mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
Fixed typos and broken link
This commit is contained in:
parent
6eb68f0270
commit
dcf265743e
38 changed files with 88 additions and 88 deletions
|
@ -64,8 +64,8 @@
|
|||
<h1>Using Tor Safely: Tor through VPN or VPN through Tor? </h1>
|
||||
|
||||
</br></br>
|
||||
<h2><b>Tor and VPNs comparaison Recap</b></h2>
|
||||
<p>As we went over this comparaison in the previous blogpost <a href="torvsvpn">here</a> i will briefly recap it here:</p>
|
||||
<h2><b>Tor and VPNs comparison Recap</b></h2>
|
||||
<p>As we went over this comparison in the previous blogpost <a href="torvsvpn">here</a> i will briefly recap it here:</p>
|
||||
<b>VPNS:</b>
|
||||
<p>VPNs can provide Privacy from your ISP <img src="../su0.png">, but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.<img src="../su2.png"></p>
|
||||
<p>In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity <img src="../ce2.png">to another</p>
|
||||
|
@ -167,7 +167,7 @@ You -> VPN -> Tor -> Destination
|
|||
|
||||
</pre></code>
|
||||
<p><u>WARNING:</u> in this setup you are trusting your VPN provider to not snitch to your ISP that you are using Tor!</p>
|
||||
<p>From your ISP's point of view, using Tor alone definitely stand out from regular traffic, a popular option you can go for is to use a VPN (as this is a much more common occurence), and to use the Tor browser while keeping the VPN connection open.</p>
|
||||
<p>From your ISP's point of view, using Tor alone definitely stand out from regular traffic, a popular option you can go for is to use a VPN (as this is a much more common occurrence), and to use the Tor browser while keeping the VPN connection open.</p>
|
||||
<p>In the unlikely event that you get deanonymized while using Tor, <b>only your VPN IP would get revealed instead of your home IP address</b>. And if the VPN provider has strict no-log policies and <a href="https://www.theverge.com/2023/4/21/23692580/mullvad-vpn-raid-sweden-police">they actually follow through with their promises</a>, <b>it's very unlikely that both your VPN and Tor would be compromised at the same time.</b></p>
|
||||
|
||||
<p><u>DISCLAIMER ON VPNs:</u> Keep in mind that if you choose to use a VPN anyway, you must conduct a strict VPN selection, see <a href="https://www.privacyguides.org/en/vpn/">Privacy Guides' Recommendations</a> on that topic, out of which i recommend <a href="https://kycnot.me/service/Mullvad">Mullvad</a> because they accept Monero without any KYC.</p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue