I don't use a VPN when using Tor, I use a Virtual Machine

Hey guys, when ever I use the Tor Browser (the darkweb) I don’t use a VPN with it.

Because I open the Tor Browser in a virtual machine using the Linux OS.

So if I download any malware, spyware or viruses then there will just stay on the Linux OS and it will not infect my main OS (Windows 10).

Then I can just uninstall Linux, then reinstall it again.

Smart ? Or dumb?

A virtual machine and virtual private network do completely unrelated things; using a VM “instead of” a VPN is gibberish.

If you’re inclined to use a VM to encapsulate Tor, I recommend you to check out Whonix. By the way, not mixing Tor and VPN is the recommended way to go: ¿Puedo usar una VPN con Tor? | Tor Project | Ayuda

A VPN wouldn’t protect against malware anyway, so it’s not like an alternative to what you’re doing. You probably don’t need a VPN, however.

In essence, using a VM is a great idea (as long as you only use it for Tor), but it has nothing to do with a VPN (which you shouldn’t be using with Tor).

You should use Whonix if you want a VM for using Tor. Linux by itself and the Tor Browser inside a VM is unlikely to stop malware from performing protocol leak attacks. This is exactly what Whonix was made for.

Just make sure your network settings on the VM are internal/private so that any potential malware can’t escape to your host machine (highly unlikely, especially with Linux but not impossible)

Everyone else is already pointing out that a VM does nothing related to what a VPN does (& that you shouldn’t normally use a VPN with Tor anyway) - so I won’t say more about that.

But - should you encapsulate Tor within a VM:

  1. If you’re using something like Whonix, then it can give you some privacy benefits, though you probably will only want to bother with this if you fully understand your threat model.
  2. Will it protect you against malware: absolutely not.

Yes, malware can break out of VMs, though this is hard enough to do, so there’s still lower risk. However the bigger risk is: what valuable stuff do you have on your machine that you want to keep safe from malware? On most people’s machines, the most valuable thing is their active browser session, so your VM isn’t going to help here.

Smart ? Or dumb? — Both

u should consider using Whonix or Tails instant of VM

vpn is a service you log on , to me a better way is to make a vm, configure ip and mac + resolution, and access tor through it. Granted im using my own isp , im in no means an internet geek ,this just sounds the most logical way to me

Hey guys.

Further updates, I was introduced to a new operating system called Tails.

Install the Tails O/S onto a spare USB pen drive that you have lying around.

Change the BIOS setting on your computer so that it now boots up into the Tails O/S on the USB

Then once in Tails you can use the Tor Browser to surf the darkweb.

Best of all Tails downloads all data to the RAM of your computer, so once the Computer is restarted all turned off, it means that if you have downloaded any Malware or Spyware, all of it will be wiped off and will not infect your main host O/S.

A VPN would protect any non-Tor traffic your system does (updaters, services, email-checking, etc).

a vpn is just an extra layer of protection for your location. It has nothing to do with protecting you from virus. You can use both.

Real hackers use onion.ly sites

you should know that there is malware that is capable of ‘escaping’ a virtual machine and infecting the host. However, windows OS are much more of a target than a linux OS.

This is written super sus.

Whonix

Recommend Whonix instead of Tails?

I have no idea what “Whonix” even is??

Oh? It’s another OS?

So using the VMware workstation vital machine would I be able to switch between “Whonix” and “Linux Ubuntu”?

Or a VM, if you just don’t download things

I thought that was the whole idea of a VM, that if I download any malware then it stays on the Linux OS, and it can’t cross over to infect the main host Windows 10 OS??