Hello
I’ve seen many similar topics, but haven’t found exactly matching my case.
I have a rented VPS.
On the server I have a self-hosted proxy running with 3x-ui VLESS-Reality protocol (a few words about it at the bottom).
I connect to the proxy via Hiddify-Next on a host machine; it creates a tun adapter to connect.
Then I start Tor browser.
So it is
Home > VLESS-Reality Proxy > Tor > Internet
It is not a VPN, it’s still a proxy though secured one.
Questions:
1. Can the VPS provider see the pages visited through Tor?
2. What are the flaws of my method?
3. How do I manage to run Whonix, not Tor browser bundle, after this proxy?
Basically I want to connect to Tor without standing out too much.
Nowadays in my country significantly more VPN users than Tor users.
The bridges don’t work for some reason.
Regarding the issue of trust.
They say that when choosing whether to use a VPS/VPN before Tor or not, it is a matter of trust, who do you trust more, the ISP or the VPS hoster.
Why should I trust my ISP more than some random server in another country somewhere far away?
The ISP definitely keeps logs, while the same is not known about the VPS host.
And in the worst case, what can the VPS hoster do if they don’t like something about the user’s behavior? Complain to who? Shut down your server? Well that’s not a big problem.
At the same time, a government-controlled ISP is quite capable of turning you inside out for any reason. Simply because they are nearby and supported by state power.
About VLESS-Reality.
As far as I know this protocol was specifically designed to hide the fact you are using proxy from the ISP. It makes the traffic looks like a normal traffic to a real site. Yet it is still a proxy.