Skip to content

VPN article suggestions #414

@Ganwtrs

Description

@Ganwtrs
  1. Maybe describe the added risks that Tor has that VPNs don’t?

Most people probably shouldn't use Tor for all of their traffic and doing it makes them into far more of a target. Tor is notably a network of nodes anyone can join where it's known there are malicious exits and more organized attempts to undermine it.

  1. Maybe describe the advantages and disadvantages of VPNs vs bridges to use with Tor? I mean something that looks like You > VPN > Tor > Internet vs You > Bridge > Tor > Internet. (I’m not an expert in this field, so please forgive any inaccuracies) If an ISP discovers you’re connecting to an IP address for a Tor bridge (I think bridge IP addresses are very frequently discovered, but correct me if I’m wrong), that can look more suspicious than if an ISP discovers you’re connecting to an IP address for a VPN provider. You also have the option of doing You > VPN > Bridge > Tor > Internet if you believe in the obfuscation capabilities of Tor bridges, and this provides obfuscation if you think an adversary can access the VPN tunnel.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions