Although Tor is safe enough for the US government, security experts rightly point out that Tor, like any other platform or technology, has reservations. The two most striking are:
- The first Tor node gets its real IP address.
- The last or “Exit” node decrypts your data before passing it on to the final destination.
Therefore, some people who prefer extreme privacy or security choose to combine BOTH port and VPN service at the same time. In the Tor-over-VPN strategy, users first connect to their VPN provider and then to the Tor network. It’s often thought that this approach provides better security because nobody – except the VPN provider – knows your actual IP address or even connects to the Tor network (and remember that a good VPN Provider does not run user logs.)
With the VPN-over-gate approach, the setup is the other way around: users first connect to the Tor network and then to their VPN. This solution is often thought to offer better anonymity.
Decrypted data can lead to large losses. One notable example: In 2007, a Swedish computer security expert experimentally set up and used five Tor exit nodes in various locations around the world to intercept user names and passwords for e-mail accounts, private e-mail from those accounts, and moreThis researcher pointed out how easy it was to hack even the notoriously secure Tor network.
A small group of VPN providers can forward their data directly to the Tor network via their VPN servers as shown. Because these VPN servers use a different IP address than your PC, your Tor access node is prevented from knowing your IP address, which eliminates one of two security holes in Tor.
So I recommend combine BOTH Tor and VPN at the same time to protect your internet privacy and security.