Maybe the better option is to use 3 chained VPNs from different providers? (One on a VPN router, the second on the host operating system, and the third on the guest operating system).
While the EFF website is good for some basic education, don’t mistake it for a comprehensive tool that compares to the actual capabilities of tracking companies.
And chaining VPNs as an alternative to Tor? I guess depending on your threat model it could be an alternative for someone, but talking about a general case then no, these two things just aren’t alike. (Any decent OS will allow you to chain any number of VPN connections without the workarounds you mentioned btw.)
Last thing I want to say on the actual topic of this thread: If you ever find yourself in a similar argument with literally Tor developers, take a step back and consider that there might be some things that you don’t yet have a full picture understanding of… nuff said.
I’d rather remotely connect to a rented server so i don’t have to worry about vm escape vulnerabilities.
(Any decent OS will allow you to chain any number of VPN connections without the workarounds you mentioned btw.)
May I ask how to chain VPNs on, for example, Windows? The only way I know is to use a virtual machine.
Thanks, Jonah. Sam Bent gave a good reply to the TorProject on his recent video.
Sorry, but I only know about Linux. GL-iNet makes VPN routers. That would be the first VPN. Then the host OS would be yoour second VPN. Then launch the virtual machine, and that would be the third VPN.
Thanks for the explanation, Nahme.
Any chance that this feature could be re-enabled for safest, as it does worsen privacy with javascript disabled?
“any decent OS” is what I said so no idea about Windows. In Linux what I would do is just use multiple network namespaces and chain them, can run Wireguard in each of them.
I watched both of his recent videos on Tor and Sam Bent gets plenty of technical info wrong and makes plenty of terrible suggestions. I didn’t remember him suggesting to roll back the Tor Browser but if he actually did, that should be the nail in the coffin for his reputation regarding anything related to cybersecurity. Definitely don’t take his advice or commentary on it seriously. It’s best he stick to covering DNM news.