-
Notifications
You must be signed in to change notification settings - Fork 37
Open
Description
- Maybe describe the added risks that Tor has that VPNs don’t?
Most people probably shouldn't use Tor for all of their traffic and doing it makes them into far more of a target. Tor is notably a network of nodes anyone can join where it's known there are malicious exits and more organized attempts to undermine it.
- Maybe describe the advantages and disadvantages of VPNs vs bridges to use with Tor? I mean something that looks like You > VPN > Tor > Internet vs You > Bridge > Tor > Internet. (I’m not an expert in this field, so please forgive any inaccuracies) If an ISP discovers you’re connecting to an IP address for a Tor bridge (I think bridge IP addresses are very frequently discovered, but correct me if I’m wrong), that can look more suspicious than if an ISP discovers you’re connecting to an IP address for a VPN provider. You also have the option of doing You > VPN > Bridge > Tor > Internet if you believe in the obfuscation capabilities of Tor bridges, and this provides obfuscation if you think an adversary can access the VPN tunnel.
Metadata
Metadata
Assignees
Labels
No labels