![]() ![]() This means that if some government wants your info there's nowhere to go, whereas a VPN could easily hand your data over.Īs far as Tor + VPN goes I'd advise against it. Well, since no node can actually tell where your data is going (or even what it is if you use HTTPS) no node knows who or where you are. So how does this help, in either case the website doesn't know your IP address. For example, in the standard 3 bounce system that TBB uses node #2 doesn't know your IP address, and node #3 (the exit node) doesn't know node #1 (the entry node)'s IP address (or #2's), and the destination node doesn't know node #2's IP address (or #1's, or yours). Onions are a bit complicated to explain, but what they do is allow for data to be bounced through several nodes without the node two steps ahead knowing its IP address. Tor is a proxy network which uses onions to transmit data. HTTPS exists meaning the encryption is uselessly redundant (encrypting something twice with the same algorithm doesn't increase security, only obscurity). They can see your IP address and where you're going. VPNs fall short (and are IMO useless) for two reasons: ![]() You encrypt your data and send it off to the VPN, who decrypts it and sends it to the destination. ![]()
0 Comments
Leave a Reply. |