
There are firewall rules to prevent leaks. It then connects through a different VPN service, or through the Tor network, to reach Internet sites. Each Linux workspace VM initially reaches the Internet through the host machine’s VPN service. The host runs VirtualBox, and there are multiple Linux workspace VMs to compartmentalize and isolate activity.

In this setup, the host machine reaches the Internet through a VPN service, with firewall rules to prevent leaks. For them, using the full setup (covered in Parts 3-8) would be prudent. However, it is not adequate for political dissidents who might suffer serious consequences if compromised. It may be adequate for political dissidents in countries that respect human rights. It’s appropriate for reliably circumventing Internet censorship and data retention by ISPs, and for reliably circumventing commercial tracking and behavioral marketing. This guide covers a basic setup to protect online privacy and anonymity.

Back to Privacy Guides Advanced Privacy and Anonymity Using VMs, VPN’s, Tor – Part 2īasic Setup Using VMs, VPNs and Tor Introduction
