So we all know using a logless VPN is a good way to help protect ourselves if done correctly. However, I'd like a bit of clarification from somebody who is more knowledgeable on the subject than me. I know the current circuit looks like the following:Computer >>>>>>>>> VPN xxxxxxxxx TOR xxxxxxxxx VPN >>>>>>>> ComputerNow, >>>> is the tunnel formed between VPN and the computer with xxxx being VPN to Tor. Does the traffic coming from Tor become at any point, decrypted to the extent a hostile VPN could decrypt it or use it in any way against us, or is the connection as I currently believed encrypted right to the point of the end computer and in fact the xxxxx encryption to the Tor network passes inside the >>>>> tunnels in my diagram so the VPN provides encryption/protection on top of that already provided by Tor encryption?I'm sure that is how it works, but I guess safety is something not to second guess on.