If you’re inclined to use a VM to encapsulate Tor, I recommend you to check out Whonix. By the way, not mixing Tor and VPN is the recommended way to go: ¿Puedo usar una VPN con Tor? | Tor Project | Ayuda
In essence, using a VM is a great idea (as long as you only use it for Tor), but it has nothing to do with a VPN (which you shouldn’t be using with Tor).
You should use Whonix if you want a VM for using Tor. Linux by itself and the Tor Browser inside a VM is unlikely to stop malware from performing protocol leak attacks. This is exactly what Whonix was made for.
Just make sure your network settings on the VM are internal/private so that any potential malware can’t escape to your host machine (highly unlikely, especially with Linux but not impossible)
Everyone else is already pointing out that a VM does nothing related to what a VPN does (& that you shouldn’t normally use a VPN with Tor anyway) - so I won’t say more about that.
But - should you encapsulate Tor within a VM:
If you’re using something like Whonix, then it can give you some privacy benefits, though you probably will only want to bother with this if you fully understand your threat model.
Will it protect you against malware: absolutely not.
Yes, malware can break out of VMs, though this is hard enough to do, so there’s still lower risk. However the bigger risk is: what valuable stuff do you have on your machine that you want to keep safe from malware? On most people’s machines, the most valuable thing is their active browser session, so your VM isn’t going to help here.
vpn is a service you log on , to me a better way is to make a vm, configure ip and mac + resolution, and access tor through it. Granted im using my own isp , im in no means an internet geek ,this just sounds the most logical way to me
Further updates, I was introduced to a new operating system called Tails.
Install the Tails O/S onto a spare USB pen drive that you have lying around.
Change the BIOS setting on your computer so that it now boots up into the Tails O/S on the USB
Then once in Tails you can use the Tor Browser to surf the darkweb.
Best of all Tails downloads all data to the RAM of your computer, so once the Computer is restarted all turned off, it means that if you have downloaded any Malware or Spyware, all of it will be wiped off and will not infect your main host O/S.
you should know that there is malware that is capable of ‘escaping’ a virtual machine and infecting the host. However, windows OS are much more of a target than a linux OS.
I thought that was the whole idea of a VM, that if I download any malware then it stays on the Linux OS, and it can’t cross over to infect the main host Windows 10 OS??