"Privacy isn't about hiding bad things, but about protecting what defines us as human beings, who we are. Our day-to-day behavior, our personality, our fears, our relationships, and our vulnerabilities."

-- The Tor Project

@fribbledom tor doesn’t protect by itself. Get a paid vpn then get on tor. If possible use a separate machine with some old Mac card.

@vikramjeetsinghparmar May I ask why? As far as I know Tor works exactly the same as a VPN, just with more than one server.

Also: "use a separate machine with some old Mac card" Yeah, for Snowden-level stuff, you probably need to use a separate machine. Tracking these days is getting rather out of hand...


@vikramjeetsinghparmar @fribbledom Isn't a VPN like a deliberate man-in-the-middle attack initiated by themselves? Thus, reducing privacy (at least potentially)?

To put it another way: how do you choose a good VPN provider?


MAC addresses can be generated, OpenBSD has this built in for example.
(I think that's what you mean by 'Mac card').

You -> VPN -> Tor = that's linkable to you -> go to jail

Tor -> VPN -> Internet = Better, as it adds a layer. But you need to pay for the VPN somehow -> Back to square 1.

There are a couple of talks on this, but this one is a good one:


@vikramjeetsinghparmar @fribbledom Tor + decent opsec provides sufficient protection against most non-targeted invasions of privacy. If your ISP/opponent will target you for merely using Tor, that's when a VPN can help. But of course it only moves the trust from your ISP to your VPN provider, and won't stop an ISP who will target you for using a VPN

There's not universal advice here. Know your threat model.


Well, technically it is, right? If something is a crime or not, that is defined by the law of ones country.


Sign in to participate in the conversation

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!