fix logos

This commit is contained in:
anon 2025-06-21 08:15:54 +02:00
parent 8a42f82534
commit b1128e473f
7 changed files with 41 additions and 40 deletions

View file

@ -16,17 +16,17 @@ As we went over this comparison in the previous blogpost [here](../torvsvpns/ind
**VPNS:**
VPNs can provide Privacy from your ISP ![](../su0.png), but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.![](../su2.png)
VPNs can provide Privacy from your ISP ![](../logos/su0.png), but by using one you are getting privacy from someone (most likely your ISP), but the VPN provider can see what you're doing with your internet connection.![](../logos/su2.png)
In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity ![](../ce2.png)to another
In other words, you're just shifting the privacy problem from your ISP to your VPN provider. You are moving your trust from one centralized entity ![](../logos/ce2.png)to another
**Tor:**
The Tor Network provides Anonymity by routing your traffic through 3 random servers that are spread across the world.
Using Tor means you are employing Decentralisation, ![](../ce0.png)by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. ![](../on0.png)
Using Tor means you are employing Decentralisation, ![](../logos/ce0.png)by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer. ![](../logos/on0.png)
There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. ![](../on2.png)
There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization. ![](../logos/on2.png)