Oh errrr. I think there's a known problem with using clearnet services over tor since the exit node, if malicious, can serve you it's own website instead of chipmixer's which might have happened in this case. I'm not sure exactly how that works though.
You really should update tor too... But the v2 service is still accessible and probably archived in many places if you need to cross reference it.
I used VPN after torus. In particular from Hotspot Shield. Especially in order for malicious weekends to do anything ... At least I once studied that it is so safe (but the output torch is unsafe). I do not remember that I have broken the connection.
In short, I generally confused and I'm afraid to visit anything, where there are private data on the web page ...
Let's like this - I have a browser tor, I will renew it and it is the latest version.
If I want them to visit the clearing site - how can I do it safely? With the main output tor (there is 10% of the weekend infected nodes, how I heard) or after the main output tor + VPN?
Sorry, not in the topic .. But I lost money. And as in just mind, go to your mixer and on any online wallets - the same coinb.in - already without a concept ...
In short, I apparently I wrote such a porridge that no one would understand me ... Google Transley is extremely poorly translating technical terms (