So we should all use a VPN if for nothing else a bit of privacy but...............
Even though we have VPN services that claim to keep no logs and use shared ip's I don't fully trust them. I am looking for a bit of extra security just in case a certain VPN company is infiltrated or otherwise compromised/ cooperating with big brother. So I figured layering VPN's may be an option.
I don't want TOR to leak my vpn ip through an exploit or weakness and then that vpn be forthcoming with my real ip.
Can anyone point me to some sort of layering concept outside of TOR? Still the softest point of failure will be the first VPN I connect to no matter what I do but if I were to layer vpns then it's likely that anyone looking would run into an uncooperative vpn service before they reach the ip of the "original" VPN.
I hope this makes sense. Basically I would like to build my own small onion outside or TOR, and then connect to TOR.
I have read some literature where this has been somewhat successful using Whonix-Gateway and Whonix-Workstation on a host machine but alas I'm not super computer fancy or smarts. I can however pay someone to set this configuration up for me and have it double checked by someone else.
I'm assuming there's no "simple" answer for this but the simpler the better.
Aside from using VPN->TOR (since you can't use a vpn with TAILS) is there another layer I could add between me and my real ip?
You don't have to pay for TOR, so there is no track back to you. Its like a bunch of free VPNs chained together.
If you use two commercial VPNs first, at least one, statistically, will be cooperating with the government.