Hi all, I am a 1st year networking student
I have some questions regarding tor and vpns and how they work
I have also been interested in this stuff and learning all the time but dont know much about it
SO here is a scenerio, I want to stress it is purely fictional but its how I can understand it
Lets say your at home with windows 10 pc and brighthouse internet and you decide you want to do something illegal like buy drugs or firearms online
You fire up your vpn (nord, or something like that) then from there connect to tor browser, and continue to whatever you do
Lets say now that you have done your business and the website you went to is compromised and they know what you did and have your public IP add (provided by tor) and want to come after you
questions
1. Given vpn and tor how easy is it for someone like police and FBI or what ever to find your original IP?
2. DO they have to back track through tor and subpena logs to find you?
3. I know thats ANYTHING can be traced, but was wondering how easy that process is and can someone explain exactly how it works
Thank you
TDD
I have some questions regarding tor and vpns and how they work
I have also been interested in this stuff and learning all the time but dont know much about it
SO here is a scenerio, I want to stress it is purely fictional but its how I can understand it
Lets say your at home with windows 10 pc and brighthouse internet and you decide you want to do something illegal like buy drugs or firearms online
You fire up your vpn (nord, or something like that) then from there connect to tor browser, and continue to whatever you do
Lets say now that you have done your business and the website you went to is compromised and they know what you did and have your public IP add (provided by tor) and want to come after you
questions
1. Given vpn and tor how easy is it for someone like police and FBI or what ever to find your original IP?
2. DO they have to back track through tor and subpena logs to find you?
3. I know thats ANYTHING can be traced, but was wondering how easy that process is and can someone explain exactly how it works
Thank you
TDD