The Tor project themselves reccomend against using their service with a VPN. The only thing a VPN would do is prevent your ISP from knowing you’re accessing Tor, but if the feds are actively trying to get you (as this meme seems to imply) then the VPN won’t really do much. If anything using a VPN would only make you more suspicious
If you don’t want your ISP to know, there’s this magical thing called TOR Bridges.
The Tor project themselves reccomend against using their service with a VPN
The devs say it as general advice for those who don’t know what they are doing.. It’s perfectly fine as long as you don’t try to set up strange configurations and you can trust your vpn provider.
Thanks for the correction
deleted by creator
This guy created his account today. He’s a troll, don’t bother.
Creating new accounts is bad now? You glow too much.
If he glows its because of your damn flashlight fed boy.
This. They dont want you to make new disposable accounts.
Here is an alternative Piped link(s):
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source; check me out at GitHub.
Not watching your video. Stop shilling your youtube channel.
My brother once said Tor browser is dangerous. He probably thinks you get sent to an illegal store or a CSAM site the second you open that thing.
OP ITT is really just jumping around screaming that they’re the only person on this platform who’s not in the CIA lmao
Yes
Why are you always spending time with the CIA? Pretty sus, maybe you’re in the CIA, or a CIA shill, huh?
deleted by creator
Here is an alternative Piped link(s):
https://piped.video/y8bIt4K_Kfo?si=aTcafugE14VK1G3U
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source; check me out at GitHub.
Not watching your video. Stop shilling your youtube channel.
I’ve never once seen a valid argument of why someone should not use a VPN.
Lmao at the downvotes. I can’t believe literal glowies are here. No place is safe.
This horse has been beaten to death. There are literal computer science papers debating this specific issue. More than one even. Refuting you here is just a waste of time. Go read those much more comprehensive papers than anything that could be written here. Just use your search engine of choice and type Anonymity, TOR and VPN and watch as a world of refuting unfolds in front of your eyes. Academic, scientific, peer reviewed, quality refuting.
At the end of the day you use whatever you feel like using. It’s your machine, possibly your freedom at stake. Go ahead, use whatever you please.
deleted by creator
Depends on what you wanna do with TOR. If you wanna be anonymous in your regular internet browsing and torrents, go with a good quality paid for VPN with no logs, like mullvad or proton. You don’t need TOR at all. You’re not worth the hassle.
If you’re trying to commit chill crimes like ordering drugs online, then you should probably look up the DNM bible. Just TOR and maybe a bridge is enough probably, if people where you live in don’t use TOR. LEO can’t see your traffic but if you’re the only one using TOR in your neighborhood, it’s pretty easy to pin you.
If you’re a journalist and you’re about to piss off a powerful government, you probably need a bridge and TOR and a laptop with no hard drive. You will probably need some self hosted machines to obfuscate your traffic which you will need to recycle really often. You shouldn’t use a phone. You also need a lot of money and a lot of help, specially in countries that are against the country you’re pissing off. Opsec becomes a full time job, depending on how many friends you have.
If you’re trying to run a drug empire or distribute CSAM, getting caught is merely a question of when no matter what you use, because even politically divergent countries and organizations will unite to put you in jail, even if they’re normally on the crime side of things. Nobody likes CSAM distributors and drug empires usually don’t make a lot of friends and make way too much money to keep the ones they do.
deleted by creator
A dude got caught making bomb threats at Harvard because he was the only one in his university that connected to TOR and they knew from the entry node it had to be from that area. They checked the logs and only one PC had directly connected to the TOR network from that area at that time. The guy wanted more time to study.
so tails os on a flash drive with olny floss programs and the duck mp3 player from the dankpods video
And a separate flash with your password database, PGP keyring and an encrypted files vault. If you need to go or to destroy/hide evidence, a flash drive is much easier, specially when the task force going after you is more worried about hard drives and laptops and usually gloss over flash drives at least initially.
I feel like anyone who has to do anything that “deep cover” is probably doing some hyper aggressive prevention techniques as well like creating a botnet and their own “private” Tor which they recycle machines frequently, or using stolen/compromised VPS and only connecting to it via proxy chains, or something similarly complex.
Aaaw poor snowflake 😭
Sir
Hi agent
Hi 🤡
Oh a different agent. Hi.
🥱