The simplicity of it is logic defying. It used to be that you had to find crosswalks or move puzzle pieces or type blurred letters and numbers, but NOW all the sudden I can just click a box and HEY!, I’m human?

That’s hardly the Turing Test I’d expected.

  • cadekat@pawb.social
    link
    fedilink
    arrow-up
    8
    ·
    4 months ago

    There are two ways to layer a VPN and tor:

    1. Tor over VPN; or
    2. VPN over Tor.

    In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.

    In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.

    • wolfpack86@lemmy.world
      link
      fedilink
      arrow-up
      18
      ·
      4 months ago

      So really, “no value in mixing,” which is distinct from “don’t mix.”

      The latter implies a security risk could be created.

        • Strawberry
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          If you’re using tour vpn at the system or network level, and tor at the browser level, is there a risk of mis-ordering?

      • nyxia
        link
        fedilink
        arrow-up
        1
        ·
        4 months ago

        A security risk is created, you’re creating a permanent guard node by using your VPN with TOR. A lot of people downplay how serious this can be against a dedicated attacker. Sure, it may not matter for most, but for those with the right threat model, it will.

        • wolfpack86@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          So VPN first then Tor is ill advised for this, or only the reverse? What is the potential attack in running Tor while on VPN?