I can’t set ProtonVPN on Tails


#1

I use Tails OS and I wanna set vpn configuration I got for free from ProtonVPN to see if I can use proton VPN on the Tor browser.

I followed all the instruction (https://protonvpn.com/support/linux-vpn-setup/)on my terminal but it says “ restart pause ,40 seconds “ and stopped

Please help!!


#2

TAILS routes traffic through TOR, as does the TOR browser, to then route that through a VPN is counterproductive and will weaken privacy not increase it.

TOR, to grossly oversimplify things, is behaving as the VPN in this case.


#3

Hi :slight_smile:
I want to access VPN then after Tor ( Tor over VPN) . What I was trying is Tor over VPN or VPN over Tor???

I just want to hide that I am using Tor from my ISP :frowning:


#4

Not to say that people here won’t be able to help you, but you are asking about ProtonVPN (not a Purism product) on TailsOS (not a Purism product). You may find better answers in separate communities more focused on those products.


#5

Try NordVPN, they offer an option to use TOR thru their VPN as part of the standard offering.
I’ve been using it for 2 years, works great!
Its cheap if you buy the 3 year deal.
Dave


#6

Hi
Oh! so not all Vpn can be used for Tor? I just used free Proton VPN , maybe that’s why I couldn’t use it. Maybe only paid one can be used for Tor ??? :frowning:


#7

Hi, I tried many free versions and then stayed with privateinternetaccess.com for about 3 years.
I left them because of too many unresolved tech issues such as instability of secure connections.
NordVPN protects your first jump any where they offer their TOR service. Invaluable…
And, no, I don’t own any stock.

Dave


#8

Hi, Back to your point of running TOR on ProtonVPN. I’ll try that in the morning and respond back with my results.
Dave


#9

Wow!! Thank you !! :slight_smile:


#10

Proton VPN can be a bit difficult in setting up in Linux. Sounds like what is going on is a timing thing. First of all, you are starting the ProtonVPN before you start the Tor Browser. You should make sure the ipv6 is turned off, or ProtonVPN will not work. Secondly, I had success when using the full version of ProtonVPN, When I tried to connect to the free ProtonVPN servers in Linux, I did not have much luck. WindScribe has a free version that apparently turns off the ipv6, and then it will log on. How much do you trust security service website that is completely free? then again, after I started Windscribe service, which turned off ipv6, then I could more easily start ProtonVPN. Then I found that Mint Linux had a big button which would allow me to turn off ipv6 without all that code in the terminal. I guess I should research if Tails automatically turns off ipv6? I guess I assumed it would.

One you can ask ProtonVPN. It would attract their attention more if you had a paying account. You might try to play with a version of Linux that has a lot of users to give help. Like Ubuntu, or its spinoff-Mint Linux. I do not consider either Ubuntu or Mint Linux to be secure. But it should be easier to get help on their forum.

Then there is this:

You might want to start your own personal recipe book of what not to do, and what to do. You might notice that the Qubes OS wants the user to use two different computers. Keeping in mind that using “End to End Encryption” is the goal. One writes and encrypts a message on one computer, that is not connected to the internet. Then uses the second computer to actually log in, and send the message.

There is a website that gives advice for journalists who need to keep sources secret and so on. It is rumored that a lot of Chinese Cyber-Dissidents are in jail. I guess they trusted bad techniques. Or the government is that good. I would think the US NSA, and its other western European counter-parts would be as good as the Chinese.

Trying to prevent your ISP from knowing where you are going on the internet. Hmm. Once a tech guy at the local ISP told me that it was impossible to stop them from knowing where I went on the internet. Not sure if that was because the computer adapter I was using was a Broadcom, or some other reason Tor has some explanation of using Bridges. In fact they made it easier for us to acquire Bridges.

Someone once suggested the only way to be sure an ISP can not connect their use of the connection is to be like hiding in a grove of trees behind a public business (not on a camera) that offers Public WiFi, and an wireless adapter that can not be traced to the individual either. I guess an adapter bought with cash a long way from their usual haunts, and wait a long time after purchase before using it.

I have this vision of a Chinese Cyber-Dissident laying in the back seat of a car with a blanket over him, with his car stalled in traffic outside a place with public WiFi. He logs in, transmits his package, and his driver goes on. Perhaps the cyber dissident would climb up on top of a building close by a WiFi connection he is using. I would probably be first arrested for public trespass (or whatever the Chinese call it.)

I guess I am a bit off the original question, but it seemed relevant. I have been concerned with these same topics, and felt what I had to say might seem relevant to the OP. Then again, OP and everyone here might know a lot more about these things than I do.

https://tails.boum.org/doc/first_steps/startup_options/mac_spoofing/