How Do I Make My Network OpSec Inpenetrable? : OpSec | Torhoo darknet markets
I want to make it to where my ISP doesn't know I use Tor, and I want to have extra hops after Tor. If I add a VPS after Tor can I still use it to access the darknet? No right? I want a windows VPS for when I do clearnet activities especially now that Tor doesn't obscure OS & other info in http headers, but I don't think I should use a Windows VPS after Tor for accessing the dark web. Is the following a good idea?:
VPN #1 --> VPN #2 --> SSH over Tor with snowflake bridge --> windows VPS --> VPN #3 --> clearnet websites
Is this overkill? Is there a version of this I can use for .onion sites as well? Do the VPNs before Tor compromise my security or is that bullshit?
You could have a low latency connection instead, where your clients internet connection is from a network that is not related to you (random free WiFi from a dinner or coffee shop) and a single fast VPN to your Windows machine (<50ms). However, this can expose you in cameras during and shortly after your sessions.
From your Windows machine you can very well have a separate Tor with a residential proxy as your internet breakout. The latency here is less significant.
So, from your client you have:
RD-client -> VPN #1 -> VPN #2 -> SSH -> Tor -> RD-server (Windows)
The communication from your Windows Remote Desktop is independent and not a part of the above "proxy chain":
RD-server (Windows) -> Residential proxy -> Tor
The two "proxy chains" work independent of each other which gives you one extra layer of isolation.
The draw back is the first "proxy chain" which will have long latency. However the latency on the second "proxy chain" is independent of the first and most likely faster, and should therefore not affect the overall performance.