When the host computer uses a VPN and your VM uses Tor then the traffic intended for the Tor entry guard or bridge will be routed to the VPN entry node first and after reaching your VPN exit the traffic will then be routed to the Tor entry guard or bridge and then through the Tor network to the Tor exit node, unless you are accessing a Tor hidden service in which case to that service. You don't need to use a VM to use Tor with a VPN. I use both without one.Oh, you are right about that! I agree with everything you said. For some reason it took me too long to find where the misunderstanding was.
I tried it also (bare metal and daily driver), to devote my time to learning and using it. But, I decided to go back to Mint for all the reasons mentioned earlier. I didn't completely trust the VM configurations either. (Is it really using my VPN? what happens when I use TOR on my VM but my host machine is using a VPN over NAT, etc)
Some tools on Kali are extremely easy to use, meaning easy to commit some type of crime and potentially get in trouble by not knowing what I'm doing. So I decided I probably shouldn't use Kali as a daily driver or bare metal in any capacity. VM, like you, definitely. Live USB, sure, it's handy and makes allot of sense for me, and beyond that I think it makes good sense from a OPSEC standpoint for OFFSEC purposes. I still have a ton more to learn, and I always will have a ton to learn. There's no end. And because of that I think good opsec practices are important for everyone.
I tried to use an AI, but couldn't load the model because my computer only has 16 GiB of physical RAM. I had to set up some swap space and enable it just so the computer wouldn't crash when the memory ran out. Perhaps a smaller model will work for me.
Signed,
Matthew Campbell