Hey guys apologies if this should be posted on dnm-noobs, but I've read through everything I could so far on the topic of when it is recommended to use a certain configuration on tor.
My main goal at the moment is to hide the usage of tor from my ISP.
After reading through other peoples past posts regarding the matter on dnm-noobs and the information provided on the actual tor website, I believed that using meek-amazon/azure would be the most suitable configuration as it seems like that's exactly what it's there for (making it seem like I'm talking to an Amazon Web Services server when in reality I am actually talking to a Tor bridge).
But even after going through previous posts on dnm-noobs and the comments on the webpage that has information about meek and other pluggable transports, I'm not very certain of how safe using meek is or if it's actually any better than going the obfs4 route.
My current set up so far is VPN (paid; based outside of the U.S.) -> Tor (meek-amazon).
That's about it actually lol.
But from what I've read so far, using TAILS when you're identity is already tied to your IP address/wifi is pointless. In the past, I have ALWAYS gone to a public wifi spot (cafes, fast food places, book stores, libraries, etc.) But having thought about this and searching online for a while now, I can't seem to find a problem with my very simple set up.. Which is why I'm hoping to find some answers and get any corrections if need be. Additionally, having to always go out somewhere to access the dnm's is obviously very inconvenient and sometimes not an option esp. if it's very late at night/early morning when no one's around anywhere (I would also be the only person at a location at the time which would defeat the purpose of seeking out a public wifi spot). To top it off, it's not easy to find spots at a location such as a cafe or fast food joint when there's so many people or cameras right above/in front of you. Bottom line, ime it can be problematic to be able to find a spot where I can do what I need to and leave.
My logic:
-Paid VPN outside of U.S. jurisdiction that supposedly claims to not have logs + no reputation of having handed over any logs either. My ISP can not see what I am doing except the fact that I am connected to a VPN.
-Connect to Tor after re configuring the settings to meek-amazon to mask the fact that I am actually connecting to a tor bridge. My ISP still only sees the fact that I am using a VPN, while my VPN sees that I am currently connected to an Amazon server.
And all other posts I've read through so far is only helpful in saying to not use free vpns and go find a paid/reliable one that's outside of U.S. jurisdiction or known not to hand over any logs when subpoenaed (i.e. hidemyass). Some posts ended with looking up pluggable transports, but that's about it.
Thanks everyone! :)
Why would tails be pointless you want the popo to have easy access to your computer and all the info stored on it ?