I know torrenting over Tor is bad, because it steals bandwidth from those who really need it. But if I had qBittorrent (binded to Mullvad) running in the background and then started running Tor Browser, would that negatively affect the network?
I know torrenting over Tor is bad, because it steals bandwidth from those who really need it. But if I had qBittorrent (binded to Mullvad) running in the background and then started running Tor Browser, would that negatively affect the network?
For more reading https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN
You can route Tor through VPN/SSH services. That might prevent your ISP etc from seeing that you’re using Tor (VPN/SSH Fingerprinting below). On one hand, VPNs are more popular than Tor, so you won’t stand out as much, on the other hand, in some countries replacing an encrypted Tor connection with an encrypted VPN or SSH connection, will be suspicious as well. SSH tunnels are not so popular.
Once the VPN client has connected, the VPN tunnel will be the machine’s default Internet connection, and TBB (Tor Browser Bundle) (or Tor client) will route through it. This can be a fine idea, assuming your VPN/SSH provider’s network is in fact sufficiently safer than your own network.
Another advantage here is that it prevents Tor from seeing who you are behind the VPN/SSH. So if somebody does manage to break Tor and learn the IP address your traffic is coming from, but your VPN/SSH was actually following through on their promises (they won’t watch, they won’t remember, and they will somehow magically make it so nobody else is watching either), then you’ll be better off.