Hello. I use the Qubes-Whonix. Because of the risk of getting on the compromised TOR node, I decided to build the following chain:
sys-net -> sys-firewall -> sys-vpn+tor -> sys vpn -> sys-whonix -> anon whonix
(User -> VPN -> TOR -> VPN -> TOR)
So I am insured against a compromised TOR node with help of another TOR. At the same time, I don’t break TOR browser isolation on the whonix-workstation and my fingerprint looks like a fingerprint of an ordinary TOR browser user.
How right am I in my reasoning? What do you think of my chain? Thanks.