Author: snotknot (Admin)

  • Tor + VPN = Bad (Continued)

    Published: Aug 30, 2023

    You may be thinking “people say that you SHOULD use a VPN with Tor, so why should I take your word over theirs?”

    You are correct. People suggest dumb things all the time.

    What I will be trying to do is use logic (cryptography, information systems, weighing the pros and cons that come from using a VPN with Tor, etc.) to show why it’s probably not the best idea.

    Let’s get started.

    I am not the only person who is going to tell you that it is not a good idea to combine a VPN with Tor for the purpose of anonymity. This thread is essentially going to show you that people indeed combine Tor with VPNs, but for other reasons.

    Tor on their official website are advising against using a VPN with Tor.

    “Can I use a VPN with Tor?”: https://support.torproject.org/faq/faq-5/

    Let’s debunk this.

    “Using Tor with a VPN is a good way to add another layer of security.”

    No it is not.

    The longest TLDR in history: Additional layer of encryption FOR WHAT? Your .onion encrypted traffic? Redundancy ≠ security but in fact the opposite. A VPN is just one extra layer of complexity to your OpSec foundation that you have to worry about. All of that risk for what? It has a very little return on investment.

    Please do not waste your crypto on VPNs with the intent of anonymity.

    “This is because a VPN protects you in case the Tor network is compromised, and it hides Tor use”

    What they are referring to is your real IP address behind Tor is somehow exposed, whether it be the Tor network itself being compromised, a node(s) in your circuit being compromised, or maybe you forget to disable javascript and connect to a site that runs malicious javascript code.

    We will play into this hypothetical that you are using Surfshark VPN. Let’s also assume that you payed for this VPN anonymously and only connect to it anonymously. This means you are using a Wi-Fi network that cannot identify you (stolen Wi-Fi, open Wi-Fi, etc.) to connect to the Tor network where you then connect to the VPN that you payed for anonymously with crypto (covered in security thread part II).

    The final connection chain looks like this:

    Stolen/Free WiFi > Tor > VPN.

    Notice anything wrong about this? Remember how I mentioned that having a VPN as your end node only offers convenience factors and not anonymity? This is because the VPN can just be subpoenaed, which makes it pointless from an anonymity point of view. We also know that you can’t connect to .onion sites using Tor if the VPN is your end node.. WHICH MEANS your connection chain has to look like this:

    Stolen/Free WiFi > VPN > TOR.

    With this connect chain, Tor is the end node.

    Let’s continue going into the details with this connection chain.

    In this case, if one of your Tor relays are compromised and your IP behind Tor is leaked, they will get the IP of the VPN server as it’s the hop before Tor, and if they subpoena the VPN, they get the stolen/free Wi-Fi IP… but at that point, why not just skip the VPN as a whole?

    If you don’t use cypto, and if you pay for the VPN with your real identify like, or connect to the VPN with your home WiFi/any network that can identify(your work Wi-Fi, friends Wi-Fi, parents Wi-Fi, etc.), then it’s pointless. Literally.

    People will say “the VPN doesn’t hurt anything. It’s an extra layer of encryption, an extra node that pattens your real IP, and doesn’t hurt as long as you purchase and connect to it anonymously!”

    All I have to say to that is: Most people who I’m aware of who know what they’re doing who are current/former cybercriminals (blackhat hackers, carders, DNM vendors, or anything that requires you to have the skill of anonymity and OpSec mastered).. do NOT use commercial VPNs.

    Will you find the occasional person who does genuinely know what they’re talking about and are reputable online who combines Tor with a VPN? Yeah. However far little do it for anonymity.

    There are wanted individuals who have done awful things who are actively free despite being under heavy monitoring/funding from numerous government agencies due to their online anonymity who do NOT use VPNs. The way they do it is by properly utilizing encryption (Tor, PGP, etc.) as well as understanding forensics and how to counter it (Tails, Whonix, etc.) which allows them to be free. You can use a VPN all you want, but if you fail to utilize encryption, as well as taking the proper precautions to prevent forensic investigators from obtaining evidence tied to your activities, then it’s game over.

    (Note: I obviously do not endorse the activities of these individuals. The point is that if the police are after anyone, it’s THESE GUYS. You are low hanging fruit compared to them and if they can get away with their heinous crimes, then you can get away with something to a lesser degree)

    Back to the quote.

    The quote mentioned it hides Tor use, this is true. However, you can just use a Bridge. They are more effective and are built into Tor for free. If you don’t want your “ISP to know you’re on Tor”, using a VPN will just tell the VPN that you’re using Tor instead of your ISP. You don’t have to go through all of the hoops of obtaining crypto anonymously.

    More sources:

    Did you know that Tails also says VPN’s don’t offer strong anonymity?

    Source: https://tails.net/support/faq/index.en.html

    Notice how they say “VPNs have clear benefits over Tor”? Over Tor means the VPN is the exit node (You > Tor > VPN).. which of course means you cannot use the dark web.

    Does this sound familiar? Hmmmm. Remember how I said people combine a VPN with Tor for convenience reasons on the clearnet and not anonymity reasons on the darknet?

    More sources:

    “When Cybercriminals with Good OpSec Attack”: https://www.youtube.com/watch?v=zXmZnU2GdVk

    Now we’re actually getting into the fun territory because this video covers a group of cybercriminals who had a really good OpSec foundation. The video covers their OpSec foundation, how they were caught, and all of the other interesting information. This is one of the many examples of utilizing publications on the internet to learn from others. This is a rare situation where the person(s) who were caught actually knew what they were doing. I recommend watching the whole video.

    I recommend taking notes about their operation in terms of OpSec. You don’t have to go as far as flashing custom firmware on routers, but pay attention to their computer opsec. They are using nested encryption with Wi-Fi that does not tie to their identity. It’s important to note that they were an entire cybercriminal group or “Gang” or whatever, so they had to be overkill. The more people involved = more likely for someone to make an OpSec mistake and take everyone down with it, which is why they had a dedicated “OpSec” guy who custom configured their “work” computers.

    I’ll cover parts of their OpSec foundation that you should try to replicate if you want to be a ghost online or if you’re doing anything sketchy/illegal:

    • Full Disk encryption (LUKS & LVM on Linux)
    • Encrypting external media (which is where any evidence of your activities should live)
    • stolen/free WiFi (NEVER, under ANY circumstances use your home WiFi (or any network that can identify you) if you’re doing anything illegal or want complete anonymity)

    Oh… and you should be using a Torified distro such as Tails, with Tor bridges and javascript disabled via Tor engine (about:config), of course. Tails is not a “must have” obviously but is nice to have as it’s configured by default to do many things that will aid in your privacy and anonymity.

    More sources:

    “Don’t Use a VPN with Tor”: https://www.youtube.com/watch?v=_dRdmmspH9E

    This video was made by a guy named Heath Adams. He is an ethical hacker who owns his own cybersecurity company named TCM Security.

    I wanted to include Heath Adams as a resource for a couple of reasons. Firstly, he is not an anonymous figure. This means that his training, background, history, etc. is all publicly available information. This makes him more of a creditable source, as apposed to linking you a story of some random guy on the darknet who goes by his anonymous handle and you just have to kind of “trust” that he knows what he’s talking about.

    Heath Adams has every industry professional certification you can think of:

    • OSCP, OSWP, eCPTX, eWPT, CEH, Pentest+, A+, and more.

    Although his bread and butter is hacking legally and not so much anonymity/privacy, he is still a reputable resource. Having the knowledge to break into systems also teaches you how systems are created/maintained and how they work from a networking perspective and so on. It all goes hand in hand at the end of the day.

  • Why you should stop using Commercial VPNs

    Published: Nov 24, 2023

    I watched this video on my homepage and decided to write a post about it.

    I agree with everything he says.

    It’s not hard to find people on the internet who say VPNs are good for privacy. They are not.

    It’s important to mention that I am aware of the convenience factors VPNs offer, such as:

    • bypassing IP bans
    • watching content that is banned in your country
    • pirating
    • etc.

    All of these are great use cases for VPNs. This is not what we are here to discuss. We are discussing why you should save your money on VPNs if your goal is enhanced privacy/security


    Average YouTube VPN ad:
    “A malicious actor can capture your sensitive data on a public Wi-Fi network”.

    If you want privacy, security, or both then you should be using something like QubesOS. If you don’t want to go to those extremes, then you should create a privacy/security friendly ecosystem. An example of this includes using Linux, Firefox, and DuckDuckGo. These solutions attack the root of the problem rather than creating a questionably irrelevant workaround that aren’t guaranteed. All VPNs are potential honeypots, even the good actors such as Mullvad. This means that simply using a VPN is not enough, and only resolves a small portion of the issues with online privacy/security. With the privacy/security friendly ecosystem discussed above, you are guaranteed to have increased privacy/security and by a very large margin. With VPNs on the other hand, the privacy & most of the security advantages are not guaranteed to be valid, and if they ARE valid, they are extraordinarily small advantages.

    True of false:

    Billy uses a VPN provider that magically does not keep logs of his traffic and is not a honeypot. Billy finally has privacy!

    …He now can safely go on YouTube, Twitter, Reddit, and Tiktok.

    Do those sound like privacy friendly platforms?

    No of course. You have to attack the root of the problem if you want to make a noticeable impact, the point is: It’s illogical to combat privacy with VPNs, to then use the least privacy friendly platforms.

    Most people who buy these VPN subscriptions are people rocking laptops running Windows or MacOS, with Google Chrome as their browser, that they then use to access YouTube and so on.

    They are still living rent free in the Google/Microsoft/Apple/etc ecosystem. What is a VPN going to do for your online privacy if you’re using Windows/MacOS, Google Chrome, and accessing sites like Twitter and Tiktok? Pretty much nothing.

    If you want to have a noticeable impact on your privacy and security, you need to either heavily commit and make a LOT of beneficial changes, or fully commit and go full out paranoid mode. This whole “I’ll just slap on a VPN and I’ll be good” mindset is asinine.


    Wanna learn more about VPNs?

    Tor + VPN = Bad

  • Settling The Web Browser Debate

    Published: Nov 24, 2023

    Last updated: March 26, 2025

    I used to use Firefox.

    1. I wanted something fast
    2. I wanted something that just works
    3. I didn’t want to give Google my data

    Now I use Brave, because Chrome is trash and so is Firefox now (This was updated after the Firefox data collection news).

    TLDR of this post: Use hardened Firefox (yes, even now) if you care about privacy, otherwise use any other browser.

    Nowadays I am a lot more busy and I need an effective setup that just works and gets the job done. I no longer have time to nerd out on hardening a Firefox install and just don’t care anymore.


    The debate since the beginning of time has been “Google Chrome of Firefox???”

    With newer browsers gaining popularity (mainly Brave & Opera), it is giving people more of a reason to switch browsers.

    Did you know that most browsers are just Chromium forks?

    Every popular browser currently other than Firefox & Safari are Chromium based.

    This means the developers built on top of Chromium to make their own forked browser.

    All of the Brave users who think they have top tier privacy and security in reality do not since they are using a browser that isn’t de-googled. You have better privacy and security, yeah, but you’re still using a Chromium fork and giving Google your data. One of the reasons Brave is labeled a “privacy friendly” or a “security friendly” browser is due to the fact that it is open-sourced, just like the browser it’s based on (Chromium).

    Brave also has security/privacy friendly features baked into the browser by default, such as:

    • blocking trackers
    • prevents fingerprinting via user-agent
    • potentially preventing phishing attempts

    This leads many to believe Brave is more privacy friendly out of the box than Firefox, and at the end of the day that answer ultimately comes down to your definition of “privacy”.

    From a technical perspective this theory is incorrect as it is still a Chromium fork at the end of the day and you’re better off configuring a Firefox install to mirror the benefits of Brave. There is nothing that Brave does that cannot be done on a Firefox instance, and many of these features can be modified directly on the Firefox engine using about:config. Extensions can do the rest, such as uBlock Origin (RIP chrome users) and a user-agent randomizer extension.

    A modified Firefox instance with the proper settings and extensions is the route if you want privacy and security. If you don’t, then any other browser will work.

    Think of every browser as a bloated version of Chromium, because that’s literally what they are; a Chromium fork with extra features.

    Chromium & Google Chrome

    Chromium is just a better Chrome. uBlock Origin also works on Chromium, I advise to just use Chromium if you’re looking for something reliable and fast and privacy isn’t a concern. Chromium looks and feels exactly like Google Chrome.

    Chromium has to be:

    • realible
    • fast
    • well maintained

    This should come as no surprise, right? Chromium is what most browsers are built upon. Developers have to trust Chromium as the foundation for their project.

    Chromium & Chrome are both good options when it comes to speed because Chromium is known as a browser foundation and is what Chrome is based off of, and Chrome is the most popular web browser in the world. Popularity = well maintained and fast browser for end-user convenience.

    Google owns the most popular Web browser AND the most popular search engine in the world. This allows their browsers to be extremely “compatible”, efficient, and fast as it’s all the same ecosytem of tech.

    The Google search engine is also the best search engine for consistent results. Google by far gives the best results of all search engines in terms of consistency, accuracy, etc.. This is due to the popularity of the search engine. The Google search engine is arguably the most popular piece of software ever created. This grants the Google search engine a huge advantage over other search engines as it has more information generated into the algorithm.

    Picking a search engine to use is just deciding what neural network you want to use. What network had more time to develop with more data fed into the algorithm?

    Brave

    There isn’t a whole lot to discuss about Brave as I already covered its selling points.

    Key takeaways:

    • fork of Chromium
    • Has features built in by default that are privacy & security friendly
    • want privacy? just use a well configured Firefox install instead, watch this video, as well as this video
    • if you want privacy but you’re “too lazy” to custom configure a Firefox install, use brave

    Opera

    Take Chromium > bloat it > bam you have Opera

    Summary

    It does not matter what browser you use.

    Use what you want.