Tor and VPNs are complementary privacy solutions, so they can work together to enhance your security and anonymity even more.

There are two methods for merging Tor with VPN:

VPN over Tor: connect to the Tor browser, then activate your VPN. This is a more complex method as it requires some manual configuration. As your VPN’s server acts as the final exit node, Tor’s own exit nodes will not be able to peel back the final layer of encryption to reveal your activity. While your ISP can tell that you’re using Tor, it would be able to trace your activity and keeps your IP address hidden from your VPN service.

Tor over VPN: Connect to your VPN, then open your Tor browser. Your VPN will encrypt all of your traffic before it enters the Tor network, and also hides your IP address. It also hides the fact you’re using Tor from your ISP. However, if your VPN provider chooses to keep logs, it can see that you’re using Tor. This is why it’s best that you use a decentralised VPN, which cannot keep user logs.

Both Mysterium and Tor can be pieced together to ensure full privacy coverage. One of Mysterium’s most considered features is to extend our whitelisting in such a way so that your traffic would only exit via a Mysterium node’s IP, while the rest of the traffic would be forwarded throughout the Tor network. In this way, Mysterium users will get to un-geoblock content, and our node runners will not risk unwanted content going through their node.