If You Use VPN over TOR, Can your VPN see your traffic and its content

So I’m pretty new to TOR, still researching and learning a lot of the basics, and I have 3 questions.

  1. If you connect to Tor first, and then connect to VPN, can your VPN see what you do, what you search and what websites you visit etc. over TOR and can they see your real IP?

  2. Does this method have any difference from simply using the VPN with a normal browser?

  3. Can the websites you visit see your VPN’s IP with this method?

Can you help please? Thank you.

If you tunnel VPN through Tor VPN can see what websites you are browsing but it doesn’t see your IP address, but if you paid for the VPN it still knows who you are.

If you tunnel Tor over VPN, VPN knows your IP address and that you are using Tor but it doesn’t know what websites you are browsing.

VPN could see what you search if you’re using HTTP, not HTTPS.

If you’re using HTTPS, VPN will see only what sites (IP addresses) you’re going to, not any contents such as search terms or pages that come back.

I think in the configuration of VPN over Tor, VPN will not see your real IP address.

So if I connect to VPN first, then get on TOR, then my VPN I’m using tor but can’t see my traffic. (Sorry if that’s literally what you just said. I’m a retard.)
I’ve heard people say that it’s pointless to use a VPN with tor. But I’ve heard other people say that tor can glitch sometimes to leave users exposed, so I want to add another layer of security instead of putting all my eggs in the tor basket. Now, using a vpn in the manner I described, does that protect entry nodes?

Correct me if I’m wrong. But I think Tor uses HTTPS by default right? I did not change the proxy settings so I must be using HTTPS. And does the website you visit being HTTP have anything to do with this? Can VPN see your content on an HTTP website?

You seem like a knowledgeable person who cared to type a reply so I want to elaborate a little bit on my question. So the thing is, I live under a dictatorship and anything related to criticizing the government equals instant jail here. Also, only government-controlled VPNs are allowed so I’m %99 sure they spy on citizens. I need to turn my VPN on and off for my job. So I use Tor to browse anti-government/dissident/opposition-related news sites and such. While browsing with Tor a few days back, I accidentally turned my VPN on with the hotkey during the session, only realizing it was on after the session, and I visited some dissident websites. So now I’m scared that spec-ops will come knocking down my door. Do you think that can happen? Can the VPN see that much despite connecting to those sites with Tor?

But I think Tor uses HTTPS by default right?

Yes, I think that is right.

Can VPN see your content on an HTTP website?

Yes, with a normal browser and VPN to an HTTP web site, any step at VPN server or after it (VPN, VPN’s ISP, site’s ISP) can see traffic contents.

No, Tor uses encryption independently of the website but if website uses http malicious Tor exit node can spy on the connection and get your username and password the same us true of malicious VPN.

From my understanding the websites decide if they choose http or https. You should get the Tor browser extension “https everywhere” in order to force sites that have https to give you only https and if the site doesn’t have a https version it’ll warn you and you shouldn’t go on it with Tor.

You say “Tor”, but I’m unclear whether you mean “Tor browser” or “Tor gateway that sends all traffic to onion network”.

While browsing with Tor a few days back, I accidentally turned my VPN on with the hotkey during the session

This sounds like Tor Browser over VPN, in which case all your VPN can see is that you were doing Tor traffic. The VPN wouldn’t see destination IP addresses or traffic contents.

VPN only sees encrypted connection to the first node in the Tor circuit, it doesn’t see any subsequent nodes and it doesn’t see websites that you are browsing through Tor.

I live under a dictatorship and anything related to criticizing the government equals instant jail here

Given that threat model, I think you should re-evaluate where you are focusing your attention. Remember that the biggest security risks are OpSec – ie, things you yourself mistakenly do that leak your information.

I would strongly suggest that you use a secure operating system for anything you want to keep private.

If you are not super IT-savvy, I suggest /r/Tails because it is the easiest to use. Just plug it in and boot it up.

If you are familiar with Linux and Virtual Machines you could check /r/Whonix (and Whonix on /r/qubes) but they are more complex to set up, have more “moving parts”, and therefore more opportunities for error.

I would suggest you not use a VPN at all. Any VPN you pay for is likely being watched by your government and its customer list can be checked. Any VPN you do not pay for is almost certainly already selling your information.

Instead of mucking about with VPNs, use Tor Bridges – they are explicitly designed to be used by people under oppressive governments who might attack Tor users. When you boot up Tails, pick the option to use a bridge.

You don’t need a fancy understanding of networking. You need a secure-by-default, simple-to-use OS that will protect all your online activities and is resistant to forensic analysis if (heaven forbid) you do get a visit from unfriendly State agents.

So does that mean VPN cannot see the contents on an HTTP website if I connect to it with Tor browser?

that’s backwards. he described vpn over tor

True, if you do Tor Browser over VPN, all the VPN sees is encrypted Tor traffic from your machine through the VPN server to an onion entrance node. The VPN has no knowledge of the contents or the final destination IP address.

Now, when the HTTP traffic comes out of the final onion exit node, at that point it will be HTTP. So the exit node, the ISP of the exit node, the ISP of the destination web site, all can see the traffic content. They won’t know your IP address.

I use Tor to browse anti-government/dissident/opposition-related news sites and such. While browsing with Tor a few days back, I accidentally turned my VPN on

That’s Tor Browser over VPN.

I thought Tor over VPN meant launching VPN first and then Tor. But if my case also counts as Tor over VPN (turning VPN on while Tor is already on) then it means I am most likely safe. Is that right?

"How does Tor or Onion over VPN work?

Onion over VPN combines the encryption of the VPN between your device and the server. Plus, it adds several Tor relays between the VPN server and the final network destination. It greatly extends the intermediaries in between the server you’re contacting and your device:

You connect to a VPN server, which encrypts your connection and hides your real IP address."

I thought Tor over VPN meant launching VPN first and then Tor.

Correct, Tor Browser over VPN means launching VPN first and then Tor Browser.

turning VPN on while Tor is already on

I am not sure what happens in this case. If Tor Browser is keeping an existing TCP session / Tor circuit alive, that traffic may not go through the VPN.

[Downvoted why ? If I’m wrong, have the courtesy to respond and tell me why.]

It means that you connection first goes to the VPN server and than to the Tor network, but the opposite is also possible to achieve burnit us difficult.