• Cano@lemm.ee
    link
    fedilink
    arrow-up
    22
    arrow-down
    1
    ·
    8 months ago

    The Tor project themselves reccomend against using their service with a VPN. The only thing a VPN would do is prevent your ISP from knowing you’re accessing Tor, but if the feds are actively trying to get you (as this meme seems to imply) then the VPN won’t really do much. If anything using a VPN would only make you more suspicious

  • ram@bookwormstory.social
    link
    fedilink
    English
    arrow-up
    1
    ·
    8 months ago

    OP ITT is really just jumping around screaming that they’re the only person on this platform who’s not in the CIA lmao

    • NeuronautML@lemmy.ml
      link
      fedilink
      arrow-up
      21
      ·
      edit-2
      8 months ago

      This horse has been beaten to death. There are literal computer science papers debating this specific issue. More than one even. Refuting you here is just a waste of time. Go read those much more comprehensive papers than anything that could be written here. Just use your search engine of choice and type Anonymity, TOR and VPN and watch as a world of refuting unfolds in front of your eyes. Academic, scientific, peer reviewed, quality refuting.

      At the end of the day you use whatever you feel like using. It’s your machine, possibly your freedom at stake. Go ahead, use whatever you please.

      • flooppoolf@lemmy.world
        cake
        link
        fedilink
        arrow-up
        4
        arrow-down
        4
        ·
        edit-2
        8 months ago

        Well all this normie learned (me) was not much. What’s the safer play then?

        You don’t gotta link me to computer science journals, I can’t read any of that cryptographic hieroglyphic RSA 6969bit new world mumbo jumbo.

        Just half assed memes about secop.

        • NeuronautML@lemmy.ml
          link
          fedilink
          arrow-up
          21
          ·
          edit-2
          8 months ago

          Depends on what you wanna do with TOR. If you wanna be anonymous in your regular internet browsing and torrents, go with a good quality paid for VPN with no logs, like mullvad or proton. You don’t need TOR at all. You’re not worth the hassle.

          If you’re trying to commit chill crimes like ordering drugs online, then you should probably look up the DNM bible. Just TOR and maybe a bridge is enough probably, if people where you live in don’t use TOR. LEO can’t see your traffic but if you’re the only one using TOR in your neighborhood, it’s pretty easy to pin you.

          If you’re a journalist and you’re about to piss off a powerful government, you probably need a bridge and TOR and a laptop with no hard drive. You will probably need some self hosted machines to obfuscate your traffic which you will need to recycle really often. You shouldn’t use a phone. You also need a lot of money and a lot of help, specially in countries that are against the country you’re pissing off. Opsec becomes a full time job, depending on how many friends you have.

          If you’re trying to run a drug empire or distribute CSAM, getting caught is merely a question of when no matter what you use, because even politically divergent countries and organizations will unite to put you in jail, even if they’re normally on the crime side of things. Nobody likes CSAM distributors and drug empires usually don’t make a lot of friends and make way too much money to keep the ones they do.

          • flooppoolf@lemmy.world
            cake
            link
            fedilink
            arrow-up
            7
            ·
            8 months ago

            Based ass response. I honestly had no clue about that neighborhood point. I’m honestly shocked and thankful you explained that.

            • NeuronautML@lemmy.ml
              link
              fedilink
              arrow-up
              9
              ·
              edit-2
              8 months ago

              A dude got caught making bomb threats at Harvard because he was the only one in his university that connected to TOR and they knew from the entry node it had to be from that area. They checked the logs and only one PC had directly connected to the TOR network from that area at that time. The guy wanted more time to study.

              • mayoi@sh.itjust.works
                link
                fedilink
                arrow-up
                3
                ·
                8 months ago

                He could’ve easily avoided that by simply connecting through public coffee shop wifi instead of being a dumbass…

            • NeuronautML@lemmy.ml
              link
              fedilink
              arrow-up
              5
              ·
              edit-2
              8 months ago

              And a separate flash with your password database, PGP keyring and an encrypted files vault. If you need to go or to destroy/hide evidence, a flash drive is much easier, specially when the task force going after you is more worried about hard drives and laptops and usually gloss over flash drives at least initially.

          • mctoasterson@reddthat.com
            link
            fedilink
            arrow-up
            2
            ·
            8 months ago

            I feel like anyone who has to do anything that “deep cover” is probably doing some hyper aggressive prevention techniques as well like creating a botnet and their own “private” Tor which they recycle machines frequently, or using stolen/compromised VPS and only connecting to it via proxy chains, or something similarly complex.