, amirite u guys?

  • @Moha-bb7xm

    @Moha-bb7xm

    8 ай бұрын

    Iam behind 7 proxies iam protected

  • @martuuk8964
    @martuuk89648 ай бұрын

    Mullvad stores nothing about you. They were raided recently on a warrant for customer information - any and all information about a specific customer - and they could not turn over anything and Swedish police walked away with nothing. If Swedish law ever changes to where they cannot operate like this, they will either move their HQ or shut down. They are extremely principled. If they are ever served with legal documents authorizing active/live wiretap that are enforceable in a country where a given server is, they will simply shut the targeted server down.

  • @49531

    @49531

    8 ай бұрын

    Is this actually the ultimate honeypot

  • @bruhzzer

    @bruhzzer

    8 ай бұрын

    ​@@49531they've been in buisness for a long time now, either they're really commited (honeypots usually aren't (as far as we know)) or they aren't honeypots

  • @notafbihoneypot8487

    @notafbihoneypot8487

    8 ай бұрын

    They also now run everything in RAM officially

  • @Bond2025

    @Bond2025

    8 ай бұрын

    @@49531 Tor is, it was compromised in 2013 in preparation for Operation Onymous. The download had all the security settings set to low by default when previously they were high and for months when security settings were changed to high, scripts were running on every site to assist law enforcement. I even downloaded a exe from the site that contained a profiler trojan, but tor project ignored complaints. Many exit nodes are compromised. Don't use a VPN, they provide all your data to law enforcement and manipulate it. The reason people use a VPN and Tor is because they connect to a bridge to hide what they are doing. Tor is not secure, not private and you can be uncovered at any time. Remember the DEFCON talk that was going to show how this worked - it was pulled and they went quiet. VPNs might not directly log, but hosts that own equipment have to by law. I recently found WeVPN was a honeypot, they vanished once people realised and the police operation was shut down. One server was on a UK police IP. If you connected in to Manchester, UK, the police were watching. Some say these Encryption In transit email services like Proton are honeypots.

  • @scoobs9696

    @scoobs9696

    8 ай бұрын

    @@49531 Imagine.... - Hopefully not

  • @metal-beard
    @metal-beard8 ай бұрын

    Chuck has a history of advertising stuff in the guise of ‘tutorials’.

  • @michaelm1

    @michaelm1

    8 ай бұрын

    Yeah, I've been thinking the same thing. It was just a one big VPN provider commercial masquerading as a tutorial.

  • @WholesomePotato1

    @WholesomePotato1

    8 ай бұрын

    I can't stand that soft spoken shill.

  • @danielrobinson3654

    @danielrobinson3654

    8 ай бұрын

    Almost every video is "And to do that, we'll be using our sponsor..." and then some service that collects all of your data

  • @EchterAlsFake

    @EchterAlsFake

    8 ай бұрын

    @@danielrobinson3654For real, thats why I stopped watching him. Also he doesn't really care about questions on his comment section at all. His Instagram OSINT video has millions of views, but Osintgram doens't work anymore, because the author didn't update it and lots of people don't understand that. I tried to tell them and got blocked from his channel. He could atleast like make a pinned comment or something where he tells, that the video isn't up to date.

  • @tranquility6358

    @tranquility6358

    8 ай бұрын

    You know that production quality doesn't come for free, right? I don't blame people for wanting to make money by legitimate means. Some of his sponsors are genuinely useful.

  • @Akac3sh
    @Akac3sh4 ай бұрын

    the folding table in the back really adds to the atmosphere of this whole video

  • @webbonyoutube
    @webbonyoutube8 ай бұрын

    Correction: The entry node is a "guard node" which is selected from a limited, mostly unchanging list. The idea is that if even if you roll the dice over and over and eventually get two bad nodes, those nodes that never change will keep you safe.

  • @DERADI30

    @DERADI30

    8 ай бұрын

    That doesn't actually sound safer. If you want to track tor connections and all of them route through a smaller list of nodes that doesn't often change that's the first target. Is there more to the system? It sounds like it's just "trust me bro"

  • @jp46614

    @jp46614

    8 ай бұрын

    @@DERADI30 You have a point, I would assume that small group of nodes are from trusted sources and probably some other characteristics which would make it less susceptible to spying, but then again if one of those trusted nodes get breached, this would probably eventually get discovered and it would no longer be a trusted node, but until that happens you still have 2 other relays which are very very likely to not be controlled by mutual organisations which keeps it relatively safe, but it still all comes down to chance really And by trust I don't mean each node has an assigned reputation because that would definitely make it an easy target but rather I would guess it comes down to heuristics on volunteer nodes.

  • @Kilzu1

    @Kilzu1

    7 ай бұрын

    @@jp46614 It would be concern from privacy point of view, but TOR is based on theory of "you can't trust ANYTHING at all". Your connection to between each node is encrypted with different encryption and only 1st node you connect to, knows your real IP or what comes from your computer. This means every node past first node, knows only from which node this traffic came from and what is next destination, if someone tries to track you from one of those never changing nodes, they would have to know what traffic from which source out of thousands of others they would have to follow. More simply, even if someone tries to trace you from the first node your connection is going to, they would have to know at least the country you are at, ISP you are using and public IP address your computer is using, since they would have to screen through hundreds if not thousands of different connections coming all over the world at the same time, unless you are using something like a VPN to raise eyebrows, won't reveal anything other than you are just 1 among many people who use TOR. Now even TOR isn't able to keep you 100% anonymous, I'm pretty sure there are ways to trace TOR users, it's just extremely resource and time consuming, so unless you do something that puts you under someones radar in the first place, your traffic is seen just like any traffic, regular encrypted traffic and hardly worth the time and effort to look into that deeply.

  • @indawgwetrust4255

    @indawgwetrust4255

    7 ай бұрын

    @@jp46614 Here: www-users.cse.umn.edu/~hoppernj/single_guard.pdf

  • @sirsneedster

    @sirsneedster

    3 ай бұрын

    Guard Node: Sees your IPS's IP address, not the content requested Middle Node: Can't see shit, just moves traffic from Guard to Exit Exit Node: Sees your requested content, cannot see who you are

  • @flioink
    @flioink8 ай бұрын

    Network Chuck has never mastered the "pullout framework" - dude has like 7 kids.

  • @redrootwire

    @redrootwire

    8 ай бұрын

    💀😭

  • @zaremol2779

    @zaremol2779

    8 ай бұрын

    Good for him, honestly

  • @flioink

    @flioink

    8 ай бұрын

    @@zaremol2779 I mean if he can afford it then - sure.

  • @mattjax16

    @mattjax16

    8 ай бұрын

    It’s cuz he’s crazy religious

  • @phxsisko

    @phxsisko

    8 ай бұрын

    He's weirdly religious, so yeah, condoms are evil, etc. It's the reason I don't support his channel.

  • @vafixer8885
    @vafixer88858 ай бұрын

    as some one who lived in china for years at one point - VPNs not government approved are very popular. you usually have to have 3/4 of them since one or two might get blocked one day then come back the next while the other 2 are blocked another day, its like cat and mouse with the government and the vpn companies but the vpns always get through, either in a few days or a competitor does. hence why i had a subscription to 4 of them when i lived there.

  • @KizukiKotataki

    @KizukiKotataki

    5 ай бұрын

    Won't the government ever chase after the people there? Or are the VPNs located outside mainland china?

  • @basilalias9689

    @basilalias9689

    3 ай бұрын

    Im laughing at the image of the CCP playing whack-a-mole with VPN companies.

  • @severitas1

    @severitas1

    14 күн бұрын

    you just don't need vpn, social network of the west is full os sh**t

  • @RobertoRubio-ij3ms
    @RobertoRubio-ij3ms7 ай бұрын

    Amazing video. No commercial bs and technically accurate. Just gained a subscriber. Keep it coming. Kudos from Panama.

  • @hughjanes4883
    @hughjanes48838 ай бұрын

    You putting yourself up there with KGB and CIA TOR relays is a level of confidence I wish I had.

  • @frandurrieu6477

    @frandurrieu6477

    8 ай бұрын

    Bro fears nothing

  • @lolotrololo2275

    @lolotrololo2275

    8 ай бұрын

    What KGB?

  • @b1rdy0xf

    @b1rdy0xf

    8 ай бұрын

    @@lolotrololo2275FSB

  • @phxsisko

    @phxsisko

    8 ай бұрын

    I think it's a joke. Also, the KGB is dead, the FSB is the current iteration. FAPSI seems to be their equivalent to the NSA. KGB seems to be mostly famous due to western movies using them as the other evil spy group, etc. Which, yeah, they, the CIA, they are all super evil.

  • @lodyllog

    @lodyllog

    8 ай бұрын

    @@lolotrololo2275 KGB is like a soviet FBI

  • @johnnymnemonic1369
    @johnnymnemonic13698 ай бұрын

    Don't use VPN: Feds are checking edge node connections and get your IP address Use VPN: Feds are checking edge node connections and get your VPN IP, then have to subpoena the VPN provider to potentially get your IP. What am I missing here?

  • @schwingedeshaehers

    @schwingedeshaehers

    8 ай бұрын

    They probably also get your name, payment method, email,...

  • @user-mx6hu9yv6l

    @user-mx6hu9yv6l

    8 ай бұрын

    You're missing the fact that you are standing out from the crowd of folks that use tor browser as usual. What's the point of slightly overburdening the law inforcement if they otherwise know where to look?

  • @cyclopsvision6370

    @cyclopsvision6370

    8 ай бұрын

    Nord says they do not keep logs about users' timestamps and traffic destinations

  • @tartas1995

    @tartas1995

    8 ай бұрын

    They need to subpoena your IP too. Vpns have your payment options. Once at the vpn, they have you. Once at the ips, they have you. Ofc there is a case for this or that, what are your local laws and how are the local laws of your vpn. Which agencies are interested in tracking you and so on. But it ain't that simple

  • @thewhitefalcon8539

    @thewhitefalcon8539

    8 ай бұрын

    You're missing that feds already monitor vpns

  • @jakeplaydirty3882
    @jakeplaydirty38824 ай бұрын

    Love your logic bro 🙏 Came here after watching that Chuck video strangely. I did leave his video scratching my head a bit 😂 You make much more sense

  • @valdimer11
    @valdimer118 ай бұрын

    Chuck is all about monetization. Half of his "tutorials" are cloud based, require credentials to use, and usually only give "free trials". The dude monetizes everything, he even has a "guide" in the description down below, which is a link to his site which you have to pay for if you need any further information. My guess is Nord was probably sponsoring the video.

  • @Henry-fu2hc

    @Henry-fu2hc

    8 ай бұрын

    To be fair a lot of the time (or at least when I last him watched a couple years ago) he would often have two tutorials, one which shows running it on your own device and one running it is a cloud based server. At the very least if you have a bit of an understanding of it anyway, you can likely use the section of the cloud tutorial post-setup to have your own go at it

  • @BMW750Ldx

    @BMW750Ldx

    6 ай бұрын

    you are spot on...bro 😉😉

  • @alfredcam5213

    @alfredcam5213

    6 ай бұрын

    Why is this news or even interesting? Of COURSE he's monetizing. He is a KZreadR. LOL

  • @valdimer11

    @valdimer11

    6 ай бұрын

    @@alfredcam5213 you missed the point. It's one thing to monetize, but it's another to monetize while not "adding" anything to whichever subject the influencer is talking about.

  • @ibonihs

    @ibonihs

    6 ай бұрын

    i completely disagree with him but why would nord sponsor a video about not using vpns? :q

  • @MMOchAForPrez
    @MMOchAForPrez8 ай бұрын

    Thank God there's somebody out there who doesn't just parrot a popular opinion. It is necessary to provide a reason you don't like something when you suggest not doing it. Otherwise all your doing is making noise.

  • @jeffhicks8428

    @jeffhicks8428

    8 ай бұрын

    new media is literally garbage. interesting that the guy in this video has something most new media lacks which is basic literacy and the slimmest margin of effort in actually making content. it's not common.

  • @MMMMMMarco

    @MMMMMMarco

    8 ай бұрын

    Yup 🙏

  • @wiredfox3451

    @wiredfox3451

    8 ай бұрын

    But all the points he brought up weren't valid for the vast majority of people using a VPN + Tor, most people watching this video aren't doing it from China or a middle-eastern country that have hijacked VPN providers. If you don't trust your ISP, use a VPN with Tor, that way your ISP won't know you're accessing the Tor network.

  • @privateassman8839

    @privateassman8839

    8 ай бұрын

    ​@@wiredfox3451good point

  • @cc-dtv

    @cc-dtv

    8 ай бұрын

    Popular opinion what the fuck may be popular with the troglodytes remember to update your windows proprietard

  • @etoilefushigi
    @etoilefushigi8 ай бұрын

    If you really want to use a VPN and ensure that your opsec is as tight as possible, use a VPN to connect to a remote server like a Windows or Linux desktop, ensure that the VM is wiped when done, and connect via tor browser that way. There are many services that will provide anonymous RDPs and if you use mullvad as your VPN provider generally speaking, you're good in this regard specifically.

  • @Bond2025

    @Bond2025

    8 ай бұрын

    never use Windows, always wipe any PC completely after each use with Privazer, a shellbag cleaner and bleachbit. I spent years testing file and PC wiping software by running it and then examining PCs with EnCase. Evidence Eliminator was really good, but so is PrivaZer. Many others left multiple traces of activity. Your ISP records a lot about you and can provide police with access to your router as ALL of the commercial ones have a backdoor built in.

  • @casev799

    @casev799

    8 ай бұрын

    I'm forgetting what an RDP is in this and frankly I think there's probable to many definitions out there for me to look ghrought

  • @Daveychief23

    @Daveychief23

    8 ай бұрын

    @@casev799 Remote Desktop Protocol

  • @treemallow757

    @treemallow757

    8 ай бұрын

    Remote Desktop Protocol@@casev799

  • @visvge4934

    @visvge4934

    8 ай бұрын

    Remote desktop protocol lol

  • @go_better
    @go_better8 ай бұрын

    Thanks a lot! Gotta educate myself more on Tor and VPS. Thankfully, you got vids on the subject.

  • @thedankwalrus
    @thedankwalrus8 ай бұрын

    thanks for making a video about this topic, have always heard that using a VPN alongside TOR is a contentious topic but never knew why.

  • @henrylonghead
    @henrylonghead8 ай бұрын

    "Recommend them to just use Tor like a normal person" - Mental Outlaw

  • @qlippoth13

    @qlippoth13

    8 ай бұрын

    What else could we possibly use... softether?

  • @polinskitom2277

    @polinskitom2277

    8 ай бұрын

    ​@@qlippoth13been forever since i've used softether, any new developements on it or anything interesting happen?

  • @DOG_EATER_1887

    @DOG_EATER_1887

    4 ай бұрын

    dawg no one uses Tor with good intentions its entire purpose for most is to be used safely for BAD intentions

  • @nusplus3985

    @nusplus3985

    4 ай бұрын

    @@qlippoth13 i2p

  • @parsoniareigns

    @parsoniareigns

    4 ай бұрын

    ​@@DOG_EATER_1887yep normal folk use Windows. Might use VPN. Some normal folk might use MAC OS. Linux or Tor. Normal folk do not. Only players. You are 100percent correct.👍

  • @brad6817
    @brad68178 ай бұрын

    Chuck's linux tutorials helped me a lot. It's very annoying when he disguises a sponsorship as a tutorial and crams hacking into everything he can. I don't think he really knows as much about security as he thinks he does.

  • @obm_elijah7097

    @obm_elijah7097

    8 ай бұрын

    everyone i try to follow chuck tutorial they never work and make me go down a rabbit hole 😂

  • @starship748

    @starship748

    8 ай бұрын

    @@obm_elijah7097100% -Dude speaks in bullet points. Interesting topics but makes me cringe when he say “hacking” over and over and over.

  • @Wookiee925

    @Wookiee925

    8 ай бұрын

    ​@@obm_elijah7097there always seems to be stuff missing between steps needed for them to work. At least that's been my experience

  • @arnezbridges93

    @arnezbridges93

    8 ай бұрын

    Dunning-Kreuger syndrome, where you think you know everything because you don't know what you don't know. Best way to be "confidently incorrect" lolz.

  • @BeWhoYouWant2

    @BeWhoYouWant2

    8 ай бұрын

    I think he probably knows more than you think, but its also a business for him not a platform to educate people about cyber. Which imo just makes it worse because he KNOWS he is giving bad information but that's the only way he can make as much money so he does it anyways.

  • @heathmcrigsby
    @heathmcrigsby7 ай бұрын

    I use a vpn with tor to browse reddit just to mess with the feds

  • @toeman4628

    @toeman4628

    16 сағат бұрын

    We do a bit of federal trolling.

  • @TheSquidNinja
    @TheSquidNinja8 ай бұрын

    Recently found Chuck's content after starting my career path and subbed him too, but you're the only one I clicked the bell on. Just wanted to leave that with you.

  • @dingokidneys
    @dingokidneys8 ай бұрын

    Tor, as you said, provides a number of bridges to make the initial hop into the Tor network which effectively overcomes the concern that is supposedly addressed by using a VPN. Anyone can run a Tor Snowflake bridge as a browser extension or, if they have the compute and WAN bandwidth, as a small docker container. This helps people living under restrictive regimes and, again as you said, the more Tor traffic the safer each Tor user is. I have a Snowflake docker container running on a Raspberry Pi along with a bunch of other stuff and it's set and forget. I also have the Snowflake browser extension (overkill I know) and, apart from a tiny icon counting the number of connections you've facilitated, you wouldn't know that it's there and doing anything.

  • @dannydetonator

    @dannydetonator

    8 ай бұрын

    Damn, you're an online bunker! I used just Orbot occasionally with mobile TOR, on my stronger phone untill it recently burned battery from all the work. And a simple free VPN for PC. How would you rate these?

  • @xaxa-0x3F

    @xaxa-0x3F

    6 ай бұрын

    I would love info on what this browser extension is and if it takes away major bandwidth or whatever

  • @dingokidneys

    @dingokidneys

    6 ай бұрын

    @@xaxa-0x3F Just Google "tor snowflake" and you'll get all the info.

  • @fenio81

    @fenio81

    4 ай бұрын

    Snowflakes to jest drobnostka dla ludzi żyjących w wolnych krajach, nawet nie zauważą że ta usługa działa w tle. Jednak jest to bardzo ważna usługa dla ludzi którzy nie mieli tyle szczęścia i żyją w krajach objętych cenzurą. Każdy z nas powinien dołożyć cegiełkę do tej inicjatywy i przynajmniej zainstalować oraz włączyć rozszerzenie Snowlakes na swojej przeglądarce.

  • @angrypixelhunter
    @angrypixelhunter8 ай бұрын

    "Your VPN provider will send us the traffic" MENTAL OUTLAW IS A FED CONFIRMED!!!!

  • @cartossin
    @cartossin3 ай бұрын

    Glad someone said it. I really hate the thoughtless "Just add more layers" approach to security.

  • @talis1063
    @talis10637 ай бұрын

    My intuition with VPN has always been that you're basically replacing your ISP with another one. Only useful to tunnel around whatever part of the network you don't trust / can't get through. The tunnel ends at the VPN provider, but the VPN provider still has all the info your ISP would normally have. If you trust the VPN provider more or give them less info about yourself than your ISP then I guess that's fair.

  • @HyperionStudiosDE

    @HyperionStudiosDE

    4 ай бұрын

    It makes a huge difference because your VPN provider is preferably located in a country with much stricter data privacy laws. VPN providers are also financially incentivized to legally fight against handing out data while ISPs mostly don't give a shit.

  • @BillAnt

    @BillAnt

    3 ай бұрын

    Might as well just use a Proxy for hiding your IP to get around restrictions with less overhead and latency than VPN's. Also simpler to set up and cheaper too. VPN's used to be useful before HTTPS/TLS encryption of 99% of modern websites.

  • @Ginfidel
    @Ginfidel8 ай бұрын

    Using the stupid 'app' that comes with these VPNs is the first problem. Set up a custom router and configure an interface that routes ALL traffic through one of your VPN's servers, so that your endpoint running TOR is fully encapsulated. NordVPN supports this as does any other VPN worth it's salt. Bottom line, kenny: VPN traffic is LESS SUS than TOR traffic. ISPs keep lists of their clients who use VPNs and who use TOR. Those lists are gonna be used against everyone on them someday. You really want your residential IP on the 'raw dogging TOR' list? Seriously? If you think I'm nuts, fine, put it this way instead: your ISP does not deserve to know that you are connecting to TOR. Don't bend over and hand away that information. Let them think you're another dumb normie who fell for the "Hurr, it encrypts my why figh!" marketing.

  • @TV-vz8kv

    @TV-vz8kv

    8 ай бұрын

    Also kenny doesn't understand that "unnecessary" VPNs/proxies/tunnels are what keeps tor usable in countries where direct connection and connection through bridges is blocked. + In some countries it matters whether you connect to the tor network through VPN or directly, as it may grant you plausible deniability when giving answers to some questions from local authorities.

  • @Ginfidel

    @Ginfidel

    8 ай бұрын

    @@TV-vz8kv Could be true. But I can't really speak to that experience. I can only speak of the good ol' US of A where ISPs keep lists of everything their users are doing on the internet, and will hand them over to the feds at the drop of a hat if asked. And it's a question of when they'll ask, not if. When that day comes, the less your ISP knows, the better.

  • @OceanicManiac

    @OceanicManiac

    8 ай бұрын

    How do you set something like that up?

  • @Ginfidel

    @Ginfidel

    8 ай бұрын

    @@OceanicManiac That's a lot to type out and I can't post links, so hop over to your search engine of choice and search 'setup pfSense VPN client' and you'll get a mix of official documents and third party tutorials. pfSense is a FreeBSD firewall operating system that I run on an old gaming PC (with a few extra NICs) as a router. During setup you can leave a NIC un-mapped to LAN or WAN and instead map it as a hardware VPN interface so that anything you plug into it will have 100% of its traffic go straight thru the VPN instead of ever touching LAN/WAN Pfsense is a lot of work at first, but once configured properly, it's very rewarding and low-maintenance

  • @Lee-wh3ht

    @Lee-wh3ht

    8 ай бұрын

    @@Ginfidel so then since your so concerned might I ask what your home network looks like

  • @extraspecialk3244
    @extraspecialk32448 ай бұрын

    I have heard of a case involving a correlation attack. Which involved confirming that a suspect was showing up as "online" during chatting over a TOR service. Then the suspects ISP confirmed they were using the TOR network at the time. Granted, they already had a lot of evidence on this person.

  • @Randomnessinlife

    @Randomnessinlife

    8 ай бұрын

    Estonian government (or specifically Estonian Police & Border Control) has performed network correlation attacks against local darknet vendors by sending a succession of messages to their messaging app and then requesting ISPs to disclose info what region received their sent succession/pattern of packets. They repeat this action to narrow down from region to city, street and finally address, where they get the final end user. Similar case I know was when some government employee's credentials (or username) was seen by co-workers who thought it'd be funny to log in to her account. So they downloaded Tor and tried to log in via Tor Browser. They used TOR because they didn't want to get caught and thought using Tor would guarantee their safety. Government checked who, what IP in Estonia had downloaded Tor installer in the past few days. IIRC this was enough proof, that they downloaded TOR just recently and as the ISP also could prove they connected to Tor network around that time, but I could be misremembering that case, plus those guys went with a plea deal in the end anyway. Source: public record court documents

  • @bloodhound1182

    @bloodhound1182

    8 ай бұрын

    If they had a lot of evidence on this person already, then this case is nothing to worry about. Police can't arrest you over circumstantial evidence. Unless you're the kingpin of Silk Road or a mf international terrorist, chances are police aren't gonna have enough to prosecute you.

  • @sultanhanga

    @sultanhanga

    2 ай бұрын

    Silk Road ?

  • @extraspecialk3244

    @extraspecialk3244

    2 ай бұрын

    @@sultanhanga too long ago for me to recall now. I don't think it was.

  • @CinnaSwirls
    @CinnaSwirls7 ай бұрын

    This video was my introduction to the existence of Tor. Thank you.

  • @junglee-bee
    @junglee-bee8 ай бұрын

    Yeah, I saw that video & found that confusing & actually believed he was coming from a "right" place but thanks for clearing this 🙌

  • @cowz8496
    @cowz84968 ай бұрын

    Love your content but gonna have to disagree on this one. The main point I got from this was that there’s no point using a VPN because the way that TOR works is secure enough. If TOR works as intended, where you’ve got 3 different nodes operated by 3 different entities who don’t communicate with each other, then yea, having a VPN isn’t gonna change much because no one can tie you to the exit node in the first place. HOWEVER, is there a possibility that you connect to 3 nodes all controlled by a single agency? Getting into tinfoil territory here but yes, there is a CHANCE. And if that’s the case, it’s gonna be much easier to get your data from ur ISP than a reputable VPN provider like mullvad. I just don’t think it makes sense to criticise connecting to a VPN before accessing TOR on the basis that it doesn’t add any extra security. People use VPNS on the CHANCE that TOR isn’t as secure as you’d think.

  • @Cookiekeks

    @Cookiekeks

    8 ай бұрын

    If they compromised Tor, they might as well have compromised your VPN provider. At this point you are f-ed anyways. How far would you take this logic? There also is a chance that all 3 nodes, and the vpn are controlled by the feds, so should you always chain 2 VPNs together? Or 3, just to be sure?

  • @lydellackerman800

    @lydellackerman800

    8 ай бұрын

    and i hate this stupid fucking assumption that all vpns will just sell yo shit. Multiple vpns have been subpoenad and had NO evidence to hand out, im aware of PIA and Express currently, as for the "they can get your payment information" is only applicable if a single person is on the server, how would the feds distinguish me from the other 16 people routing through the server?

  • @user-sv6hv6ym1d

    @user-sv6hv6ym1d

    8 ай бұрын

    VPN isn't recommended because four relays would make the connection uncomfortably slow, i guess... Plus, as Kenny mentioned, four-relay would just stand out in the Web. There is no point of the feds to hope for the whole Tor connection to fall on their servers if they can see a four-relay, subpoena the VPN provider on the end of it and sit hard on that connection.

  • @ryan-el9er

    @ryan-el9er

    8 ай бұрын

    @@user-sv6hv6ym1dhow does a 4 relay stand out? how would the feds actually know it was 4 connections without investigating data from each individual node until they realize there is 4? isn’t it encrypted again at each node to prevent investigating one node from revealing which connections data was sent to which node?

  • @user-xl5kd6il6c

    @user-xl5kd6il6c

    8 ай бұрын

    @@user-sv6hv6ym1d it doesn't "stand out", there isn't even a way they can count the hops. And on the VPN, that same IP is shared by a high number of users. The only thing they know on the VPN is that you are using Tor When/If they do get the specific IP that is using Tor that is yours, they STILL have to request your info from your ISP

  • @Brian2
    @Brian28 ай бұрын

    I just want to point out that in, 2020 I believe if not then 2021, in the winter it came out Tor Guard nodes were a quarter compromised if not more so. That means that first node you use, the most important, is likely to be an enemy. The only reason to go for a Guard Node like that is to deanonymize people. Any time this is brought up and how much is the same now (Unknown. Can be 1% can be 90%) means it can not be trusted. Would you trust a VPN that shown that large of compromised servers? No. No one in videos brings this up either. Or in forums. They go all quiet and ignore it, try to change the subject. Here you don't even bring it up either, which is a shame as I wanted your input on this angle and factual evidence we have for how bad Guard Nodes are. You are saying here to trust what we know for a fact has been compromised to an insane degree. Adding a VPN that has been proven in the courts to not keep data (Mullvad) means the Guard Node being an enemy doesn't matter nearly as much. By the way the more popular it becomes for VPN-Tor means the less you stick out. With Network Chuck having that come out along with others wouldn't that be safer overall?

  • @crisper1614

    @crisper1614

    8 ай бұрын

    Very excellent critique.

  • @curious2882

    @curious2882

    8 ай бұрын

    Yes! Tor has been PROVEN compromised since 2013! When Freedom Hosting was shut down. The NSA made a whole speech about how they can de-anonymize Tor users, a tor darknet hoster was discovered and prosecuted, and it happened again in 2015 as well as 2020 just off basic googling. Tor is NOT safe! The NSA (and thus the rest of the US government if they ask) can and will find you if you get on their radar. Tor will not protect you.

  • @realcartoongirl

    @realcartoongirl

    8 ай бұрын

    yes but network chuck use nord vpn and has 7 kids

  • @Splarkszter

    @Splarkszter

    8 ай бұрын

    Network chuck was paid to fo that video in that way. Completely insecure.

  • @NeostormXLMAX

    @NeostormXLMAX

    8 ай бұрын

    people have said in the past that there is a high chance that mental outlaw is a glowie, after all he is literally subtlety advertising illegal activities and has not been blacklisted by the algorithm, and has even gotten sponsored, he also talks like alot of CIA type people.

  • @domodiak
    @domodiakАй бұрын

    Nice try, fed

  • @weathercontrol0
    @weathercontrol08 ай бұрын

    Tor over VPN is a good choice if you want to hide the fact that you are using Tor from your ISP/Government, especially if you are hosting onion sites, a lot of traffic to the Tor network is suspicious, even though nobody know what exactly are you doing there. And in countries like Russia it's pretty much a necessity at this point because all tor IPs are banned and bridges are getting constantly banned too, so VPN is only reliable choice to access Tor network, in countries with little more freedom it might not be that necessary

  • @user-jq3rf4tnd3s

    @user-jq3rf4tnd3s

    8 ай бұрын

    vpns in russia are dpi banned too

  • @Bubble23428

    @Bubble23428

    8 ай бұрын

    😂😂😂

  • @zefnine

    @zefnine

    8 ай бұрын

    This is literally the reason Tor bridges exist...

  • @ButtMonkey985

    @ButtMonkey985

    8 ай бұрын

    Did you even watch the video....?

  • @dimoniysh5075

    @dimoniysh5075

    8 ай бұрын

    Tor works for me and i in Russia lol And my isp uses dpi too

  • @Katsumato0
    @Katsumato08 ай бұрын

    I work in cyber security. We can analyze netflow to and from an IP address using some very expensive tools. It's not 100% all of the traffic since it relies on nodes placed throughout the world. It still reveals the IPs with lots of traffic from your house or wherever. There are better tools than I use at work to link the IP's. There are plenty of ways to get around this. Use regular ports and protocols (think HTTPS TCP 443) and CDNs to blend in.

  • @Akac3sh

    @Akac3sh

    4 ай бұрын

    what if i turn my pc off then back on again

  • @pitu5938

    @pitu5938

    2 ай бұрын

    @@Akac3sh same public ip 🤣

  • @Hardawayinc

    @Hardawayinc

    Ай бұрын

    I worked in cybersecurity for 5 years and you cannot analyze net flow, has to be a national threat. And still tracking has to be signed off by higher levels.

  • @serenity1378
    @serenity13787 ай бұрын

    Last time I checked the entry node rarely changes (for specific reasons relating to attack vectors and how it was decided it's better to trust the entry node and gamble that it might be evil vs changing it constantly and increasing the odds of finding an evil one somewhere along the line). Not sure if that's been changed but if it hasn't it's only node 2 and 3 that change with a new identity as standard.

  • @TheEpeebles
    @TheEpeebles6 ай бұрын

    Awesome!!! Great info, great delivery. Much appropriated

  • @specthegod
    @specthegod8 ай бұрын

    Kenny having the peoples back, as usual. Alwsys sharing as much as he can to keep people with less knowledge than him safe... I really hope you continue to make videos like this... because privacy is a human right that is slowly being STOLEN from us by governments/large tech companies... so wr need people like you on our side, now and especially in the future.

  • @dannydetonator

    @dannydetonator

    8 ай бұрын

    Yes, but you can add private mercenaries, scammers and black-hat crackers to the list. Internet is fckd though, big time.

  • @cooloutac

    @cooloutac

    5 ай бұрын

    Or he's making you a victim. Claiming a VPN doesn't necessarily add to your privacy and makes you stick out more than just using tor.. are not valid reasons to not use a VPN imo and I actually find it suspicious he's claiming they are. I clicked on the video thinking he was going to give me some actual technical reasons of how a vpn breaks the privacy of Tor but I should have known better.

  • @dawok5689
    @dawok56898 ай бұрын

    But I thought VPNs were 100% hackerproof because everyone said so.

  • @Thurgenev

    @Thurgenev

    8 ай бұрын

    It is, but you also need to be mounting an unicorn with rainbow coming out of his butt

  • @Ginfidel

    @Ginfidel

    8 ай бұрын

    lol VPNs are useless in the hands of 90% of the people who use them, but we need those people to keep using them. It normalizes VPN traffic. If 1000 more normies started using a VPN to keep themselves safe from the hackermans, that's 1000 more connections for the feds to waste their time decrypting. The more idiots who use VPNs because they think it encrypts their heckin wifi, the better. They're subsidzing those of us who actually use them properly, both financially through normalization.

  • @crisper1614

    @crisper1614

    8 ай бұрын

    @@Thurgenevthis is incorrect. The rainbow is optional.

  • @VallisMansonOfficial

    @VallisMansonOfficial

    8 ай бұрын

    Those sponsored ads for VPNs are bigger liars than infommercials for Testosterone boosting supplements 🤣

  • @Kermit2k

    @Kermit2k

    8 ай бұрын

    Same people that say tor is 100% hackerpoof.

  • @megthedingus8918
    @megthedingus89188 ай бұрын

    you explained this very well, youve peaked my interest, i subbed. nice video

  • @disfeed
    @disfeed8 ай бұрын

    For clarification regarding China's firewall. (Also known as the Great Firewall) There is actually new technology involved with identifying VPNs. A connection to a VPN creates a TLS connection. Connecting to any normal website also creates a TLS connection. So now you are essentially doubling down on TLS connections. Shouldn't be a problem right? With machine learning, it's actually possible to detect overlaying TLS connections, and block them. This is how ALL VPN's in China have pretty much been stopped. There are some cavates but unless you have some serious Linux knowledge, and spend several hours learning, it is a really difficult to evade the GFW.

  • @GenrichX

    @GenrichX

    8 ай бұрын

    Nah. Lol

  • @disfeed

    @disfeed

    7 ай бұрын

    @@wetfart420 It is region based, and some VPN's will work, but thats not the main issue. The issue is payment. Almost all online payment is tracked in China, and as such, can easily be blocked. Crypto is also banned in China which doesn't help.

  • @gusfl2

    @gusfl2

    5 ай бұрын

    I do confirm what you say. For this reason, some VPN providers use innovative tactics (base64 in plain HTTP requests. The base64 is encrypted and does contain TCP traffic) instead of famous VPN protocols like openvpn

  • @woodingot

    @woodingot

    3 ай бұрын

    The vless proxy protocol's xtls feature can detect whether the traffic is tls encrypted and avoid double tls.

  • @disfeed

    @disfeed

    3 ай бұрын

    @@woodingot Yeah, XTLS is just difficult for people to set up without proper know-how. You need a client and a server. Setting up a server is quite hard while being in China, so usually you will purchase access to an XTLS server.

  • @HollyTroll
    @HollyTroll8 ай бұрын

    Don't use tor with VPN so u wouldn't stick out to the feds.... Don't forget to buy the "COME AND FIND IT MONERO HOODIE" 😂❤

  • @alien3.0c

    @alien3.0c

    8 ай бұрын

    lmao, every single time

  • @Verpal
    @Verpal8 ай бұрын

    IMO there is like one good use case for Tor plus VPN, basically to cross the GFW of China using VPN before using Tor in your destination, using VPN to cross GFW can trigger less alarm than Tor, depends on how you set it up.

  • @maesmm
    @maesmm8 ай бұрын

    Thanks for this video, you didn't said something wrong but, the way you talk about quantum computing and cryptography, looks so much as the commercials show it as "a dangerous gouvernement weapon". Power and honor continue your videos💪

  • @Alm8hoorOW
    @Alm8hoorOW2 ай бұрын

    I’d argue that using a VPN won’t make you stand out as a threat because almost everyone is doing it. Actual threats have a whole bunch of compromised computers which they use as proxies in a network. And these guys infect and change proxies every few minutes so it’s impossible to track them down.

  • @ReclusiveAsta
    @ReclusiveAsta8 ай бұрын

    I would have to contest your reasoning. In theory a VPN shouldn't be able to see any more infomation about your Tor traffic than your ISP would. Additionally if more people used VPNs with Tor this would naturally make each individual stick out less, so it might actually be a good thing to promote. It's more risky for your ISP to know you're using Tor than it is for a VPN because 1) An ISP has more identifiable infomation about you 2) An ISP must be located in the same country that you're in.

  • @max_ishere

    @max_ishere

    8 ай бұрын

    As you've just proved in your comment: there's no additional protection

  • @ReclusiveAsta

    @ReclusiveAsta

    8 ай бұрын

    And another: 3) An ISP is most definitely keeping your logs, either to sell your data or for legality purposes, whereas a VPN isn't *necessarily* keeping your logs (as long as it's a good one!)

  • @NotKewl

    @NotKewl

    8 ай бұрын

    This is true. Also, hundreds to thousands of users may share the same IP on a VPN and, despite Kenny being a doomer and believing all VPN's are fed honeypots logging and sharing your info, a good VPN provider probably isn't logging (whereas your ISP definitively is for some countries).

  • @sveb7632

    @sveb7632

    8 ай бұрын

    ​@dedhorse5720correct me if I'm wrong, but your isp may know you're connecting to a vpn, but it has no knowledge of what's being transferred between

  • @ReclusiveAsta

    @ReclusiveAsta

    8 ай бұрын

    ​@dedhorse5720 How do you know the ISP would be able to tell using this setup? Shouldn't it only be able to see the first layer of connection?

  • @Derbauer
    @Derbauer8 ай бұрын

    Hey Mental Outlaw, we appreciate you. I think your suggestion at the end, to setup a middle Tor relay for 5$ a month so that as you use Tor you also lease bandwidth upto 1.5tb or so a month, is superb and hoping that people watching this, follow suit.

  • @phxsisko

    @phxsisko

    8 ай бұрын

    Newer DD-WRT firmware's have a TOR mode for a relay setup. I'm thinking about it since I have two of the same router flashed and capable. I'm also in the process of rebuilding my entire network to something more secure. Looking to start with a new hardware firewall (PFsense) first. Between the plugins.

  • @joer8386

    @joer8386

    7 ай бұрын

    Let me get this straight (and correct me if I am wrong in my understanding), you are PAYING Tor so that people can USE YOUR bandwidth? What do I get in return?

  • @Derbauer

    @Derbauer

    6 ай бұрын

    @@joer8386 it's about giving back, not just taking. When you use Tor, it's because volunteers are paying for the bandwidth you use. So, knowing that you're indebted to the kindness and generosity of anonymous volunteers, you want to pay it forward, if you find it affordable. You do it to help others, not just yourself.

  • @0269_m

    @0269_m

    3 ай бұрын

    ​@@joer8386are you one of those script kiddies. Open source is one of the main thing we defend and live for we don't get anything but 5$ donation will help t0re

  • @rayhimmel7167

    @rayhimmel7167

    3 ай бұрын

    @@joer8386 that's the point, you won't be paid for a good cause, like you don't pay for using tor but you help millions (and eventually yourself), as hundreds of others help you

  • @sargoni1322
    @sargoni13227 ай бұрын

    so for layer three, would you use that form or just Tails and Tor?

  • @damiank6566
    @damiank656617 күн бұрын

    As much as I like Chuck's videos I think he doesn't go into details far enough sometimes and I'm glad you did some more advanced analysis. You just earned a subscriber, sir. Keep coming vids like that

  • @jmtradbr
    @jmtradbr8 ай бұрын

    Tor with VPN is like entering a place in disguise accompanied with someone who knows your real ID. Your privacy will depend on how much you trust this third party.

  • @TheTweaker1

    @TheTweaker1

    8 ай бұрын

    I think there are many more trustworthy third parties (like Mullvad, and IVPN) than ISPs, many of which have very questionable privacy policies.

  • @wiredfox3451

    @wiredfox3451

    8 ай бұрын

    More like using tor with a VPN is like entering into a place in a disguise and having a friend who stops the other guy from coming into the building who knows your real ID.

  • @leapbtw
    @leapbtw8 ай бұрын

    hey MO, can you please add shipping to Europe on based win? Thank you for your content ❤️

  • @wisteela
    @wisteela8 ай бұрын

    Great video. I'd not thought about it like this before.

  • @PirateGhostDJ
    @PirateGhostDJ8 ай бұрын

    The practicality and reality of that $5 wrench method comic made me chuckle 😂 Absolutely that would happen!

  • @gilgabro420
    @gilgabro4208 ай бұрын

    Well it might make sense to create your private VPN in a country that has good privacy regulations and connect that way. You can make yourself sure that the data gets deleted that it can't be tracked back to you.

  • @realcartoongirl

    @realcartoongirl

    8 ай бұрын

    the vps gonna expose you

  • @lydellackerman800

    @lydellackerman800

    8 ай бұрын

    the issue is that you are the ONLY person routing traffic through it, so they theoretically have an infinite amount of time to slowly figure out who you are by habits, a public (paid / no log) VPN is much safer as its much harder to distinguish who is who

  • @verack1616
    @verack16168 ай бұрын

    Imagine having a personality test and one of the questions is: "If you have $5 dollars what would you buy?: - VPN services - A Relay - A Wrench

  • @SpoopySquid

    @SpoopySquid

    8 ай бұрын

    This feels like a question Doc Mitchell would ask at the beginning of New Vegas

  • @christineb8228
    @christineb822815 күн бұрын

    Just found your channel. I like you. Thanks for this!❤

  • @Gerardo-Contreras
    @Gerardo-Contreras5 ай бұрын

    KGB server, dude you are absolutely hilarious. I have fallen in love with your informative content ♥

  • @classicallibral5903
    @classicallibral59038 ай бұрын

    Maybe combine everything: proxy + reverse proxy, then Mullvad than tor, and just for in case a proxy or reverse proxy gets hijacked have a couple, and make em switch every so often, randomize it, make it a headache, even for your self to track where a traceroute begins and ends, than you know you are reasonably secure, you could of course add anything in the mix :) And watch Three Days of the Condor 1975, good movie :D That work he did with those phones was just pure gold :D

  • @jon.schnee

    @jon.schnee

    5 ай бұрын

    Technically this would work right? But the internet speed would be slow as a snail or no?

  • @BrutusBerserk
    @BrutusBerserk8 ай бұрын

    Exciting topic - will watch after my shift!

  • @fpsVAMPZ
    @fpsVAMPZ3 ай бұрын

    What about using a VPN for the internet kill switch? Would it be better to use a VPN to connect to a VM and then run tor?

  • @EncryptedFlyTrap
    @EncryptedFlyTrap2 ай бұрын

    I loved your thoughts on this topic. I was just wondering if you feel the same way about using a proxy in tandem with Tor as well?

  • @legharpy
    @legharpy8 ай бұрын

    The only thing I gathered from this video is that's a sick hoodie

  • @mattjax16
    @mattjax168 ай бұрын

    Network chuck was sponsored by Nord VPN smh

  • @MrCmon113
    @MrCmon1134 ай бұрын

    It's crazy that this guy hired an actor to mime his words. Godlike levels of opsec.

  • @billyscenic5610
    @billyscenic56108 ай бұрын

    Subbed for a no nonsense explanation.

  • @austiniscoolduh
    @austiniscoolduh8 ай бұрын

    Thank you Printer_Pam for shoving this tip down our throats on the DNM subreddit back in the day. You were my favorite Fed! (iykyk...)

  • @pasauliite
    @pasauliite8 ай бұрын

    On my opinion, the best rout is : Neighbours wifi -> OpenVPN on russian server -> tor

  • @ynnda6155

    @ynnda6155

    8 ай бұрын

    😅

  • @polinskitom2277

    @polinskitom2277

    8 ай бұрын

    hope you at least spoof your MAC if you're doing that

  • @donaldkgarman296

    @donaldkgarman296

    8 ай бұрын

    ANY AGENT WILL FIND YOU , THAT IS A RED FLAG MOVE .@@polinskitom2277

  • @ShaferHart
    @ShaferHart8 ай бұрын

    Dude, there are all sorts of reasons why you might want to hide your tor traffic from your ISP. That alone is a good reason to use a consumer VPN.

  • @Lulxec
    @Lulxec8 ай бұрын

    I did not get it honestlly, if tor alone is able to hide my ip (unless the feds monitor the layers ) , why it will not hide my vpn ip ? Even tho the usage of vpn is useless in that case since if they crack the tor connection they get you anyway.

  • @EwanMarshall
    @EwanMarshall8 ай бұрын

    Something else VPNs do not help with is timing and packet order attacks, packet a comes into to VPN server at t, comes out at t+xns over and over again, if you are on the edge routers for that vpn server, you can easily monitor that and pair them up. Tor batches packets, randomises the order then sends them on a clock to the next node, this means that timing information gets scrambled with every other packet in a send window, so even if I'm monitoring connection between you and the guard node or bridge and the end node in question, matching up the packets can't be done based on time it took to pass through the network.

  • @michaelplaczek9385
    @michaelplaczek93858 ай бұрын

    No, it’s a redundant layer of security to hide your IP if a Tor Relay Node is corrupted somehow

  • @williamrutherford553

    @williamrutherford553

    8 ай бұрын

    If a threat actor can gain complete control of a Tor relay node and deanonymize you, then gaining access to your VPN service is a walk in the park for them. If anything, it'll just provide more evidence they can corroborate against you.

  • @TheTweaker1

    @TheTweaker1

    8 ай бұрын

    @@williamrutherford553 How will the VPN service provide more evidence than just connecting through your isp?

  • @daLiraX

    @daLiraX

    8 ай бұрын

    @@williamrutherford553 that's not how this works. Or at least if you're not shouting your private data out there.

  • @Daveychief23

    @Daveychief23

    8 ай бұрын

    @@williamrutherford553 The thing you are forgetting is a simple cost/benefit analysis - These things can take time; The challenge how difficult it is to bypass 1 layer; It's how difficult it is to bypass SEVERAL layers. Resources, Manpower and Time is limited - if you're just some random Joe looking at memes over Tor, it's not worth the cost in time to crack every single layer. What benefit do they gain? However - If you are on the powers'-that-be's list, they are much more willing to incur a larger cost, as the benefit justifies the means. With that in mind, consider the following two scenarios Scenario 1 - No VPN, using Tor to buy drugs on your favourite onion plug. In this case you are one mistake/leak/disclosure away from total exposure. 1 Tor relay cracked, 1 failed bridge, a DNS leak, or any other leak of your traffic for that matter. Scenario 2 - VPN, Using TOR In this case, for your true IP to be exposed, they must gain info/crack traffic from your VPN provider, AND additionally get your TOR traffic. On a final note - consider this; Not all users who want to anonymise themselves do so to avoid scrutiny from their local powers; It's additionally a solid option to protect your traffic from Cyberattacks, such as a Man-In-The-Middle attack (in the case of unprotected networks). It could be for say, KZread Stars/Streamers who want to keep their identities private from their fans. Perhaps you don't want advvertisers going "Oh, this IP just bought a 18 inch dragon shaped dildo, Let's add "Sex Toys" and related tags to this IP and sell it to other advertisers!" when you live in a house share, student accomodation etc etc etc The use cases are vast, varied and wild - But let's put summarise it in simpler terms: When it's cold outside, do you go outside naked, because your skin should protect you from the elements? Or do you add socks.. a t-shirt.. perhaps a jacket, gloves., or a hat? I think you get the idea :)

  • @Daveychief23

    @Daveychief23

    8 ай бұрын

    @@TheTweaker1 Your ISP likely only has your bank account number for the Direct Debit, Your name, and whatever email address you used to register with them. In the case of people trying to remain anonymous, they likely have a "Normie" email address, and a "Dirty" email address - usually several. If you register for your VPN using your dirty address, as you're trying to remain anonymous, if the VPN service handed that over, or it got hacked and leaked... then that address is burned, alongside the payment method, tying that payment method, bank account to that dirty address

  • @ruben34
    @ruben348 ай бұрын

    I already feel target by alphabet organizations just by watching your videos.

  • @RunOs3
    @RunOs319 күн бұрын

    Brilliant and very useful information. Thank you for taking the time.

  • @WakeQ
    @WakeQ8 ай бұрын

    been looking good in the preseason bro excited for u to take home the chip this year

  • @GameCode64
    @GameCode648 ай бұрын

    What i used to do on high school was routing SSH tunnels over ports 80 and 443. Because all other outgoing ports were blocked. So because i used those to route my 2 servers with SSH tunnels, i was able to use the TOR browser. But i didn't do it to hide the connection. Just to make the connection. :D

  • @qlippoth13

    @qlippoth13

    8 ай бұрын

    Normally just looking on the lab proctor's desk for a sticky note will yield a password for elevated access.

  • @TeaInTheMorning-we2kh

    @TeaInTheMorning-we2kh

    8 ай бұрын

    The admin password at my school was just the name of the school with no caps or spaces haha

  • @arandomcommenter412

    @arandomcommenter412

    8 ай бұрын

    I like your funny words magic man

  • @GameCode64

    @GameCode64

    8 ай бұрын

    @@qlippoth13 Well it was mostly bring your own device. But the network had those ports disabled for students, teachers and even the inhouse IT manager. So it didn't matter if you were on one of their computers or on your own computer plugged into the network with cable. Or connected to WiFi. Only ports 80 and 443 were open outgoing.

  • @qlippoth13

    @qlippoth13

    8 ай бұрын

    @@GameCode64 Ah yes, things have come a long way since the days of the PDP-11/70

  • @ythshhshsbsnshegebwnebeben2142
    @ythshhshsbsnshegebwnebeben21428 ай бұрын

    Can you maybe do something about Lokinet or Zeronet?

  • @beaksters
    @beaksters7 күн бұрын

    Nah I make sure to comment on every video I like since i’m almost positive it’s the most important thing the algorithm uses for pushing.

  • @Dr.Twat.Waffle
    @Dr.Twat.Waffle5 ай бұрын

    Thank you! That video felt like such a joke - just one giant ad, masquerading as a tutorial, and that bothers me, since I know people believe a lot of the things they see, and won't understand that. It's good to see anyone actually suggesting to people not to use a VPN for this - it wasn't the first video I've seen recommending it ! The VPN sponsoring tuts are illegal when the channel doesn't say it's an ad. Nobody seems to care enough Anyway, I think Tails would be the best thing to use. It all really does depend on your threat model - people dont talk about that enough on YT... i like that it was done a bit here

  • @LuigiMordelAlaume
    @LuigiMordelAlaume8 ай бұрын

    1:15 "So why is he recommending a VPN?" You're too nice... The real answer is he's trying to get that affiliate ad money 🤑

  • @nupersu6307
    @nupersu63078 ай бұрын

    I used to use tor with vpn in Russia since finding a bridge which isn't blocked was very hard. So there is some use for vpns with tor

  • @BispingKILL
    @BispingKILL9 күн бұрын

    Great video. I learned a lot. But just double checking, the third method of using Tails Linux is still very safe and anonymous for the most part right?

  • @cracc_baby
    @cracc_baby25 күн бұрын

    simplified and brilliant. thank you bro

  • @anispinner
    @anispinner8 ай бұрын

    VPN is used by over a billion people daily, while TOR is by a couple of millions. I can hardly see how can you stick out less by using TOR.

  • @nottifps

    @nottifps

    8 ай бұрын

    Using a vpn blocks tors own hob changing so u basically have a permanenr hob that can be tracked while using vpns

  • @LuciferArc1

    @LuciferArc1

    8 ай бұрын

    ​@nottifps but tor is literally ran by the feds

  • @user-xl5kd6il6c

    @user-xl5kd6il6c

    8 ай бұрын

    A VPN is another person's PC, there's nothing particularly special about it When a cop see's an IP from a VPN, they can ask the VPN provider for info When they see a Tor IP, they cry and run to their mom, because there's no way they will directly identify you or your traffic

  • @user-xl5kd6il6c

    @user-xl5kd6il6c

    8 ай бұрын

    @@nottifps All your Tor traffic would pass from the VPN first, but there isn't a relevant difference from all Tor traffic passing from your ISP either Do you trust your ISP more than your VPN provider? If so, change your VPN, because it isn't doing anything for you

  • @temp50

    @temp50

    6 ай бұрын

    @@user-xl5kd6il6c"they can ask the VPN provider for info" And that "info" would consist to things: source addr will be the IP your ISP gave you and the destination IP will be the IP of the circuit guard. I don't see the problem here with VPN to be honest.

  • @ivystopia
    @ivystopia8 ай бұрын

    If you are being monitored, and you only open Tor to perform an activity you do not want tracked, and you connect via TOR to a compromised endpoint - then the times TOR traffic occurred on your internet connection will correspond to the times the endpoint sees your traffic. For example, compromised webserver sees a session from 14:05 - 14:55, and your ISP sees you were using TOR for that time, then that incriminates you. Your ISP is more likely to hand over this information to law enforcement. If you are running a TOR node 24/7, or running TOR through a VPN that doesn't cooperate with law enforcement, this does not apply.

  • @EwanMarshall

    @EwanMarshall

    8 ай бұрын

    The vpn connection at the same times does though, that has been used in a court case before to compromise one guy.

  • @NeutralOrNotTooBadStuff

    @NeutralOrNotTooBadStuff

    23 күн бұрын

    ​@@EwanMarshallWhat court case exactly?

  • @DrSpooglemon
    @DrSpooglemon8 ай бұрын

    Quantum resistant tunnels! That is the most 21st century thing I have heard yet.

  • @Nickname2Two
    @Nickname2Two3 ай бұрын

    Some univeristies ban access to and traffic trough tor and you can get expelled for that so runing inital connection via vpn allows you to remain undetectable. And they use only basic monitoring

  • @Noneofyourbusiness2000
    @Noneofyourbusiness20008 ай бұрын

    You haven't convinced me. How are they going to realize you are using a VPN with Tor any easier than they could figure out your IP address while using Tor without a VPN?

  • @ToeTV247

    @ToeTV247

    8 ай бұрын

    Did you even watch the video?

  • @Noneofyourbusiness2000

    @Noneofyourbusiness2000

    8 ай бұрын

    @@ToeTV247 give me a timestamp.

  • @garretrocha8

    @garretrocha8

    8 ай бұрын

    bro watched 1 minute of the video and says you haven't convinced me

  • @vincenthills5024

    @vincenthills5024

    8 ай бұрын

    ​@@ToeTV247if you think the answer is mentioned in the video why don't you actually cite it because it was not mentioned

  • @user-rx2mo5ef3b

    @user-rx2mo5ef3b

    8 ай бұрын

    ​@@vincenthills5024im 5 minutes in and i already got an answer. VPNs and tor bridges offer the exact same service except tor bridges are free and not run by a company approved by the government.

  • @PanicOregon
    @PanicOregon8 ай бұрын

    Thing is if someone wants to hide the fact they're using Tor from their ISP, a VPN isn't entirely necessary or really even a Valid option due to things like Super-Cookies some ISPs embed on the packet when it leaves your network. Instead i would say obtain a private server or even an anonymous private server from a host that accepts XMR, and host an encrypted connection VNC to that server which you will run the TorBrowser or even a Tor node off of.

  • @Ginfidel

    @Ginfidel

    8 ай бұрын

    Super-Cookies? Wanna cite that, friendo? How is the ISP embedding this? Through the router they provide? You know, the one people should never be using if they care about security? Through the ONT? You know, the media translation box that has less CPU power than an arduino board? If they're waiting until the backbone to do it, they're gonna have a bad time appending anything customer-specific without bottlenecking it into oblivion.

  • @PanicOregon

    @PanicOregon

    8 ай бұрын

    @@Ginfidel it's an much older thing, some ISPs don't do it anymore. But yeah the ISP embeds the 'super-cookie' on the packet when it leaves your network, if i remember correctly it's after it leaves your home network it's done on the ISP level through their infrastructure.

  • @Nathan_Woodruff

    @Nathan_Woodruff

    8 ай бұрын

    If the super-cookie is embedded in http headers, using a vpn or even just https will prevent it from being added. If the super-cookie is added at the transport layer, it would still be stripped at the vpn provider since it can only be applied to the outside of the tunnel, not the data contained within. That means at most your vpn provider will be able to see the ID, which is irrelevant because they have your IP, which is already more than enough for a capable adversary to identify you. The same risk applies to renting a cheap vps since your vps provider can see this ID along with your IP, but this option is far easier to track via externally monitoring their network, since you are the only one connecting to it.

  • @ModPapa

    @ModPapa

    4 ай бұрын

    how the hell can a super cookie be placed into HTTP headers, if the HTTP request itself is encrypted with TLS? Please explain.

  • @PanicOregon

    @PanicOregon

    4 ай бұрын

    @@ModPapa The supercookie is placed after it leaves your network, you would need a external server for it. The full packet is not normally encrypted tho, as the WAN needs to be able to read the IP, and a couple other headers to know where it goes.

  • @yeetman6416
    @yeetman64168 ай бұрын

    @MentalOutlaw would planet vpn be safe to use? if your using the free version then you dont have to put your email in it. I only use tor to look at r34 art privately, so would it be safe?

  • @user-jd9mr7zn1b

    @user-jd9mr7zn1b

    8 ай бұрын

    Never use free VPN’s. Remember the rule of thumb: if you're not paying for the product, you are the product Any VPN that's free isn't providing you a service. It's selling your data to someone else as a service

  • @MiClLC
    @MiClLC4 ай бұрын

    I use this analogy. Think of Tor as a castle, it protects the space that you're in but doesn't necessarily protect YOU. Think of a VPN as hardened armor. That is what protects you from the evil ISP Dragon that's lurking somewhere in the castle. You have maximum protection, but don't think you can't be eaten if you do something stupid (bad opsec).

  • @robihr
    @robihr8 ай бұрын

    eldo kim example is why tor may not be enough. he emailed bomb threat to harvard uni to avoid taking exam and when FBI checked logs from harvard network they found that only he was using tor at that time. certainly it is edge case, but it shows that there are use cases where vpn is desirable with tor.

  • @Wolfrich666
    @Wolfrich6668 ай бұрын

    Nord VPN might as well be a honeypot by what ive heard, it would be like sending a private message to your FBI agent so it checks on you while on tor XD

  • @nabeelshiraz8686
    @nabeelshiraz86864 ай бұрын

    hi i have a question if surf the deep web in a vm inside that vm and in that i use anonsurf is it safer thanks love your videos very helpful

  • @l0gic23
    @l0gic238 ай бұрын

    Video mentions doing a $5 VPS TOR node. Presuming it someday becomes a guard node and you alwqys use your guard node because you trust it... How does that impact treat model?

  • @user-di5wj8is7i
    @user-di5wj8is7i8 ай бұрын

    They only need to monitor the first and last hop to de-anonymize you. All VPNs are likely monitored, they don't have to go after the VPN company, they can go after datacenter, or one of the hops they use. Tor has guard rotation. When you use a VPN you're effectively giving yourself another permanent first hop. If they compromise the VPN company, Tor's guard rotation feature becomes effectively useless (on the scale of a well-funded attacker). Basically, on a large scale, it's easier for the feds to monitor every VPN connection than every ISP connection, or entry node connection. Decentralized is better. VPN undoubtedly decreases your anonymity.

  • @aronm5329

    @aronm5329

    8 ай бұрын

    Nord isn't monitored. They make that their biggest advertising pitch

  • @cyxceven

    @cyxceven

    8 ай бұрын

    @@aronm5329 LMAO

  • @LuciferArc1

    @LuciferArc1

    8 ай бұрын

    But the fed runs tor. They own it. They already know everything within tor

  • @LuciferArc1

    @LuciferArc1

    8 ай бұрын

    ​@aronm5329 nord lies. Fine print says they do and they've already given information over before. They're required by law to keep logs and give them over

  • @testacals

    @testacals

    8 ай бұрын

    @@LuciferArc1 Tor is open source, so everyone knows everything in tor. Feds doesn't run tor nodes though.

  • @ichi1082
    @ichi10828 ай бұрын

    You're not my real dad, don't tell me what to do!

  • @lanaroads69

    @lanaroads69

    8 ай бұрын

    Are ya winning son?

  • @markuk9138

    @markuk9138

    8 ай бұрын

    Who can be 100% sure who their Dad is? 😮

  • @AakashKumar-tn6yh

    @AakashKumar-tn6yh

    8 ай бұрын

    ​@@lanaroads69Lana Rhoades🤣🤣🤣🤣🤣

  • @dimalmfao

    @dimalmfao

    8 ай бұрын

    hell nah, lana roads

  • @lanaroads69

    @lanaroads69

    8 ай бұрын

    @@markuk9138 If you go back in time and fuck your mum, you can be 100% sure that you will be your own dad.

  • @user-jg5im9db8m
    @user-jg5im9db8m6 ай бұрын

    Tor weakness is the exit node. I agree though the ISP like in China can see your connected. It would be best to hide these details.

  • @whatamievendoing
    @whatamievendoing8 ай бұрын

    Is there a VPS (not VPN) service like Mullvad where you can pay in Monero without giving out any personal info?

  • @apIthletIcc
    @apIthletIcc8 ай бұрын

    Chuck made a video recently suggesting email users put a '+' character in their email address, but only lists the pro's of doing so and never mentions anything about the bad side if it. Please make a video about putting a plus symbol in email addresses. Needs to be done imo, since the biggest issue of doing that, is kinda a monumental fuck up if it goes wrong.

  • @internetrules8522

    @internetrules8522

    8 ай бұрын

    What would the duck up be? It seems like a generally good practice as long as your fine with maybe some sites erroring, or some stuff still getting sent to your normal non plus email

  • @apIthletIcc

    @apIthletIcc

    8 ай бұрын

    @@internetrules8522 Impersonation is alot easier for a bad actor to pull off if you use the plus symbol. It comes down to how certain servers internally would interpret the characters. There's alot more to it but thats the safest simple explanation I can offer.

  • @revelmonger

    @revelmonger

    8 ай бұрын

    What would be the issues with that? I use it all the time with proton to filter my emails into folders.

  • @apIthletIcc

    @apIthletIcc

    8 ай бұрын

    @@revelmonger I replied to this question above ^ ^ Better to err on the side of caution. My point really is simply the fact Chuck only states the pros and doesnt mention the cons, and thats not good imo.

  • @internetrules8522

    @internetrules8522

    8 ай бұрын

    for some reason you first reply to me was hidden so i had to find it by sorting comments in the newest first method. but ok ya if we assume the server treats plus like a dot or something, then there might be some potential attacks you could do to like reset password or some other things. any reccomended further reading or watching like a defcon or something? @@apIthletIcc

  • @nicksjacku9750
    @nicksjacku97508 ай бұрын

    Some say Chuck glows very brightly

  • @EvilSantaTheTrue

    @EvilSantaTheTrue

    8 ай бұрын

    I saw him in an agent suit just this morning

  • @EvilSantaTheTrue

    @EvilSantaTheTrue

    8 ай бұрын

    Don't forget if you're in a dark room with him he has a glowing outline

  • @PatsPerfectPlatinums
    @PatsPerfectPlatinumsАй бұрын

    Makes perfect sense to me thank you for clearing that up

  • @crazycrazy7710
    @crazycrazy77108 ай бұрын

    This video proves that not all voices deserved to be taken seriously

Келесі