virtual or physical VPN-Gateway.

I see… I understand what you’re saying. If your ISP is willing to share Tor usage with the NSA, why not Google? This is not easy.

Assumptions:

  1. You are known (or at least) pseudonymous to the destination website.
  2. You want to hide the fact that you are using Tor from the destination website.
  3. You want to maintain your privacy and only reveal details of your choosing to the destination website.

Some (light) brainstorming:

If you are known (not pseudonymous) to the destination (ie payment details, friends, etc) and you don’t mind your ISP snooping, then Tor provides no anonymity benefit, so you could connect over clearnet using Firefox + privacy addons. But you don’t want your browser to be tracked around the Net. So you need a separate browser or at least a separate browser profile.

If you are pseudonymous, then you still want to use Tor. But you’ll need a final non-Tor node before the destination to hide Tor usage. In order to stay pseudonymous, you must ensure that your pseudonym is completely independent from any other uses. Meaning separate IP address, and a browser fingerprint that never appears anywhere else. Separate proxy and browser profile used only for this pseudonym.

Browser can be spoofed, portable installations can be made. Don’t know how hard it is to detect a spoofed browser or artificial fingerprint… Very difficult to get that last proxy right.


If you are anonymous, then what we discussed in your other thread: vpn after whonix (inside workstation) Not work anymore with TBB