Quote from: zetterberg99 on May 17, 2013, 10:58 pmastor, I've read many of your posts around these forums and they've been a great help. Thanks for taking the time to reply to me and for all your work in this community. Its a pleasure to meet you ;DAs a short term solution, I've set up a thumb drive and it seems to be working properly. Great! In regards to the VPN, I'm rather interested in the theory of being totally anonymous online. I've used a VPN (virtual private network, I believe?) for work before, but that was for accessing secure databases. How does this help to mask tor use? I'm off to do some research on the subject but any suggestions would be much appreciated.Thanks again!zetterberg99I'm no astor, but here's my view of VPN's.Right now, let's assume you connect to Tor. Now, your ISP tracks all of your connections to the internet and although you are encrypted through Tor, they at least know you are using Tor which in some places can be bad in itself. Anyway.When you use a VPN however, you instead are connected through the VPN to tor. So it goes from your computer, to the VPN, to the Tor network and of course is networked back in reverse. The advantage this offers is that the VPN forms a secure tunnel between your computer and their server so the ISP can only see the connection to the VPN and no matter what you browse, they still only see a VPN connection as opposed to seeing you connect to Google, Youtube, Tor etc. Now, providing the VPN does not keep logs, this also means they themselves cannot tell LEA exactly which content you accessed using the VPN so therefore is another layer of protection which privacy invading organisations would have to unwrap.I like to tell myself that the VPN simply creates a tunnel so your ISP can't tell what your connected to and the connection comes out in a different jurisdiction to your homeland. It's all about making life extraordinarily difficult for would-be investigators.