Is it possible to route traffic through Tor, then Tor traffic through VPN on Linux and is it acceptable?

is it possible to route traffic through Tor, then Tor traffic through VPN on Linux and is it acceptable?

Yes, it is possible to route your traffic through Tor, then route your Tor traffic through a VPN on Linux. Here are a few quick steps to achieve this:

  1. Install Tor and a VPN client on your Linux machine.
  2. Configure your VPN client with the desired settings and connect to the server.
  3. Start Tor and ensure that it is working correctly.
  4. Use the “torify” command to route your applications and traffic through Tor. For example, to run Firefox over Tor, type “torify firefox” in the terminal.
  5. Once your traffic is going through Tor, you can then route it through your VPN. This can be done by configuring the VPN on a separate network interface and then routing the Tor traffic to that interface. You can do this with the “route” command in the terminal.

Note that routing your traffic through multiple layers of encryption like this can result in slower internet speeds and additional latency.

Ok. Great. So is this doable with things like TorGhost-NG or Anonsurf or should I just use Torify alone?

Tools like TorGhost-NG or Anonsurf can be useful for quickly and easily routing your traffic through Tor, but they may not provide the additional security and customization options that you can get by manually configuring your VPN and Tor settings. If you’re comfortable with the command line, you may find it easier to use Torify alone, as this will give you more control over your network configuration. However, if you’re new to Linux or just looking for a simple solution, tools like TorGhost-NG or Anonsurf may be a good choice. Just be aware that using multiple layers of encryption like this can result in slower internet speeds and may require additional configuration to work correctly.