VPN or Tor are no perfect solutions covering you 100%, even combined
There are different levels of privacy (and non-anonymity if messing up service choices and acquisition steps) to achieve from using one or the other, or both and how they're arranged. In that order (worse to best)
6) VPN service with good practices, namely : no logs policy, can be purchased by creating an anonymous account (w/ a unique disposable / created for the purpose email, why not from Tutanota.com) behind a .onion address (i.e. ExpressVPN) and/or paid by cryptocurrencies (i.e. ProtonVPN, ExpressVPN, AirVPN)
5) VPN service with 6) requirements, plus an extra ability : double VPN server loop (2nd server acting as backup) to secure a disconnection of the 1st server revealing ISP (i.e. Advanced ProtonVPN paid plan, connecting to "Secure Core" servers)
4) Tor browser (offering to hide behind multi-level of nodes, hard to track for LE but not impossible) ...then it's recommended to use .onion version of sites, including for ProtonMail (the address can be found by loading the address dark.fail into the Tor browser), although it will load the site (very) more slowly
3) VPN + Tor ...stacked as "Tor over VPN".
Basically, you first connect to your VPN server (i.e. ProtonVPN, free or paid plans, +/- through a "Secure Core" one if you purchased the Advanced plan), then use the Tor browser to browse the internet, preferably loading .onion address versions of targeted sites (these onion addresses can be found usually on the frontpage of the normal URL site, a search engine research, or dark.fail loaded on Tor for DarkNet Markets + commonly anonymity/privacy oriented sites)
2) VPN + Tor ...configured as "VPN over Tor". This has a pre-requisite to use a
compatible VPN service which allows the protocol setup.
Case : the VPS service purchased permits the configuration but requires some involvement with the setup = some difficulty (i.e. AirVPN). Drawback of the specific tunneling : it does not allow to browse .onion sites using the Tor browser, only normal addresses, whether from Tor or regular browsers.
1) VPN + Tor ...configured as "VPN over Tor" (again). This has a pre-requisite to use a
compatible VPN service which allows the protocol setup (again).
Alternative case : The VPN service has implemented an arranged implementation behind the scenes to achieve a simplified ease of use (i.e. ProtonVPN paid plans), which will allow to navigate at .onion sites from regular browsers (advised privacy oriented ones are : Epic Browser or Brave) , not requiring to use the Tor browser. Minimal adaptation of the browser might be required to adapt loading .onion sites
ProtonVPN has a built in Tor VPN. How to connect through to the Tor network and access Onion sites with a single click. Read our simple step by step guide.
protonvpn.com
By the way, open to debate if there's disagreement on the order, especially the final rankings between 1 and 2 if an assumption error was made about the most secure config, or if you can provide precisions anywhere (for instance, haven't been a client of AirVPN since a long time. It could be complicated before, hence not optimal if fucking up the settings)
—————————
In general, for those who'd want to keep it simple, efficient and free, 3) would be the recommended way to go (then the VPN choice will be ProtonVPN free plan)
Those who are willing to pay and go the extra mile with more efforts (notably VPN purchase through cryptocurrencies instead of card or PayPal), up to solution 1)
———————
Sensibilisation articles
And which is the best way of implementing them together?
www.techradar.com
Tor and VPN are both tools for privacy and anonymity, but they work in very different ways. Here’s how to combine them for maximum security.
www.expressvpn.com
Tor is a powerful tool for browsing the Dark Web anonymously, but your ISP can still see your activity. By using a VPN you add an extra layer of privacy.
protonvpn.com