some people are asking me about Orbot in VPN mode. Using Orbot does NOT connect you to a VPN separate from the Tor network, it treats the Tor network like a VPN in the sense that it routes all traffic through Tor (Browser, message apps, games, etc) like a VPN app would, very similar to how TAILSOS routes all of its traffic through Tor.
@oofyeetmcgee Жыл бұрын
Hey, what are your thoughts on Invidious?
@Ulvis_B Жыл бұрын
How many times NordVPN got hacked?
@rayers1000 Жыл бұрын
I thought Orbot was considered a honeypot or some such these days??
@pipbernadotte6707 Жыл бұрын
Network Chuck? More like Fedwork Chuck, amirite u guys?
@Moha-bb7xm Жыл бұрын
Iam behind 7 proxies iam protected
@martuuk8964 Жыл бұрын
Mullvad stores nothing about you. They were raided recently on a warrant for customer information - any and all information about a specific customer - and they could not turn over anything and Swedish police walked away with nothing. If Swedish law ever changes to where they cannot operate like this, they will either move their HQ or shut down. They are extremely principled. If they are ever served with legal documents authorizing active/live wiretap that are enforceable in a country where a given server is, they will simply shut the targeted server down.
@49531 Жыл бұрын
Is this actually the ultimate honeypot
@bruhzzer Жыл бұрын
@@49531they've been in buisness for a long time now, either they're really commited (honeypots usually aren't (as far as we know)) or they aren't honeypots
@notafbihoneypot8487 Жыл бұрын
They also now run everything in RAM officially
@Bond2025 Жыл бұрын
@@49531 Tor is, it was compromised in 2013 in preparation for Operation Onymous. The download had all the security settings set to low by default when previously they were high and for months when security settings were changed to high, scripts were running on every site to assist law enforcement. I even downloaded a exe from the site that contained a profiler trojan, but tor project ignored complaints. Many exit nodes are compromised. Don't use a VPN, they provide all your data to law enforcement and manipulate it. The reason people use a VPN and Tor is because they connect to a bridge to hide what they are doing. Tor is not secure, not private and you can be uncovered at any time. Remember the DEFCON talk that was going to show how this worked - it was pulled and they went quiet. VPNs might not directly log, but hosts that own equipment have to by law. I recently found WeVPN was a honeypot, they vanished once people realised and the police operation was shut down. One server was on a UK police IP. If you connected in to Manchester, UK, the police were watching. Some say these Encryption In transit email services like Proton are honeypots.
@scoobs9696 Жыл бұрын
@@49531 Imagine.... - Hopefully not
@metal-beard Жыл бұрын
Chuck has a history of advertising stuff in the guise of ‘tutorials’.
@michaelm1 Жыл бұрын
Yeah, I've been thinking the same thing. It was just a one big VPN provider commercial masquerading as a tutorial.
@Chasm9 Жыл бұрын
I can't stand that soft spoken shill.
@danielrobinson3654 Жыл бұрын
Almost every video is "And to do that, we'll be using our sponsor..." and then some service that collects all of your data
@EchterAlsFake Жыл бұрын
@@danielrobinson3654For real, thats why I stopped watching him. Also he doesn't really care about questions on his comment section at all. His Instagram OSINT video has millions of views, but Osintgram doens't work anymore, because the author didn't update it and lots of people don't understand that. I tried to tell them and got blocked from his channel. He could atleast like make a pinned comment or something where he tells, that the video isn't up to date.
@tranquility6358 Жыл бұрын
You know that production quality doesn't come for free, right? I don't blame people for wanting to make money by legitimate means. Some of his sponsors are genuinely useful.
@vafixer8885 Жыл бұрын
as some one who lived in china for years at one point - VPNs not government approved are very popular. you usually have to have 3/4 of them since one or two might get blocked one day then come back the next while the other 2 are blocked another day, its like cat and mouse with the government and the vpn companies but the vpns always get through, either in a few days or a competitor does. hence why i had a subscription to 4 of them when i lived there.
@KizukiKotataki9 ай бұрын
Won't the government ever chase after the people there? Or are the VPNs located outside mainland china?
@basilalias96898 ай бұрын
Im laughing at the image of the CCP playing whack-a-mole with VPN companies.
@ainz25794 ай бұрын
Same in iran. Basically everything but porn used to be accessible without vpns but after people protesting and using social media to coordinate them everything got filtered i personally have 2 vpns
@zahiddigital83013 ай бұрын
@@ainz2579 which ones do you use? also by using VPN, your ISP/government wouldn't actually know that you are using VPN?
@ainz25793 ай бұрын
@@zahiddigital8301 they don't care if use vpns its not illegal they oppress for the sake of doing it
@Akac3sh8 ай бұрын
the folding table in the back really adds to the atmosphere of this whole video
@SolsticeSH4 ай бұрын
Its like the dirt in the corner of that barbershop that gives you the cleanest fade. If there is no foldable table behind someone talking about edge traffic I dont want none of what he has to say lol
@Akac3sh4 ай бұрын
@@SolsticeSH you get it lmfao
@sethdouglas27652 ай бұрын
So he can quickly pack up and leave if needed.
@rom36112 ай бұрын
looked at that table at least 3 or 4 times i would say this video maybe even more idk but i agree lol
@livinglikeahuman7918Ай бұрын
I agree
@flioink Жыл бұрын
Network Chuck has never mastered the "pullout framework" - dude has like 7 kids.
@redrootwire Жыл бұрын
💀😭
@zaremol2779 Жыл бұрын
Good for him, honestly
@flioink Жыл бұрын
@@zaremol2779 I mean if he can afford it then - sure.
@mattjax16 Жыл бұрын
It’s cuz he’s crazy religious
@phxsisko Жыл бұрын
He's weirdly religious, so yeah, condoms are evil, etc. It's the reason I don't support his channel.
@johnnymnemonic1369 Жыл бұрын
Don't use VPN: Feds are checking edge node connections and get your IP address Use VPN: Feds are checking edge node connections and get your VPN IP, then have to subpoena the VPN provider to potentially get your IP. What am I missing here?
@schwingedeshaehers Жыл бұрын
They probably also get your name, payment method, email,...
@ВалерийШадрин-л5г Жыл бұрын
You're missing the fact that you are standing out from the crowd of folks that use tor browser as usual. What's the point of slightly overburdening the law inforcement if they otherwise know where to look?
@cyclopsvision6370 Жыл бұрын
Nord says they do not keep logs about users' timestamps and traffic destinations
@tartas1995 Жыл бұрын
They need to subpoena your IP too. Vpns have your payment options. Once at the vpn, they have you. Once at the ips, they have you. Ofc there is a case for this or that, what are your local laws and how are the local laws of your vpn. Which agencies are interested in tracking you and so on. But it ain't that simple
@thewhitefalcon8539 Жыл бұрын
You're missing that feds already monitor vpns
@hughjanes4883 Жыл бұрын
You putting yourself up there with KGB and CIA TOR relays is a level of confidence I wish I had.
@frandurrieu6477 Жыл бұрын
Bro fears nothing
@lolotrololo2275 Жыл бұрын
What KGB?
@b1rdy0xf Жыл бұрын
@@lolotrololo2275FSB
@phxsisko Жыл бұрын
I think it's a joke. Also, the KGB is dead, the FSB is the current iteration. FAPSI seems to be their equivalent to the NSA. KGB seems to be mostly famous due to western movies using them as the other evil spy group, etc. Which, yeah, they, the CIA, they are all super evil.
@lodyllog Жыл бұрын
@@lolotrololo2275 KGB is like a soviet FBI
@jakeplaydirty38829 ай бұрын
Love your logic bro 🙏 Came here after watching that Chuck video strangely. I did leave his video scratching my head a bit 😂 You make much more sense
@heathmcrigsby11 ай бұрын
I use a vpn with tor to browse reddit just to mess with the feds
@toeman46284 ай бұрын
We do a bit of federal trolling.
@ainz25794 ай бұрын
Vpns sell your data to the feds
@fluffy68183 ай бұрын
@@ainz2579 oh no my datat
@ainz25793 ай бұрын
@@fluffy6818 lmao😹
@hucklebucklin3 ай бұрын
Just to have ads from random countries
@MMOchAForPrez Жыл бұрын
Thank God there's somebody out there who doesn't just parrot a popular opinion. It is necessary to provide a reason you don't like something when you suggest not doing it. Otherwise all your doing is making noise.
@jeffhicks8428 Жыл бұрын
new media is literally garbage. interesting that the guy in this video has something most new media lacks which is basic literacy and the slimmest margin of effort in actually making content. it's not common.
@MMMMMMarco Жыл бұрын
Yup 🙏
@wiredfox3451 Жыл бұрын
But all the points he brought up weren't valid for the vast majority of people using a VPN + Tor, most people watching this video aren't doing it from China or a middle-eastern country that have hijacked VPN providers. If you don't trust your ISP, use a VPN with Tor, that way your ISP won't know you're accessing the Tor network.
@privateassman8839 Жыл бұрын
@@wiredfox3451good point
@cc-dtv Жыл бұрын
Popular opinion what the fuck may be popular with the troglodytes remember to update your windows proprietard
@etoilefushigi Жыл бұрын
If you really want to use a VPN and ensure that your opsec is as tight as possible, use a VPN to connect to a remote server like a Windows or Linux desktop, ensure that the VM is wiped when done, and connect via tor browser that way. There are many services that will provide anonymous RDPs and if you use mullvad as your VPN provider generally speaking, you're good in this regard specifically.
@Bond2025 Жыл бұрын
never use Windows, always wipe any PC completely after each use with Privazer, a shellbag cleaner and bleachbit. I spent years testing file and PC wiping software by running it and then examining PCs with EnCase. Evidence Eliminator was really good, but so is PrivaZer. Many others left multiple traces of activity. Your ISP records a lot about you and can provide police with access to your router as ALL of the commercial ones have a backdoor built in.
@casev799 Жыл бұрын
I'm forgetting what an RDP is in this and frankly I think there's probable to many definitions out there for me to look ghrought
@Daveychief23 Жыл бұрын
@@casev799 Remote Desktop Protocol
@treemallow757 Жыл бұрын
Remote Desktop Protocol@@casev799
@visvge4934 Жыл бұрын
Remote desktop protocol lol
@webbonyoutube Жыл бұрын
Correction: The entry node is a "guard node" which is selected from a limited, mostly unchanging list. The idea is that if even if you roll the dice over and over and eventually get two bad nodes, those nodes that never change will keep you safe.
@DERADI30 Жыл бұрын
That doesn't actually sound safer. If you want to track tor connections and all of them route through a smaller list of nodes that doesn't often change that's the first target. Is there more to the system? It sounds like it's just "trust me bro"
@joopie46614 Жыл бұрын
@@DERADI30 You have a point, I would assume that small group of nodes are from trusted sources and probably some other characteristics which would make it less susceptible to spying, but then again if one of those trusted nodes get breached, this would probably eventually get discovered and it would no longer be a trusted node, but until that happens you still have 2 other relays which are very very likely to not be controlled by mutual organisations which keeps it relatively safe, but it still all comes down to chance really And by trust I don't mean each node has an assigned reputation because that would definitely make it an easy target but rather I would guess it comes down to heuristics on volunteer nodes.
@Kilzu111 ай бұрын
@@joopie46614 It would be concern from privacy point of view, but TOR is based on theory of "you can't trust ANYTHING at all". Your connection to between each node is encrypted with different encryption and only 1st node you connect to, knows your real IP or what comes from your computer. This means every node past first node, knows only from which node this traffic came from and what is next destination, if someone tries to track you from one of those never changing nodes, they would have to know what traffic from which source out of thousands of others they would have to follow. More simply, even if someone tries to trace you from the first node your connection is going to, they would have to know at least the country you are at, ISP you are using and public IP address your computer is using, since they would have to screen through hundreds if not thousands of different connections coming all over the world at the same time, unless you are using something like a VPN to raise eyebrows, won't reveal anything other than you are just 1 among many people who use TOR. Now even TOR isn't able to keep you 100% anonymous, I'm pretty sure there are ways to trace TOR users, it's just extremely resource and time consuming, so unless you do something that puts you under someones radar in the first place, your traffic is seen just like any traffic, regular encrypted traffic and hardly worth the time and effort to look into that deeply.
Guard Node: Sees your IPS's IP address, not the content requested Middle Node: Can't see shit, just moves traffic from Guard to Exit Exit Node: Sees your requested content, cannot see who you are
@RobertoRubio-ij3ms11 ай бұрын
Amazing video. No commercial bs and technically accurate. Just gained a subscriber. Keep it coming. Kudos from Panama.
@valdimer11 Жыл бұрын
Chuck is all about monetization. Half of his "tutorials" are cloud based, require credentials to use, and usually only give "free trials". The dude monetizes everything, he even has a "guide" in the description down below, which is a link to his site which you have to pay for if you need any further information. My guess is Nord was probably sponsoring the video.
@Henry-fu2hc Жыл бұрын
To be fair a lot of the time (or at least when I last him watched a couple years ago) he would often have two tutorials, one which shows running it on your own device and one running it is a cloud based server. At the very least if you have a bit of an understanding of it anyway, you can likely use the section of the cloud tutorial post-setup to have your own go at it
@BMW750Ldx11 ай бұрын
you are spot on...bro 😉😉
@alfredcam521311 ай бұрын
Why is this news or even interesting? Of COURSE he's monetizing. He is a KZbinR. LOL
@valdimer1111 ай бұрын
@@alfredcam5213 you missed the point. It's one thing to monetize, but it's another to monetize while not "adding" anything to whichever subject the influencer is talking about.
@ibonihs10 ай бұрын
i completely disagree with him but why would nord sponsor a video about not using vpns? :q
@dingokidneys Жыл бұрын
Tor, as you said, provides a number of bridges to make the initial hop into the Tor network which effectively overcomes the concern that is supposedly addressed by using a VPN. Anyone can run a Tor Snowflake bridge as a browser extension or, if they have the compute and WAN bandwidth, as a small docker container. This helps people living under restrictive regimes and, again as you said, the more Tor traffic the safer each Tor user is. I have a Snowflake docker container running on a Raspberry Pi along with a bunch of other stuff and it's set and forget. I also have the Snowflake browser extension (overkill I know) and, apart from a tiny icon counting the number of connections you've facilitated, you wouldn't know that it's there and doing anything.
@dannydetonator Жыл бұрын
Damn, you're an online bunker! I used just Orbot occasionally with mobile TOR, on my stronger phone untill it recently burned battery from all the work. And a simple free VPN for PC. How would you rate these?
@xaxa-0x3F10 ай бұрын
I would love info on what this browser extension is and if it takes away major bandwidth or whatever
@dingokidneys10 ай бұрын
@@xaxa-0x3F Just Google "tor snowflake" and you'll get all the info.
@fenio819 ай бұрын
Snowflakes to jest drobnostka dla ludzi żyjących w wolnych krajach, nawet nie zauważą że ta usługa działa w tle. Jednak jest to bardzo ważna usługa dla ludzi którzy nie mieli tyle szczęścia i żyją w krajach objętych cenzurą. Każdy z nas powinien dołożyć cegiełkę do tej inicjatywy i przynajmniej zainstalować oraz włączyć rozszerzenie Snowlakes na swojej przeglądarce.
@henrylonghead Жыл бұрын
"Recommend them to just use Tor like a normal person" - Mental Outlaw
@qlippoth13 Жыл бұрын
What else could we possibly use... softether?
@polinskitom2277 Жыл бұрын
@@qlippoth13been forever since i've used softether, any new developements on it or anything interesting happen?
@DOG_EATER_18879 ай бұрын
dawg no one uses Tor with good intentions its entire purpose for most is to be used safely for BAD intentions
@nusplus39859 ай бұрын
@@qlippoth13 i2p
@parsoniareigns8 ай бұрын
@@DOG_EATER_1887yep normal folk use Windows. Might use VPN. Some normal folk might use MAC OS. Linux or Tor. Normal folk do not. Only players. You are 100percent correct.👍
@brad6817 Жыл бұрын
Chuck's linux tutorials helped me a lot. It's very annoying when he disguises a sponsorship as a tutorial and crams hacking into everything he can. I don't think he really knows as much about security as he thinks he does.
@obm_jay Жыл бұрын
everyone i try to follow chuck tutorial they never work and make me go down a rabbit hole 😂
@starship748 Жыл бұрын
@@obm_jay100% -Dude speaks in bullet points. Interesting topics but makes me cringe when he say “hacking” over and over and over.
@Wookiee925 Жыл бұрын
@@obm_jaythere always seems to be stuff missing between steps needed for them to work. At least that's been my experience
@arnezbridges93 Жыл бұрын
Dunning-Kreuger syndrome, where you think you know everything because you don't know what you don't know. Best way to be "confidently incorrect" lolz.
@BeWhoYouWant2 Жыл бұрын
I think he probably knows more than you think, but its also a business for him not a platform to educate people about cyber. Which imo just makes it worse because he KNOWS he is giving bad information but that's the only way he can make as much money so he does it anyways.
@Microtonal_Cats11 ай бұрын
3:13 This part totally comes off as "The way I see it, if you got nothing to hide you shouldn't mind you have no privacy." ...which kind if invalidates the whole video, and this advice. That's odd because everything else on this channel is the opposite.
@garychap8384Ай бұрын
Yeah, I felt that too! Also, there are a few other statements in there which I feel are demonstrably wrong ... or, at least, that there's some narrowing context for his statements that isn't coming across. They're certainly not universally true. Even mentioning the experts statements about not using VPNs with TOR were clearly aimed at those using commercial services based on the false claims those services make... it's a rather broad assumption that only naive people are using VPNs in a certain way for a certain reason, and not getting what they expect. I can give real world counter examples, including how VPN use can be indistinguishable from HTTPS use (even under a protracted state investigation) ... when using actual web services as the cover. For example, my Chinese friend owns a European VPN (running on a cheap cloud VPS) that gets used daily by several users, from China, and has not been blocked once (in a decade of use) despite having had a lot of 'strange' hits to investigate the nature of the 'web services'... even after one of those users came under a three year state investigation for protest activities. This is because the traffic can be switched seamlessly from the HTTPS service, to an unexposed VPN service, without any perceivable change in protocol. Anyone investigating the server gets the HTTPS content, they see no other ports or protocols... and the content being served is credible and benign. So, there's a strong use case... China! I don't think Mental Outlaw actually groks what the youths are doing over there. Sure, there will be some chasing endless public VPNs and open Proxy services that keep getting shut down or blocked... but the savvy kids are certainly not doing that. Private VPNs are a strong tool when properly set up for the threat model you live with. They can be made indistinguishable from bulk traffic, made highly credible and be given a verifiable cover ... TOR traffic cannot, even with obfuscation, as all the entrypoint IPs can be harvested - even the temporary helper nodes! So, no... VPN services for TOR access can be essential, credibly deniable and outstandingly secure. and they absolutely have their place in the security/privacy landscape. anyone that says otherwise should be challenged, as they're almost certainly making assumptions about either the way VPNs are used or the threat models people live under. Personal VPN, as a flexible technology, can be damned useful for privacy, anonymity and credible deniability! But I certainly wouldn't shill for NordVPN or similar commercial services. Not when a VPS running Wireguard, OpenVPN or even just PPTP costs as little as $5 on an unadvertised IP, and can be configured to look like a benign web service from the outside. We should be educating users to do privacy properly, according to their threat models... not flatly discouraging them from using certain tools simply because those tools can also be used poorly. Hopefully Outlaw will revisit this topic with more nuance.
@franckizeАй бұрын
My god the “read more” option didn’t prepare me enough
@_Baleful27 күн бұрын
Totally agree. It’s just wishful thinking on the part of Mental Outlaw - He wants to believe “tor makes us all look the same.” Naw dawg, tor makes you look like a criminal, that’s the world we live in
@Haolemi16 күн бұрын
Yeah, "if you don't have anything to hide, why worry about your own privacy?"
@Secret_Takodachi Жыл бұрын
The best opsec is that of a ritualist. No overlapping usernames. Seperate accounts attached to seperate e-mail address. Only use certain accounts on certain devices. ALWAYS FOLLOW YOUR OPSEC PROTOCOLS NO MATTER WHAT. No matter what your reasons are: the thing that gets competent actors caught is LAPSES IN OPSEC PROTOCOLS. Standard Operating Procedures are the *standard* for a reason! It's not about insanely over-complicated security: it's about CONSISTENT security that meets the minimum thresholds for data obfuscation. Failures in security practice consistency are what breach "impregnable" defenses, not insufficient security. At least among those who know what they're doing.
@specthegod Жыл бұрын
Kenny having the peoples back, as usual. Alwsys sharing as much as he can to keep people with less knowledge than him safe... I really hope you continue to make videos like this... because privacy is a human right that is slowly being STOLEN from us by governments/large tech companies... so wr need people like you on our side, now and especially in the future.
@dannydetonator Жыл бұрын
Yes, but you can add private mercenaries, scammers and black-hat crackers to the list. Internet is fckd though, big time.
@cooloutac10 ай бұрын
Or he's making you a victim. Claiming a VPN doesn't necessarily add to your privacy and makes you stick out more than just using tor.. are not valid reasons to not use a VPN imo and I actually find it suspicious he's claiming they are. I clicked on the video thinking he was going to give me some actual technical reasons of how a vpn breaks the privacy of Tor but I should have known better.
@garychap8384Ай бұрын
@@cooloutac He's wrong : / Well, not entirely wrong... but he's looking at all this from a very western perspective. A perspective where just visiting an entrypoint won't get you tortured or imprisoned without trial. Unfortunately TOR use is visible... Many of the TOR 'Helper Addresses' can be harvested... and that's a problem for SOME people in SOME countries. The solution, currently, is obfuscated VPN's that are set up to hide within HTTPS traffic in such a way that no VPN use can be ascertained and the public content offers full credibility. I know some Chinese examples of this, that beat the active state blacklisting attempts and the potential persecution of users. TOR-over-VPN can be absolutely essential. But it has to be set up properly according to the specific threat model and thus commercial VPNs often just don't 'cut it'. General handwaving based on the general western case, just pollutes the information space unnecessarily : ( I hope Outlaw one day revisits this topic with some, much needed, nuance.
@cooloutacАй бұрын
@@garychap8384 eh, he's just repeating what most people say unfortunately. Its probably a narrative put out there by the government, who want to monitor our every little action through our isp's, whom as has been revealed the past 4 years are possibly under the control of the axis of evil.
@cooloutacАй бұрын
@@garychap8384 "set up properly for the specific threat model" Yeah, we hear that fluff all the time, but what does that even mean? lol. and while you at it what do you even mean by "western case"? I think the truth is discouraging vpns is only in the interest of government surveillance no matter how you cut it. Tor is just not practical for most people and as you say maybe even less safe to use than a vpn. The problem is picking out a trustworthy vpn that won't cave to government backdoor pressure.
@cowz8496 Жыл бұрын
Love your content but gonna have to disagree on this one. The main point I got from this was that there’s no point using a VPN because the way that TOR works is secure enough. If TOR works as intended, where you’ve got 3 different nodes operated by 3 different entities who don’t communicate with each other, then yea, having a VPN isn’t gonna change much because no one can tie you to the exit node in the first place. HOWEVER, is there a possibility that you connect to 3 nodes all controlled by a single agency? Getting into tinfoil territory here but yes, there is a CHANCE. And if that’s the case, it’s gonna be much easier to get your data from ur ISP than a reputable VPN provider like mullvad. I just don’t think it makes sense to criticise connecting to a VPN before accessing TOR on the basis that it doesn’t add any extra security. People use VPNS on the CHANCE that TOR isn’t as secure as you’d think.
@Cookiekeks Жыл бұрын
If they compromised Tor, they might as well have compromised your VPN provider. At this point you are f-ed anyways. How far would you take this logic? There also is a chance that all 3 nodes, and the vpn are controlled by the feds, so should you always chain 2 VPNs together? Or 3, just to be sure?
@lydellackerman800 Жыл бұрын
and i hate this stupid fucking assumption that all vpns will just sell yo shit. Multiple vpns have been subpoenad and had NO evidence to hand out, im aware of PIA and Express currently, as for the "they can get your payment information" is only applicable if a single person is on the server, how would the feds distinguish me from the other 16 people routing through the server?
@СтасСтафеев Жыл бұрын
VPN isn't recommended because four relays would make the connection uncomfortably slow, i guess... Plus, as Kenny mentioned, four-relay would just stand out in the Web. There is no point of the feds to hope for the whole Tor connection to fall on their servers if they can see a four-relay, subpoena the VPN provider on the end of it and sit hard on that connection.
@ryan-el9er Жыл бұрын
@@СтасСтафеевhow does a 4 relay stand out? how would the feds actually know it was 4 connections without investigating data from each individual node until they realize there is 4? isn’t it encrypted again at each node to prevent investigating one node from revealing which connections data was sent to which node?
@user-xl5kd6il6c Жыл бұрын
@@СтасСтафеев it doesn't "stand out", there isn't even a way they can count the hops. And on the VPN, that same IP is shared by a high number of users. The only thing they know on the VPN is that you are using Tor When/If they do get the specific IP that is using Tor that is yours, they STILL have to request your info from your ISP
@Ginfidel Жыл бұрын
Using the stupid 'app' that comes with these VPNs is the first problem. Set up a custom router and configure an interface that routes ALL traffic through one of your VPN's servers, so that your endpoint running TOR is fully encapsulated. NordVPN supports this as does any other VPN worth it's salt. Bottom line, kenny: VPN traffic is LESS SUS than TOR traffic. ISPs keep lists of their clients who use VPNs and who use TOR. Those lists are gonna be used against everyone on them someday. You really want your residential IP on the 'raw dogging TOR' list? Seriously? If you think I'm nuts, fine, put it this way instead: your ISP does not deserve to know that you are connecting to TOR. Don't bend over and hand away that information. Let them think you're another dumb normie who fell for the "Hurr, it encrypts my why figh!" marketing.
@TV-vz8kv Жыл бұрын
Also kenny doesn't understand that "unnecessary" VPNs/proxies/tunnels are what keeps tor usable in countries where direct connection and connection through bridges is blocked. + In some countries it matters whether you connect to the tor network through VPN or directly, as it may grant you plausible deniability when giving answers to some questions from local authorities.
@Ginfidel Жыл бұрын
@@TV-vz8kv Could be true. But I can't really speak to that experience. I can only speak of the good ol' US of A where ISPs keep lists of everything their users are doing on the internet, and will hand them over to the feds at the drop of a hat if asked. And it's a question of when they'll ask, not if. When that day comes, the less your ISP knows, the better.
@OceanicManiac Жыл бұрын
How do you set something like that up?
@Ginfidel Жыл бұрын
@@OceanicManiac That's a lot to type out and I can't post links, so hop over to your search engine of choice and search 'setup pfSense VPN client' and you'll get a mix of official documents and third party tutorials. pfSense is a FreeBSD firewall operating system that I run on an old gaming PC (with a few extra NICs) as a router. During setup you can leave a NIC un-mapped to LAN or WAN and instead map it as a hardware VPN interface so that anything you plug into it will have 100% of its traffic go straight thru the VPN instead of ever touching LAN/WAN Pfsense is a lot of work at first, but once configured properly, it's very rewarding and low-maintenance
@Lee-wh3ht Жыл бұрын
@@Ginfidel so then since your so concerned might I ask what your home network looks like
@talis1063 Жыл бұрын
My intuition with VPN has always been that you're basically replacing your ISP with another one. Only useful to tunnel around whatever part of the network you don't trust / can't get through. The tunnel ends at the VPN provider, but the VPN provider still has all the info your ISP would normally have. If you trust the VPN provider more or give them less info about yourself than your ISP then I guess that's fair.
@EdmondDantèsDE9 ай бұрын
It makes a huge difference because your VPN provider is preferably located in a country with much stricter data privacy laws. VPN providers are also financially incentivized to legally fight against handing out data while ISPs mostly don't give a shit.
@BillAnt7 ай бұрын
Might as well just use a Proxy for hiding your IP to get around restrictions with less overhead and latency than VPN's. Also simpler to set up and cheaper too. VPN's used to be useful before HTTPS/TLS encryption of 99% of modern websites.
@matthewprier43403 ай бұрын
I see the arguments here, but for me it comes down to corporations. In the USA only a handful of corporations control ALL internet traffic. Often you are lucky to get 2 options for a provider here, some places literally have one choice. Larger places have multiple choices but they all tend to become ATT/Comcast in the end. So, here, a VPN does sort of replace the ISP, but it replaces a corporation that is so willing to sell you out they are monitoring organ prices for a COMPANY that has a vested interest in your privacy for their profits. When you r business model is "we won't rat you out" you have a strong incentive to fight any attempts to access your customer database. Can it happen? Sure, they have to follow laws that keep getting more draconian but they also have the means to work every legal angle first. For the enforcement side, an ISP is a no-brainer to ask for information on any little whim. A VPN company is going to take some solid reason to go after them because it won't be cheap and unless they get a conviction that's money wasted. I LIKE that the sellout YTber recommended dual layer to his viewers. He is popular, and well liked and trusted so that means it is more likely that a bunch of new VPN+Tor connections pop up making the argument that it is enough suspicion to pursue weaker for enforcement. Again, this is for the USA, where money and power are the arbiters of reality so that's where you will see the most pressure. Your country has some ultimate structure as well that decides things for the masses, and that is where you should invest your effort in security. I do nothing interesting online, haven't for decades, but I use a VPN always and am switching from Vivaldi to TOR for most of my browsing just to add to the noise floor. Remember, if we are all doing it, no one stands out enough to be a threat. I'd rather protect a hundred illegal users to make sure the one journalist or protester doesn't get ganked to silence them. It is not our job to stop crime, and they need to step up their skills not rely on our passivity.
@acatinatux96013 ай бұрын
@@EdmondDantèsDE is nord vpn safeish?
@BoleDaPole2 ай бұрын
Nord will share your information if they're asked by the US government. Whether that's an issue for you or not is your own answer to solve.
@damiank65665 ай бұрын
As much as I like Chuck's videos I think he doesn't go into details far enough sometimes and I'm glad you did some more advanced analysis. You just earned a subscriber, sir. Keep coming vids like that
@weathercontrol0 Жыл бұрын
Tor over VPN is a good choice if you want to hide the fact that you are using Tor from your ISP/Government, especially if you are hosting onion sites, a lot of traffic to the Tor network is suspicious, even though nobody know what exactly are you doing there. And in countries like Russia it's pretty much a necessity at this point because all tor IPs are banned and bridges are getting constantly banned too, so VPN is only reliable choice to access Tor network, in countries with little more freedom it might not be that necessary
@user-jq3rf4tnd3s Жыл бұрын
vpns in russia are dpi banned too
@Bubble23428 Жыл бұрын
😂😂😂
@zefnine Жыл бұрын
This is literally the reason Tor bridges exist...
@ButtMonkey985 Жыл бұрын
Did you even watch the video....?
@dimoniysh5075 Жыл бұрын
Tor works for me and i in Russia lol And my isp uses dpi too
@RedactedBrainwaves Жыл бұрын
"Your VPN provider will send us the traffic" MENTAL OUTLAW IS A FED CONFIRMED!!!!
@Brian2 Жыл бұрын
I just want to point out that in, 2020 I believe if not then 2021, in the winter it came out Tor Guard nodes were a quarter compromised if not more so. That means that first node you use, the most important, is likely to be an enemy. The only reason to go for a Guard Node like that is to deanonymize people. Any time this is brought up and how much is the same now (Unknown. Can be 1% can be 90%) means it can not be trusted. Would you trust a VPN that shown that large of compromised servers? No. No one in videos brings this up either. Or in forums. They go all quiet and ignore it, try to change the subject. Here you don't even bring it up either, which is a shame as I wanted your input on this angle and factual evidence we have for how bad Guard Nodes are. You are saying here to trust what we know for a fact has been compromised to an insane degree. Adding a VPN that has been proven in the courts to not keep data (Mullvad) means the Guard Node being an enemy doesn't matter nearly as much. By the way the more popular it becomes for VPN-Tor means the less you stick out. With Network Chuck having that come out along with others wouldn't that be safer overall?
@crisper1614 Жыл бұрын
Very excellent critique.
@curious2882 Жыл бұрын
Yes! Tor has been PROVEN compromised since 2013! When Freedom Hosting was shut down. The NSA made a whole speech about how they can de-anonymize Tor users, a tor darknet hoster was discovered and prosecuted, and it happened again in 2015 as well as 2020 just off basic googling. Tor is NOT safe! The NSA (and thus the rest of the US government if they ask) can and will find you if you get on their radar. Tor will not protect you.
@realcartoongirl Жыл бұрын
yes but network chuck use nord vpn and has 7 kids
@Splarkszter Жыл бұрын
Network chuck was paid to fo that video in that way. Completely insecure.
@NeostormXLMAX Жыл бұрын
people have said in the past that there is a high chance that mental outlaw is a glowie, after all he is literally subtlety advertising illegal activities and has not been blacklisted by the algorithm, and has even gotten sponsored, he also talks like alot of CIA type people.
@thedankwalrus Жыл бұрын
thanks for making a video about this topic, have always heard that using a VPN alongside TOR is a contentious topic but never knew why.
@Alm8hoorOW6 ай бұрын
I’d argue that using a VPN won’t make you stand out as a threat because almost everyone is doing it. Actual threats have a whole bunch of compromised computers which they use as proxies in a network. And these guys infect and change proxies every few minutes so it’s impossible to track them down.
@dawok5689 Жыл бұрын
But I thought VPNs were 100% hackerproof because everyone said so.
@Thurgenev Жыл бұрын
It is, but you also need to be mounting an unicorn with rainbow coming out of his butt
@Ginfidel Жыл бұрын
lol VPNs are useless in the hands of 90% of the people who use them, but we need those people to keep using them. It normalizes VPN traffic. If 1000 more normies started using a VPN to keep themselves safe from the hackermans, that's 1000 more connections for the feds to waste their time decrypting. The more idiots who use VPNs because they think it encrypts their heckin wifi, the better. They're subsidzing those of us who actually use them properly, both financially through normalization.
@crisper1614 Жыл бұрын
@@Thurgenevthis is incorrect. The rainbow is optional.
@ValleyMansonOfficial Жыл бұрын
Those sponsored ads for VPNs are bigger liars than infommercials for Testosterone boosting supplements 🤣
@Kermit2k Жыл бұрын
Same people that say tor is 100% hackerpoof.
@extraspecialk3244 Жыл бұрын
I have heard of a case involving a correlation attack. Which involved confirming that a suspect was showing up as "online" during chatting over a TOR service. Then the suspects ISP confirmed they were using the TOR network at the time. Granted, they already had a lot of evidence on this person.
@Randomnessinlife Жыл бұрын
Estonian government (or specifically Estonian Police & Border Control) has performed network correlation attacks against local darknet vendors by sending a succession of messages to their messaging app and then requesting ISPs to disclose info what region received their sent succession/pattern of packets. They repeat this action to narrow down from region to city, street and finally address, where they get the final end user. Similar case I know was when some government employee's credentials (or username) was seen by co-workers who thought it'd be funny to log in to her account. So they downloaded Tor and tried to log in via Tor Browser. They used TOR because they didn't want to get caught and thought using Tor would guarantee their safety. Government checked who, what IP in Estonia had downloaded Tor installer in the past few days. IIRC this was enough proof, that they downloaded TOR just recently and as the ISP also could prove they connected to Tor network around that time, but I could be misremembering that case, plus those guys went with a plea deal in the end anyway. Source: public record court documents
@bloodhound1182 Жыл бұрын
If they had a lot of evidence on this person already, then this case is nothing to worry about. Police can't arrest you over circumstantial evidence. Unless you're the kingpin of Silk Road or a mf international terrorist, chances are police aren't gonna have enough to prosecute you.
@sultanhanga7 ай бұрын
Silk Road ?
@extraspecialk32447 ай бұрын
@@sultanhanga too long ago for me to recall now. I don't think it was.
@helloofthebeach2 ай бұрын
I definitely remember a story about a college student using TOR to make a bomb threat so he could delay an exam. The college quickly flagged him by checking if anyone was using TOR on the campus network when the threat came in, and it was only him, in his dorm room. That's only circumstantial evidence, but he also fessed up instantly when asked. This _is_ a circumstance where a VPN would have helped him, because his adversary was looking for something very specific that was out of the ordinary, and if he always used a VPN, his traffic would be disguised as his own traffic. The college knowing he always used a VPN and was online at the time still might have put him on a list of suspects once they saw no one was directly using TOR, but he'd have had a compelling alibi. But given the fact that he thought this was a good idea in the first place, the outcome isn't really surprising. I think good OpSec requires a basic understanding that actions can have consequences, and this guy clearly did not. Also, he can go to hell.
@disfeed Жыл бұрын
For clarification regarding China's firewall. (Also known as the Great Firewall) There is actually new technology involved with identifying VPNs. A connection to a VPN creates a TLS connection. Connecting to any normal website also creates a TLS connection. So now you are essentially doubling down on TLS connections. Shouldn't be a problem right? With machine learning, it's actually possible to detect overlaying TLS connections, and block them. This is how ALL VPN's in China have pretty much been stopped. There are some cavates but unless you have some serious Linux knowledge, and spend several hours learning, it is a really difficult to evade the GFW.
@GenrichX Жыл бұрын
Nah. Lol
@disfeed Жыл бұрын
@@wetfart420 It is region based, and some VPN's will work, but thats not the main issue. The issue is payment. Almost all online payment is tracked in China, and as such, can easily be blocked. Crypto is also banned in China which doesn't help.
@gusfl29 ай бұрын
I do confirm what you say. For this reason, some VPN providers use innovative tactics (base64 in plain HTTP requests. The base64 is encrypted and does contain TCP traffic) instead of famous VPN protocols like openvpn
@woodingot8 ай бұрын
The vless proxy protocol's xtls feature can detect whether the traffic is tls encrypted and avoid double tls.
@disfeed8 ай бұрын
@@woodingot Yeah, XTLS is just difficult for people to set up without proper know-how. You need a client and a server. Setting up a server is quite hard while being in China, so usually you will purchase access to an XTLS server.
@MiClLC9 ай бұрын
I use this analogy. Think of Tor as a castle, it protects the space that you're in but doesn't necessarily protect YOU. Think of a VPN as hardened armor. That is what protects you from the evil ISP Dragon that's lurking somewhere in the castle. You have maximum protection, but don't think you can't be eaten if you do something stupid (bad opsec).
@reznovvazileski3193 Жыл бұрын
All I heard was "Use Tor+VPN to run hemeroid videos all day on an unused PC so the feds are now stuck scrolling through hours of hemeroid footage after months of waiting to crack the encryption"
@ReclusiveAshta Жыл бұрын
I would have to contest your reasoning. In theory a VPN shouldn't be able to see any more infomation about your Tor traffic than your ISP would. Additionally if more people used VPNs with Tor this would naturally make each individual stick out less, so it might actually be a good thing to promote. It's more risky for your ISP to know you're using Tor than it is for a VPN because 1) An ISP has more identifiable infomation about you 2) An ISP must be located in the same country that you're in.
@max_ishere Жыл бұрын
As you've just proved in your comment: there's no additional protection
@ReclusiveAshta Жыл бұрын
And another: 3) An ISP is most definitely keeping your logs, either to sell your data or for legality purposes, whereas a VPN isn't *necessarily* keeping your logs (as long as it's a good one!)
@NotKewl Жыл бұрын
This is true. Also, hundreds to thousands of users may share the same IP on a VPN and, despite Kenny being a doomer and believing all VPN's are fed honeypots logging and sharing your info, a good VPN provider probably isn't logging (whereas your ISP definitively is for some countries).
@sveb7632 Жыл бұрын
@dedhorse5720correct me if I'm wrong, but your isp may know you're connecting to a vpn, but it has no knowledge of what's being transferred between
@ReclusiveAshta Жыл бұрын
@dedhorse5720 How do you know the ISP would be able to tell using this setup? Shouldn't it only be able to see the first layer of connection?
@Derbauer Жыл бұрын
Hey Mental Outlaw, we appreciate you. I think your suggestion at the end, to setup a middle Tor relay for 5$ a month so that as you use Tor you also lease bandwidth upto 1.5tb or so a month, is superb and hoping that people watching this, follow suit.
@phxsisko Жыл бұрын
Newer DD-WRT firmware's have a TOR mode for a relay setup. I'm thinking about it since I have two of the same router flashed and capable. I'm also in the process of rebuilding my entire network to something more secure. Looking to start with a new hardware firewall (PFsense) first. Between the plugins.
@joer838611 ай бұрын
Let me get this straight (and correct me if I am wrong in my understanding), you are PAYING Tor so that people can USE YOUR bandwidth? What do I get in return?
@Derbauer11 ай бұрын
@@joer8386 it's about giving back, not just taking. When you use Tor, it's because volunteers are paying for the bandwidth you use. So, knowing that you're indebted to the kindness and generosity of anonymous volunteers, you want to pay it forward, if you find it affordable. You do it to help others, not just yourself.
@0269_m8 ай бұрын
@@joer8386are you one of those script kiddies. Open source is one of the main thing we defend and live for we don't get anything but 5$ donation will help t0re
@rayhimmel71678 ай бұрын
@@joer8386 that's the point, you won't be paid for a good cause, like you don't pay for using tor but you help millions (and eventually yourself), as hundreds of others help you
@Katsumato0 Жыл бұрын
I work in cyber security. We can analyze netflow to and from an IP address using some very expensive tools. It's not 100% all of the traffic since it relies on nodes placed throughout the world. It still reveals the IPs with lots of traffic from your house or wherever. There are better tools than I use at work to link the IP's. There are plenty of ways to get around this. Use regular ports and protocols (think HTTPS TCP 443) and CDNs to blend in.
@Akac3sh8 ай бұрын
what if i turn my pc off then back on again
@pitu59387 ай бұрын
@@Akac3sh same public ip 🤣
@Que_Maine6 ай бұрын
I worked in cybersecurity for 5 years and you cannot analyze net flow, has to be a national threat. And still tracking has to be signed off by higher levels.
@monkieie4 ай бұрын
If you try to analyse netflow on encrypted traffic then you'll only see the header information but the payload is secure. Try showing me a tool which can decrypt traffic in real-time.
@MrCmon1139 ай бұрын
It's crazy that this guy hired an actor to mime his words. Godlike levels of opsec.
@Incidius3 ай бұрын
Lmaoo I didn’t realise until now
@薹Ай бұрын
@@Incidius It's a joke
@go_better Жыл бұрын
Thanks a lot! Gotta educate myself more on Tor and VPS. Thankfully, you got vids on the subject.
@ShaferHart Жыл бұрын
Dude, there are all sorts of reasons why you might want to hide your tor traffic from your ISP. That alone is a good reason to use a consumer VPN.
@ivystopia Жыл бұрын
If you are being monitored, and you only open Tor to perform an activity you do not want tracked, and you connect via TOR to a compromised endpoint - then the times TOR traffic occurred on your internet connection will correspond to the times the endpoint sees your traffic. For example, compromised webserver sees a session from 14:05 - 14:55, and your ISP sees you were using TOR for that time, then that incriminates you. Your ISP is more likely to hand over this information to law enforcement. If you are running a TOR node 24/7, or running TOR through a VPN that doesn't cooperate with law enforcement, this does not apply.
@EwanMarshall Жыл бұрын
The vpn connection at the same times does though, that has been used in a court case before to compromise one guy.
@NeutralOrNotTooBadStuff5 ай бұрын
@@EwanMarshallWhat court case exactly?
@MrKotoCraft7 ай бұрын
Conclusion: Do not use internet.
@Haolemi16 күн бұрын
Holy Unabomber
@Charles.Foster.Offdensen10 ай бұрын
Thank you! That video felt like such a joke - just one giant ad, masquerading as a tutorial, and that bothers me, since I know people believe a lot of the things they see, and won't understand that. It's good to see anyone actually suggesting to people not to use a VPN for this - it wasn't the first video I've seen recommending it ! The VPN sponsoring tuts are illegal when the channel doesn't say it's an ad. Nobody seems to care enough Anyway, I think Tails would be the best thing to use. It all really does depend on your threat model - people dont talk about that enough on YT... i like that it was done a bit here
@jmtradbr Жыл бұрын
Tor with VPN is like entering a place in disguise accompanied with someone who knows your real ID. Your privacy will depend on how much you trust this third party.
@TheTweaker1 Жыл бұрын
I think there are many more trustworthy third parties (like Mullvad, and IVPN) than ISPs, many of which have very questionable privacy policies.
@wiredfox3451 Жыл бұрын
More like using tor with a VPN is like entering into a place in a disguise and having a friend who stops the other guy from coming into the building who knows your real ID.
@pasauliite Жыл бұрын
On my opinion, the best rout is : Neighbours wifi -> OpenVPN on russian server -> tor
@ynnda6155 Жыл бұрын
😅
@polinskitom2277 Жыл бұрын
hope you at least spoof your MAC if you're doing that
@donaldkgarman296 Жыл бұрын
ANY AGENT WILL FIND YOU , THAT IS A RED FLAG MOVE .@@polinskitom2277
@GameCode64 Жыл бұрын
What i used to do on high school was routing SSH tunnels over ports 80 and 443. Because all other outgoing ports were blocked. So because i used those to route my 2 servers with SSH tunnels, i was able to use the TOR browser. But i didn't do it to hide the connection. Just to make the connection. :D
@qlippoth13 Жыл бұрын
Normally just looking on the lab proctor's desk for a sticky note will yield a password for elevated access.
@TeaInTheMorning-we2kh Жыл бұрын
The admin password at my school was just the name of the school with no caps or spaces haha
@arandomcommenter412 Жыл бұрын
I like your funny words magic man
@GameCode64 Жыл бұрын
@@qlippoth13 Well it was mostly bring your own device. But the network had those ports disabled for students, teachers and even the inhouse IT manager. So it didn't matter if you were on one of their computers or on your own computer plugged into the network with cable. Or connected to WiFi. Only ports 80 and 443 were open outgoing.
@qlippoth13 Жыл бұрын
@@GameCode64 Ah yes, things have come a long way since the days of the PDP-11/70
@agranero6 Жыл бұрын
The MIT student that sent bomb threats to avoid a test was arrested BECAUSE he was not using a VPN as he was on the University WiFi and was the only one connected to TOR at that time. I am not condoning sending bomb threats, not even fake ones, but this show that your decisions must be taken in a case by case basis, use your mind not rules of thumb.
@abreiseАй бұрын
Drake now giving cyber tips, sick! Jokes aside, thank you for the quality content, just subbed!
@LuigiMordelAlaume Жыл бұрын
1:15 "So why is he recommending a VPN?" You're too nice... The real answer is he's trying to get that affiliate ad money 🤑
@classicallibral5903 Жыл бұрын
Maybe combine everything: proxy + reverse proxy, then Mullvad than tor, and just for in case a proxy or reverse proxy gets hijacked have a couple, and make em switch every so often, randomize it, make it a headache, even for your self to track where a traceroute begins and ends, than you know you are reasonably secure, you could of course add anything in the mix :) And watch Three Days of the Condor 1975, good movie :D That work he did with those phones was just pure gold :D
@jon.schnee10 ай бұрын
Technically this would work right? But the internet speed would be slow as a snail or no?
@michaelplaczek9385 Жыл бұрын
No, it’s a redundant layer of security to hide your IP if a Tor Relay Node is corrupted somehow
@williamrutherford553 Жыл бұрын
If a threat actor can gain complete control of a Tor relay node and deanonymize you, then gaining access to your VPN service is a walk in the park for them. If anything, it'll just provide more evidence they can corroborate against you.
@TheTweaker1 Жыл бұрын
@@williamrutherford553 How will the VPN service provide more evidence than just connecting through your isp?
@daLiraX Жыл бұрын
@@williamrutherford553 that's not how this works. Or at least if you're not shouting your private data out there.
@Daveychief23 Жыл бұрын
@@williamrutherford553 The thing you are forgetting is a simple cost/benefit analysis - These things can take time; The challenge how difficult it is to bypass 1 layer; It's how difficult it is to bypass SEVERAL layers. Resources, Manpower and Time is limited - if you're just some random Joe looking at memes over Tor, it's not worth the cost in time to crack every single layer. What benefit do they gain? However - If you are on the powers'-that-be's list, they are much more willing to incur a larger cost, as the benefit justifies the means. With that in mind, consider the following two scenarios Scenario 1 - No VPN, using Tor to buy drugs on your favourite onion plug. In this case you are one mistake/leak/disclosure away from total exposure. 1 Tor relay cracked, 1 failed bridge, a DNS leak, or any other leak of your traffic for that matter. Scenario 2 - VPN, Using TOR In this case, for your true IP to be exposed, they must gain info/crack traffic from your VPN provider, AND additionally get your TOR traffic. On a final note - consider this; Not all users who want to anonymise themselves do so to avoid scrutiny from their local powers; It's additionally a solid option to protect your traffic from Cyberattacks, such as a Man-In-The-Middle attack (in the case of unprotected networks). It could be for say, KZbin Stars/Streamers who want to keep their identities private from their fans. Perhaps you don't want advvertisers going "Oh, this IP just bought a 18 inch dragon shaped dildo, Let's add "Sex Toys" and related tags to this IP and sell it to other advertisers!" when you live in a house share, student accomodation etc etc etc The use cases are vast, varied and wild - But let's put summarise it in simpler terms: When it's cold outside, do you go outside naked, because your skin should protect you from the elements? Or do you add socks.. a t-shirt.. perhaps a jacket, gloves., or a hat? I think you get the idea :)
@Daveychief23 Жыл бұрын
@@TheTweaker1 Your ISP likely only has your bank account number for the Direct Debit, Your name, and whatever email address you used to register with them. In the case of people trying to remain anonymous, they likely have a "Normie" email address, and a "Dirty" email address - usually several. If you register for your VPN using your dirty address, as you're trying to remain anonymous, if the VPN service handed that over, or it got hacked and leaked... then that address is burned, alongside the payment method, tying that payment method, bank account to that dirty address
@PirateGhostDJ Жыл бұрын
The practicality and reality of that $5 wrench method comic made me chuckle 😂 Absolutely that would happen!
@McCracken20032 ай бұрын
About sticking out because you're combining tor and a vpn reminds me of the saying "its easier to hide in public than in private"
@PanicOregon Жыл бұрын
Thing is if someone wants to hide the fact they're using Tor from their ISP, a VPN isn't entirely necessary or really even a Valid option due to things like Super-Cookies some ISPs embed on the packet when it leaves your network. Instead i would say obtain a private server or even an anonymous private server from a host that accepts XMR, and host an encrypted connection VNC to that server which you will run the TorBrowser or even a Tor node off of.
@Ginfidel Жыл бұрын
Super-Cookies? Wanna cite that, friendo? How is the ISP embedding this? Through the router they provide? You know, the one people should never be using if they care about security? Through the ONT? You know, the media translation box that has less CPU power than an arduino board? If they're waiting until the backbone to do it, they're gonna have a bad time appending anything customer-specific without bottlenecking it into oblivion.
@PanicOregon Жыл бұрын
@@Ginfidel it's an much older thing, some ISPs don't do it anymore. But yeah the ISP embeds the 'super-cookie' on the packet when it leaves your network, if i remember correctly it's after it leaves your home network it's done on the ISP level through their infrastructure.
@Nathan_Woodruff Жыл бұрын
If the super-cookie is embedded in http headers, using a vpn or even just https will prevent it from being added. If the super-cookie is added at the transport layer, it would still be stripped at the vpn provider since it can only be applied to the outside of the tunnel, not the data contained within. That means at most your vpn provider will be able to see the ID, which is irrelevant because they have your IP, which is already more than enough for a capable adversary to identify you. The same risk applies to renting a cheap vps since your vps provider can see this ID along with your IP, but this option is far easier to track via externally monitoring their network, since you are the only one connecting to it.
@ModPapa9 ай бұрын
how the hell can a super cookie be placed into HTTP headers, if the HTTP request itself is encrypted with TLS? Please explain.
@PanicOregon9 ай бұрын
@@ModPapa The supercookie is placed after it leaves your network, you would need a external server for it. The full packet is not normally encrypted tho, as the WAN needs to be able to read the IP, and a couple other headers to know where it goes.
@HollyTroll Жыл бұрын
Don't use tor with VPN so u wouldn't stick out to the feds.... Don't forget to buy the "COME AND FIND IT MONERO HOODIE" 😂❤
@alien3.0c Жыл бұрын
lmao, every single time
@user-di5wj8is7i Жыл бұрын
They only need to monitor the first and last hop to de-anonymize you. All VPNs are likely monitored, they don't have to go after the VPN company, they can go after datacenter, or one of the hops they use. Tor has guard rotation. When you use a VPN you're effectively giving yourself another permanent first hop. If they compromise the VPN company, Tor's guard rotation feature becomes effectively useless (on the scale of a well-funded attacker). Basically, on a large scale, it's easier for the feds to monitor every VPN connection than every ISP connection, or entry node connection. Decentralized is better. VPN undoubtedly decreases your anonymity.
@aronm5329 Жыл бұрын
Nord isn't monitored. They make that their biggest advertising pitch
@cyxceven Жыл бұрын
@@aronm5329 LMAO
@LuciferArc1 Жыл бұрын
But the fed runs tor. They own it. They already know everything within tor
@LuciferArc1 Жыл бұрын
@aronm5329 nord lies. Fine print says they do and they've already given information over before. They're required by law to keep logs and give them over
@testacals Жыл бұрын
@@LuciferArc1 Tor is open source, so everyone knows everything in tor. Feds doesn't run tor nodes though.
@Tech-Subsequent29 күн бұрын
Sir, it is interesting that you brought this subject up. I also saw Network Chuck's recent video and I was a bit confused, he actually warned people about using a VPN and Tor in one of his earlier videos about Hacking.
@okman96848 ай бұрын
The irony of using a VPN for anonymity while giving away your credit catd info
@verack1616 Жыл бұрын
Imagine having a personality test and one of the questions is: "If you have $5 dollars what would you buy?: - VPN services - A Relay - A Wrench
@SpoopySquid Жыл бұрын
This feels like a question Doc Mitchell would ask at the beginning of New Vegas
@anispinner Жыл бұрын
VPN is used by over a billion people daily, while TOR is by a couple of millions. I can hardly see how can you stick out less by using TOR.
@nottifps Жыл бұрын
Using a vpn blocks tors own hob changing so u basically have a permanenr hob that can be tracked while using vpns
@LuciferArc1 Жыл бұрын
@nottifps but tor is literally ran by the feds
@user-xl5kd6il6c Жыл бұрын
A VPN is another person's PC, there's nothing particularly special about it When a cop see's an IP from a VPN, they can ask the VPN provider for info When they see a Tor IP, they cry and run to their mom, because there's no way they will directly identify you or your traffic
@user-xl5kd6il6c Жыл бұрын
@@nottifps All your Tor traffic would pass from the VPN first, but there isn't a relevant difference from all Tor traffic passing from your ISP either Do you trust your ISP more than your VPN provider? If so, change your VPN, because it isn't doing anything for you
@temp5010 ай бұрын
@@user-xl5kd6il6c"they can ask the VPN provider for info" And that "info" would consist to things: source addr will be the IP your ISP gave you and the destination IP will be the IP of the circuit guard. I don't see the problem here with VPN to be honest.
@Verpal Жыл бұрын
IMO there is like one good use case for Tor plus VPN, basically to cross the GFW of China using VPN before using Tor in your destination, using VPN to cross GFW can trigger less alarm than Tor, depends on how you set it up.
@andre_santos21817 ай бұрын
Here is Brazil the dictatorship is slowing growing over a disguise of democracy, and the govenrment is cracking each time more on opposition. So, We need to study all these options
@ATomRileyAАй бұрын
Meshtastic, Skycoins Skywire meshnet look these up.
@d0nj032 күн бұрын
Only right wing extremist snowflakes keep complaining about Lula after their openly fascist former president lost the election.
@crazycrazy7710 Жыл бұрын
This video proves that not all voices deserved to be taken seriously
@gilgabro420 Жыл бұрын
Well it might make sense to create your private VPN in a country that has good privacy regulations and connect that way. You can make yourself sure that the data gets deleted that it can't be tracked back to you.
@realcartoongirl Жыл бұрын
the vps gonna expose you
@lydellackerman800 Жыл бұрын
the issue is that you are the ONLY person routing traffic through it, so they theoretically have an infinite amount of time to slowly figure out who you are by habits, a public (paid / no log) VPN is much safer as its much harder to distinguish who is who
@Noneofyourbusiness2000 Жыл бұрын
You haven't convinced me. How are they going to realize you are using a VPN with Tor any easier than they could figure out your IP address while using Tor without a VPN?
@ToeTV247 Жыл бұрын
Did you even watch the video?
@Noneofyourbusiness2000 Жыл бұрын
@@ToeTV247 give me a timestamp.
@garretrocha8 Жыл бұрын
bro watched 1 minute of the video and says you haven't convinced me
@vincenthills5024 Жыл бұрын
@@ToeTV247if you think the answer is mentioned in the video why don't you actually cite it because it was not mentioned
@btuh-g7x Жыл бұрын
@@vincenthills5024im 5 minutes in and i already got an answer. VPNs and tor bridges offer the exact same service except tor bridges are free and not run by a company approved by the government.
@doyoufeelathomehere Жыл бұрын
The only thing I gathered from this video is that's a sick hoodie
@WcaVR Жыл бұрын
hi! So i'm just replying on the section you mentioned only 2 reasons to hide tor from the isp & i wanted to include the whole of Australia as a 3rd. We have meta data collection laws here. it stores for a minimum of 2 years. I think you shouldn't lose your privacy, even if you're doing nothing wrong. Using Tor may leave an Australian like a privacy break spotlight on is now on you with the metadata collection. knowing this law exists is like having someone stand behind you at a public place and read your screen. anywayz, thought i'd throw that out to ya:) okay byeeee :)
@Truth_above_everything3 ай бұрын
Thank you. Very understandable and informative. Im quite new to this space
@robihr Жыл бұрын
eldo kim example is why tor may not be enough. he emailed bomb threat to harvard uni to avoid taking exam and when FBI checked logs from harvard network they found that only he was using tor at that time. certainly it is edge case, but it shows that there are use cases where vpn is desirable with tor.
@BrutusBerserk Жыл бұрын
Exciting topic - will watch after my shift!
@nupersu6307 Жыл бұрын
I used to use tor with vpn in Russia since finding a bridge which isn't blocked was very hard. So there is some use for vpns with tor
@KrzysiuNet3 ай бұрын
I saw this video and when that dude told about VPN, I jumped right to the comments to comment on the absurd of it. But people in the comments already recognized that adding an attack vector isn't making things more secure. I'm very glad you made video about it, because VPN brainwashing needs to be stopped.
@temp5010 ай бұрын
6:45: Long story short: Connect to VPN, connect to TOR. If you've been tricked to click on a link which would navigate you to a clearweb IP, the destination server will still not be able to identify your real IP address because of the VPN. You are welcome.
@garychap8384Ай бұрын
Okay, now you're in China... ... your threat model has changed, and now you need some nuance. TOR nodes are known and may get you tortured... TOR 'Helper Addresses' are harvested... if one turns up in your traffic logs... again, you could conceivably be tortured. VPN services are actively blacklisted... repeated attempts to find/use them can get you a visit from men with heavy boots... and, again, torture isn't off the table. Short story suddenly got long, eh? I'm guessing you live in a western country and security seems so easy. It's all about endpoint concealment and content privacy, yes? After all... there's _"due process protections"_ and the right to a _"fair trial"_ ... maybe you have the _"fifth amendment"_ and so, you're here to tell everyone just how simple it all is ... ... well, good for you : ) Sadly, some peoples lives depend on getting this stuff right. Their threat model doesn't include 'due process' and so making blanket statements about your _'just kinda good enough'_ OpSec merely pollutes the information space and can put people at risk. Y'see, not everyone is just trying to download the latest movies or searching for questionable porn. Some live in a country where just being found to have accessed a privacy service can get your whole family pulled in for questioning. Want to try the long story? Y'know... the one that actually holds up : )
@Wolfrich666 Жыл бұрын
Nord VPN might as well be a honeypot by what ive heard, it would be like sending a private message to your FBI agent so it checks on you while on tor XD
@apIthletIcc Жыл бұрын
Chuck made a video recently suggesting email users put a '+' character in their email address, but only lists the pro's of doing so and never mentions anything about the bad side if it. Please make a video about putting a plus symbol in email addresses. Needs to be done imo, since the biggest issue of doing that, is kinda a monumental fuck up if it goes wrong.
@internetrules8522 Жыл бұрын
What would the duck up be? It seems like a generally good practice as long as your fine with maybe some sites erroring, or some stuff still getting sent to your normal non plus email
@apIthletIcc Жыл бұрын
@@internetrules8522 Impersonation is alot easier for a bad actor to pull off if you use the plus symbol. It comes down to how certain servers internally would interpret the characters. There's alot more to it but thats the safest simple explanation I can offer.
@revelmonger Жыл бұрын
What would be the issues with that? I use it all the time with proton to filter my emails into folders.
@apIthletIcc Жыл бұрын
@@revelmonger I replied to this question above ^ ^ Better to err on the side of caution. My point really is simply the fact Chuck only states the pros and doesnt mention the cons, and thats not good imo.
@internetrules8522 Жыл бұрын
for some reason you first reply to me was hidden so i had to find it by sorting comments in the newest first method. but ok ya if we assume the server treats plus like a dot or something, then there might be some potential attacks you could do to like reset password or some other things. any reccomended further reading or watching like a defcon or something? @@apIthletIcc
@The_Privateer2 ай бұрын
"sticking out like a sore thumb" and "looking suspicious" is not illegal. In a country that follows a rule of law, you can look as suspicious as you want and not be breaking any laws that are attributable to you. Like you said - the true problem is OPSEC of your personal data *outside* of VPN and TOR.
@adamwallace76389 ай бұрын
Sir im a 100percent using a VPN to shield myself from my ISP knowing im using Tor. I dont care about anyone else other than my ISP, they sent me letters for downloading movies on bittorrent, if theyre doing that, theyre monitoring everything and will give information that ive used Tor before, for whatever reason, to a govt agency or whoever. So if I stop that from being a possibility, i dont care how unsafe it is while im on Tor. ISP is the only person i care about
@lorirn64935 күн бұрын
@MentalOutlaw, thanks! Just subscribed. I’m just beginning the Tor journey. I’m a 49 year old female, and even I know VPNs are a Fed operation. Sure, that’s not always been the case. To the remaining doubters, I highly suggest you familiarize yourself with the Telegram takedown. BTW, I would be grateful to you or your community for the best YT video on how to get started. I have plans to set up my own Tor server (and operate a BTC node). I don’t have a clue what I am doing & want to educate myself before Cyber Monday sales.
@d0nj032 күн бұрын
Except half of this comments section thinks TOR is also a fed operation. 🤣
@austiniscoolduh Жыл бұрын
Thank you Printer_Pam for shoving this tip down our throats on the DNM subreddit back in the day. You were my favorite Fed! (iykyk...)
@ichi1082 Жыл бұрын
You're not my real dad, don't tell me what to do!
@Kappasan69 Жыл бұрын
Are ya winning son?
@sdgc543df Жыл бұрын
Who can be 100% sure who their Dad is? 😮
@AakashKumar-tn6yh Жыл бұрын
@@Kappasan69Lana Rhoades🤣🤣🤣🤣🤣
@dimalmfao Жыл бұрын
hell nah, lana roads
@Kappasan69 Жыл бұрын
@@sdgc543df If you go back in time and fuck your mum, you can be 100% sure that you will be your own dad.
@nicksjacku9750 Жыл бұрын
Some say Chuck glows very brightly
@EvilSantaTheTrue Жыл бұрын
I saw him in an agent suit just this morning
@EvilSantaTheTrue Жыл бұрын
Don't forget if you're in a dark room with him he has a glowing outline
@4bSix86f61Ай бұрын
VPN + TOR to watch a rickroll video, x10000, when they feds decrypt, they get rickrolled.
@AutoNoOne1125 күн бұрын
Wow, I must actually be learning in my networking class, as I was able to follow along with most of the terminology in this video
@Sherry-jx9hs11 ай бұрын
Personally I like Chuck he makes good content. To your question about why he would recommend you use a VPN I think is because usually on YT if you push a certain thing made by a certain company you get a little kickback. So if your channel had 500 thousand subscribers and say 1% of them bought the VPN and the kickback was $1.00 that would be $5000 dollars. THAT is why people plug company products. Thanks for the work you do. Now I have to subscribe to another channel :)
@daLiraX Жыл бұрын
One should say, VPN usage in China is generally ONLY allowed under very strict regulations, company allowances usually (since that's where it's mostly used at the end of the day), besides state workers. BUT the actual tech trying to combat the GFW out there is actually amazing, new protocols (or old ones newly used like SSH) header encryption, obfusciation, multi tunneling, etc, etc. At the end of the day, it's what you trust more... but if you're not stupid about it, and mostly watch your opsec... it's usually too much of a hassle for anyone. If you're paranoid, multitunneling is not a bad concept as of today, and you kinda get the idea which companies give you access to do it with another VPN service and which do not (or per se don't even allow it). So for the average paranoid, something like Mullvad to Cryptostorm, with token payments, is pretty high up there. Message in general should be: Stop using bad connections and services.
@jonaharagon Жыл бұрын
I'll have to respectfully disagree with the argument you make in this video. I think you overlook some realistic scenarios where you'd want to hide your Tor usage from a local network administrator which aren't government-related, and you repeat some common misconceptions about this topic which don't really hold up under scrutiny. I know KZbin doesn't like links in comments, but I posted a complete (long) response to the points you've made in this video on the Privacy Guides forum under the post titled "Clarify Tor's weaknesses with respect to observability" if you or anyone are interested.
@ABRetroCollections Жыл бұрын
The informed recommendation is not to use TOR at all. There are too many law enforcement controlled endpoints which sacrifice your anonymity. Freenet is the better alternative and allows for stricter network connectivity between yourself and trusted nodes. FYI: VPN has no relevance on the L2 Data layer anymore as most VPN solutions use IPSec now, which lives in the L3 layer with L4 for SSL. L2TP VPN's should be avoided at this point.
@eustab.anas-mann95109 ай бұрын
Hush.
@beaksters4 ай бұрын
Nah I make sure to comment on every video I like since i’m almost positive it’s the most important thing the algorithm uses for pushing.
@the_true_hier_to_the_sharingan10 ай бұрын
Man, this is what I was looking for. The video should have another title as well - "How to hide from your ISP that you are connecting to TOR?"
@myria2834 Жыл бұрын
VPN to tor is primarily to stop your ISP from throttling your network speed, as many do. Many ISPs just assume everyone on tor are criminals.
@cartossin8 ай бұрын
Glad someone said it. I really hate the thoughtless "Just add more layers" approach to security.
@mattjax16 Жыл бұрын
Network chuck was sponsored by Nord VPN smh
@P4P1Kpl10 ай бұрын
The main issue here is not FBI/CIA investigation but security. I don't care if FBI/CIA will be suspicious. I just want to connect to TOR in the safiest method. That is why the internet users are looking information do they need VPN, proxy, wirtual machine, usb system or even but additional laptop ONLY for TOR connections.
@bow-89 Жыл бұрын
Fun Fact: If you aren't the head of a big criminal conspiracy or admit to some horrible shit, your only worry is a bored employee tha somewhat enjoys his job at Interpol.
@leapbtw Жыл бұрын
hey MO, can you please add shipping to Europe on based win? Thank you for your content ❤️
@Ed.07 Жыл бұрын
Good afternoon, officer.
@cancer5895 Жыл бұрын
Okay fed.
@cancer5895 Жыл бұрын
Dumb brazilian
@qlippoth13 Жыл бұрын
Oh noes, are you inferring that he's a owingglay edfay?
@warnertesla8297 Жыл бұрын
@@cancer5895sup fed
@papahlamidas10 ай бұрын
I can totally agree that it seems like a money grab from his part at the same time it is an advertisement for tor which is a win win if you ask me. The sad part is how anonymity is connected to illegal activity.
@prague5419 Жыл бұрын
A serious caveat to the statement "don't use a VPN with TOR", if you're going to download torrents you MUST USE the VPN with TOR. Tor will not protect you once the torrents start transferring.
@kevinair766911 ай бұрын
Continue to use VPN, as this moment , 10% of exit relays, if not more, are in the hand of a state government.