
Sign up to save your podcasts
Or
There is potential danger in combining Tor + VPN. Debunking (partly) a common recommendation to combine VPN + Tor. In some cases, with a 100% trusted VPN, this could, under specific circumstances actually improve anonymity (potentially) - whereas the wrong VPN makes the perfect partner for deanonymization techniques. Today we cover a theoretical scenario where VPN companies could be hypothetically created to deanonymize the most paranoid of Tor users - and debunking the common misconceptions of "you need a VPN".
This is not to say VPN's are bad - no at all saying this.
The problem is: who can we trust?
In security, trust is hard.
Want to learn more about security of privacy / anonymity? Check out the public blog on I2P / Clearnet (links below).
#VPN #tor #anonymous
SHARE ON SOCIAL MEDIA TO SUPPORT CHANNEL
Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
Watch, And Share With Others!
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)
DONATIONS WELCOME (100% Independent Content):
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44
CASHAPP - https://cash.app/$HumanRightsTech
MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
PUBLIC BLOG: https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
There is potential danger in combining Tor + VPN. Debunking (partly) a common recommendation to combine VPN + Tor. In some cases, with a 100% trusted VPN, this could, under specific circumstances actually improve anonymity (potentially) - whereas the wrong VPN makes the perfect partner for deanonymization techniques. Today we cover a theoretical scenario where VPN companies could be hypothetically created to deanonymize the most paranoid of Tor users - and debunking the common misconceptions of "you need a VPN".
This is not to say VPN's are bad - no at all saying this.
The problem is: who can we trust?
In security, trust is hard.
Want to learn more about security of privacy / anonymity? Check out the public blog on I2P / Clearnet (links below).
#VPN #tor #anonymous
SHARE ON SOCIAL MEDIA TO SUPPORT CHANNEL
Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
Watch, And Share With Others!
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)
DONATIONS WELCOME (100% Independent Content):
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44
CASHAPP - https://cash.app/$HumanRightsTech
MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
PUBLIC BLOG: https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)