Kirigaya сказал(а):
Thank you for the answer brother. But if I use my own vpn servers, why would anyone try to hack into the first vpn server if I never use it for anything other then connection to TOR network? And how they can find out the address of the first vpn server?
But if I use my own vpn servers, why would anyone try to hack into the first vpn server if I never use it for anything other then connection to TOR network?
And how they can find out the address of the first vpn server?
Use a bridge when connecting to the Tor network so nobody know you are connecting to Tor)
As always... It depends.
Imagine you're a criminal that connects to its own VPN to route the connection through Tor (Tor over VPN: YOU -> VPN -> TOR)...
For example, they could try to get in into your VPN server to check if there are any kind of logs, residual data, current traffic, unsecured connections, etc.
Remember that Tor doesn't encrypt data, unlike a VPN.
If you're using a secure connection, it will keep on scrambling the data, but if it is insecure, it will just forward that request and respond back with plaintext data.
A decent VPN will always encrypt your data so it cannot be it's not in plaintext (YOU -> VPN), but when they have to send your insecure request to the server, it will not be encrypted (VPN -> INTERNET).
This means that the response that the server sends out won't be encrypted either (INTERNET -> VPN), but the response you get from the VPN will be (VPN -> YOU).
After this you may be asking yourself "why use Tor instead of a VPN then?"... Because with Tor you will not (shouldn't) rely on a single node/relay, which could be compromised to sniff data.
If they try to compromise Tor nodes/relays and VPN servers, why would they not try to get into yours?
Your ISP can)
That's why I recommended the following:
When you're not using anonymous bridges to connect somewhere, they will know you're trying to route the network traffic over somebody else instead of them, which is weird, because you're not doing something illegal and you have "nothing to hide", right?
When using the TOR -> VPN -> INTERNET (VPN over Tor) flow, even if your VPN server keeps logs, it won't matter, because your IP address will never be revealed to them unless all Tor relays are compromised (that's why I recommend using 3+ Tor relays).
I'm happy to keep helping if you or anybody has any question.