Tunneling a VPN Within a VPN: Is It Possible?

  • Thread starter Thread starter Steven Ellet
  • Start date Start date
  • Tags Tags
    Tunneling
AI Thread Summary
It is possible to use a VPN within another VPN, often referred to as "nesting." This can be achieved by running a global VPN at the operating system level while simultaneously using a VPN application within a browser. Although this method can provide a layered approach to privacy, it does not significantly enhance security and may slow down internet browsing speeds. The concept is similar to how the Tor network operates, which routes data through multiple servers for anonymity. While chaining VPNs is a common practice, the discussion emphasizes that nesting them may not provide additional security benefits and raises questions about the necessity of such an approach. Some VPN services, like Windscribe, claim that this method can reduce the risk of correlation attacks, but many users may find the added complexity unnecessary.
Steven Ellet
Messages
85
Reaction score
3
TL;DR Summary
Layered VPN
Is it possible to put a vpn inside of another vpn, kind of like a tunnel in a tunnel? If so, how?
 
Technology news on Phys.org
Why?

In principle data is data, and you can encrypt it as many times as you'd like. However, it doesn't add security, and whether someone has written a stack to do this is uncertain.
 
You can use a global VPN working at the OS level in your PC, @Steven Ellet, then run a VPN app in your browser to achieve a layered VPN. I've occasionally done this inadvertently, and I doubt it increases my security much...but it does slow down my browsing!

There's no magic in the routing, you can set the two VPN end points differently and external parties will see two different IP addresses, depending on what they're able to see (browser traffic in LA, for example, non-browser traffic in NY, assuming those are the VPN end points you've set) it's just that the browser traffic will be forced to transit LA to reach NY, and thence to the service you are browsing.
 
You can certainly chain VPNs, but I don't think that is what the OP is asking about (hence my "Why?"). He is talking about nesting them. Now, maybe he meant chaining them, but until he says otherwise, we should probably assume he meant what he asked.
 
Vanadium 50 said:
You can certainly chain VPNs, but I don't think that is what the OP is asking about (hence my "Why?"). He is talking about nesting them. Now, maybe he meant chaining them, but until he says otherwise, we should probably assume he meant what he asked.
A VPN at the OS layer and a VPN in a browser is nested, @Vanadium 50.

The browser traffic - encrypted by the browser app VPN - is carried over the OS' underlying transport service, also encrypted. Maybe me picking two end points as an example suggests it is chained, but here's a visual of the nesting using Windscribe, both exiting at their LA Dogg site:

1658534646128.png


And within the browser, the VPN knows it is tunnelling with the 'double hop' notification:

1658534693576.png


Windscribe note that doing this "provides enhanced privacy and anonymity as it significantly reduces the chance of a correlation attack on one of our servers" but my tin foil hat is not that firmly attached that I bother with this double layer of security.
 
Dear Peeps I have posted a few questions about programing on this sectio of the PF forum. I want to ask you veterans how you folks learn program in assembly and about computer architecture for the x86 family. In addition to finish learning C, I am also reading the book From bits to Gates to C and Beyond. In the book, it uses the mini LC3 assembly language. I also have books on assembly programming and computer architecture. The few famous ones i have are Computer Organization and...
I have a quick questions. I am going through a book on C programming on my own. Afterwards, I plan to go through something call data structures and algorithms on my own also in C. I also need to learn C++, Matlab and for personal interest Haskell. For the two topic of data structures and algorithms, I understand there are standard ones across all programming languages. After learning it through C, what would be the biggest issue when trying to implement the same data...
Back
Top