Join us 2025-09-12T21:00:00Z for This Week In Privacy#18, to catch up on the latest Privacy Guides updates and to discuss trending news in the privacy space.
During the livesteam we’ll answer viewer questions. If you have a question for us, please leave a comment in this forum thread or the YouTube chat.
Will it be fair to think of any OS Tor VPN is running on to be half way between Tails OS and any other mainstream OS? (in that everything is routed through Tor but no ephemeral state and only persistent storage).
Will Tor speeds still be the same or does The Tor Project has plans to somehow improve speeds when more people start using the Tor VPN?
Will Tor VPN result in more CAPTCHA’s as the current Tor browser often does (depending on the website)?
What else is more likely to break with the usage of apps and services with the Tor VPN that people may not be thinking about yet? What should users be aware of as the “pitfalls” from a usability POV with Tor VPN? You may also cover the advantages here.
I’m not quite sure of the best way to apply Tor VPN (or InviZible Pro) to application updates. I have a profile that keeps all my applications on my phone up-to-date by routing those requests and downloads through Tor. The major disadvantage is that this often results in failed requests or downloads timing out. Effectively, updates are delayed because some of these apps are hosted on not-so-Tor-friendly servers.
Doing this on a per-application basis (default in Tor VPN?) would be fine if each store only dealt with an individual app provider like GrapheneOS Apps. What I really want might be for each separate party to be contacted over a random circuit?
How does a local based password manager compare to a cloud based manager? Something like Vaultwarden or KeepassXC? Does it make a difference if i were to use Keepass and backup to the cloud compared to something like Bitwarden? I am curious because there is a lot of conflicting information online. I have been self-hosting a couple of other services like Pihole and Miniflux.
I am not someone who is a person of interest. Just a normal person.
You mentioned earlier that configuring a VPN on a router can conceal Tor traffic. While the Tor Project generally advises against combining VPNs with Tor for typical users, Proton VPN offers a “one‑click” gateway into the Tor network. Over the years there’s been differing opinions of the merits and drawbacks of both “Tor over VPN” and “VPN over Tor.” I’d appreciate hearing both of your perspectives on the relative risks of each approach.
Curious as to why, I see it has more benefits that it has downsides, outside of trusting proton ( or needing to trust the vpn provider in general) don’t see where the VPN → Tor → Site is not recommended [and for proton it is recommended to read their threat modeling blog before doing so: Understanding the VPN Threat Model - Proton VPN | Proton VPN]
in fact even tor project themselves doesn’t go fully against it in their wiki TorPlusVPN · Wiki · Legacy / Trac · GitLab
It has zero circuit isolation.
If you want Tor, use Tor.
And if you want VPN > Tor, then use VPN > Tor.
Do not use any VPN that does the Tor on their end like Proton’s.
something’s not adding up, when did they specify they did tor on their end?
Proton literally used VPN > Tor method from what im researching, nothing specifies they do it their own way.
in fact:
At Proton VPN, we implement Tor over VPN, meaning your Internet traffic is encrypted all the way through the Tor network, and your true IP address is never revealed to your ISP or to any Tor nodes.
Proton does VPN → Tor, but they do not give you an E2EE connection from your device to Tor, so their VPN is acting as a MITM that could read all traffic.
You have to be running the Tor client code on your device if you want to use Tor securely, otherwise you are indeed trusting Proton to run Tor “on their end.”