![]() ![]() But apparently, the firewall wouldn’t block a VPN.Īlice should try using a Tor bridge first. Maybe her company has a really strict firewall or her country has a super strict firewall. I prefer to discuss this as a series of reasons why someone would even think about using a VPN in this way.’įor whatever reason, Tor is blocked for Alice. Now I’ll start with what is easiest to actually accomplish and is recommended most often. This brings up the question: If Alice chooses she 100% trusts her VPN provider and wants to use Tor with a VPN, does the VPN add any value? I will address this question in two parts based on whether the VPN comes “before” or “after” Tor. So why use a tool that requires the user’s trust, when she can use a tool that doesn’t? Using a VPN, she has to completely trust her VPN provider. ![]() Using only Tor, she doesn’t have to trust any single entity. Are they completely trusted by their users? Yes, whether the users realize the amount of trust they are placing in the provider or not.Īssume for just a moment that using only Tor gives Alice the same about of “protection” as using only a VPN. Should VPN-provider-X be completely trusted? Maybe. to be competent at keeping their network and machines secure.to not share information with their adversary.As long as the right ones aren’t compromised, working together, or otherwise malicious, the user stays protected. Users don’t have to trust every Tor relay that they use in order to stay safe with Tor. A VPN is fully, 100%, a single point/entity that you must trust. With Tor, you do not have to trust any single entity or any single point.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |