It’s unspecific to the browser. That is true for any application expect these circumventing the VPN. What that means is already documented in the wiki, but…
…in that case you probably won’t be able to use any of this without unexpected, potentially unwanted results.
I had a misunderstanding about mullvad vpn. You are right.
I found a firefox extention called sandVPN and am using it in torbrowser in whonixWS.
When I check at https://check.torproject.org/ it says I’m not using tor and I can connect to sites that block tor’s IP. I think the path is User → Tor → VPN → Internet as intended.
When running a browser inside Whonix-Workstation, IP leaks, as in not using Tor such as only using a VPN (let alone only clearnet) is highly unlikely. As per:
then the tor step is usually pointless, if your VPN provider knows who you (which they almost certainly do) are then you just eliminated the privacy that tor gave you (same goes for signing into any service which knows who you are or that you signed into while identifiable)
VPN → Tor
is also pretty pointless unless you’re trying to disguise the fact that you’re connecting to Tor. Not in the way that there are any particular cons to this approach but simply because it’s very unlikely that anyone capable of breaking through the anonymity of Tor isn’t also capable of breaking through the anonymity of your VPN