I generally agree with the “Tor over VPN” recommendation and the recommendation against “VPN over Tor”, which was added to Privacy Guides in November 2023:
You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing Tor as normal, through Tor Browser for example. This creates a connection chain like:
- You → VPN → Tor → Internet
[…]
Do not configure your connection in a way which resembles any of the following:
- You → Tor → VPN → Internet
- You → VPN → Tor → VPN → Internet
- Any other configuration
[1] Tor Overview - Privacy Guides
[2] Clarify Tor's weaknesses with respect to observability - #4 by jonah
However, there are a few cases when VPN may be impractical or undesirable to use even when Tor is available, and I also have a question about the “VPN over Tor” case:
- Does the recommendation extend to Tor users who have not set up a VPN to immediately set up a VPN? How strong is the recommendation?
- Connecting to a VPN while moving around, whether constantly or intermittently, may allow the VPN provider to track the user’s location (IP address). Does the recommendation assume the user is stationary or not concerned about location tracking by the VPN provider?
- If the user’s VPN connection is unreliable, for example it drops occasionally, how strongly against dropping the VPN is the recommendation?
- Should Tails users use Tor without a VPN, or should they modify Tails configuration to achieve “Tor over VPN”? If so, how?
- To connect to a service that blocks Tor, is it fine for the user to use “VPN over Tor” once and then disconnect (so there is no persistent Tor circuit)?
Aside: If the user is doing some non-Tor stuff while the VPN is connected and then the VPN connection drops, unless there is an effective VPN kill switch or firewall, all non-Tor traffic after the VPN connection drop will leak in the clear… but this is a general VPN problem not specific to “Tor+VPN”.