

Sure, using a VPN alone will not somehow guard you from getting caught. The sub literally acts like using a VPN will get you caught somehow.

Hell, some VPN services (like ProtonVPN) have servers of their own that route all of your internet traffic through the TOR network.Įnough with the VPN demonization. And with a VPN you have the choice between hundreds of servers around the world, each with their own unique IP address that you can change at will (so your one IP claim is complete rubbish). You can sign up for a VPN with a throwaway email address, a fake name, and pay for it in crypto currency. Now that I do, I have not seen such a letter since in over a decade. I've gotten more than one "cease and desist" for simple P2P sharing because I wasn't hiding my activity with a VPN. You can guarantee they are logging your activity (and they do). Note: If you do this for fun or to give the NSA and the like a hard time you probably don't have to worry Ubuntu with Tor Browser is good enough.Your ISP is also a much, much larger private company which gives you ONE IP address linked to your legal name, physical address, and billing details. If this is your threat you wouldn't be able to beat this if you are asking for help on reddit. A VPN or meek bridge hides the connection to Tor with something innocent, but still exposes Tor usage on close examination. You must realize that tor sends packets of the same size to avoid fingerprinting of the traffic, but this is unique to Tor. You live in a country where Tor is dangerous to use. This would take steps to make sure Tor and the Tor Browser are not the weak link. In this case a dedicated laptop running Qubes OS(built from source to limit backdoor options) and VPN(s) protecting Whonix on Qubes. You live in a country with protections against self incrimination. The threat here comes from the weaknesses in Tor and Tor Browser not your setup(unless there are backdoors)

This gives you total plausible deniability. If you need persistence use the built in encryption tools to upload encrypted files to the cloud. If this is the case Tails or Subgraph live with no persistence is ideal. Your government can force you to incriminate yourself and turn over passwords and steal your laptop.
