Hi. Usage of Tor in my area is not recommended, e.g. I know some cases when random Tor users had problems because they were connected to Tor entry node which other people used as exit node for bad activities. So, we really need to hide Tor from ISP. I read the wiki and found out that there’re two ways to try to hide Tor from ISP: obfs4 bridges and private VPN on your own VPS. I use approach
My ISP > VPN > Tor obfs4 bridge > Tor middle node > Tor exit node
Why that way? I’d like my ISP to know only that I’m using VPN and my VPN ISP not to find out I’m using Tor. Why that? Because even obfs4 bridges are not public, they can be easily fetched through bridges torproject page so I guess in my area ISPs know about all IPs associated with Tor.
But I’m afraid is it possible to make time correlation because of ping time enlarge? I wrote about risks in wiki but I didn’t understand about time correlation fingerprinting. Does usage of that approach make user unique for destination website? I need the explanation. Thank you.