

The host machine reaches the Internet through a VPN service, with firewall rules to prevent leaks.

This advanced setup broadly resembles the basic setup presented in Part 2. Introduction and consider your threat model before choosing which aspects to implement.

The full setup will require at least a few days of focused work. It employs compartmentalization (aka compartmentation) and isolation, by using multiple virtual machines (VMs) with Internet access through arbitrarily complex nested and branched chains of VPNs and Tor. This guide introduces an advanced setup (implemented in Parts 4-8) which provides vastly greater privacy, anonymity and freedom than the basic setup presented in Part 2. Planning Advanced VM and VPN Setup Introduction Back to Privacy Guides Advanced Privacy and Anonymity Using VMs, VPN’s, Tor – Part 3
