GHOST on Nostr: Clearnet vs VPN vs Tor A quick overview #privacy #tor #vpn Computer -> clearnet -> ...
Clearnet vs VPN vs Tor
A quick overview
#privacy #tor #vpn
Computer -> clearnet -> Website
ISP: sees that you are connected to website
VPN: n/a
Tor Entrance Node: n/a
Tor Exit Node: n/a
Website: sees your IP address and logs everything that you do on the website
Good for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank
Computer -> VPN -> Website
ISP: sees that you are connecting to a VPN but not what you are doing afterwards
VPN: sees your IP Address and that you are connecting to a website
Tor Entrance Node: n/a
Tor Exit Node: n/a
Website: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data.
Good for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider).
Computer -> Tor -> Website
ISP: sees that you are connected to Tor but nothing afterwards
VPN: n/a
Tor Entrance Node: sees your IP address but nothing afterwards
Tor Exit Node: sees website you are going to but not who you are
Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for privacy and anonymity. Assumes that Tor is legal in your country.
Computer -> VPN -> Tor -> Website
ISP: sees that you connected to a VPN but nothing afterwards
VPN: sees IP address and that you are connecting to Tor but nothing afterwards
Tor Entrance Node: sees a VPN is connected but nothing afterwards
Tor Exit Node: sees website you are going to but not who you are
Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous).
Computer -> Tor -> VPN -> Website
ISP: sees that you are connecting to Tor but nothing afterwards
VPN: sees someone from Tor is connected and that they are connecting to a website
Tor Entrance Node: sees IP address but nothing afterwards
Tor Exit Node: sees someone is connecting to a VPN but nothing afterwards
Website: sees someone from a VPN is connecting but doesn’t know who. Logs.
Good for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero).
Note: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there.
Published at
2024-08-04 16:00:26Event JSON
{
"id": "b09c895812cee0ae48b40dbfc1b509ea66949ef5e8b354536373f60e116a94d2",
"pubkey": "3b7fc823611f1aeaea63ee3bf69b25b8aa16ec6e81d1afc39026808fe194354f",
"created_at": 1722787226,
"kind": 1,
"tags": [
[
"t",
"privacy"
],
[
"t",
"tor"
],
[
"t",
"vpn"
]
],
"content": "Clearnet vs VPN vs Tor\n\nA quick overview\n#privacy #tor #vpn \n\n\nComputer -\u003e clearnet -\u003e Website \n\nISP: sees that you are connected to website\nVPN: n/a\nTor Entrance Node: n/a\nTor Exit Node: n/a\nWebsite: sees your IP address and logs everything that you do on the website \n\nGood for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank \n\n\nComputer -\u003e VPN -\u003e Website \n\nISP: sees that you are connecting to a VPN but not what you are doing afterwards \nVPN: sees your IP Address and that you are connecting to a website \nTor Entrance Node: n/a\nTor Exit Node: n/a\nWebsite: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data. \n\n\nGood for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider). \n\n\nComputer -\u003e Tor -\u003e Website \n\nISP: sees that you are connected to Tor but nothing afterwards \nVPN: n/a\nTor Entrance Node: sees your IP address but nothing afterwards \nTor Exit Node: sees website you are going to but not who you are \nWebsite: sees someone from Tor has connected but doesn’t know who. Logs. \n\nGood for privacy and anonymity. Assumes that Tor is legal in your country. \n\n\nComputer -\u003e VPN -\u003e Tor -\u003e Website \n\nISP: sees that you connected to a VPN but nothing afterwards \nVPN: sees IP address and that you are connecting to Tor but nothing afterwards \nTor Entrance Node: sees a VPN is connected but nothing afterwards \nTor Exit Node: sees website you are going to but not who you are \nWebsite: sees someone from Tor has connected but doesn’t know who. Logs. \n\nGood for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous). \n\n\nComputer -\u003e Tor -\u003e VPN -\u003e Website \n\nISP: sees that you are connecting to Tor but nothing afterwards \nVPN: sees someone from Tor is connected and that they are connecting to a website \nTor Entrance Node: sees IP address but nothing afterwards \nTor Exit Node: sees someone is connecting to a VPN but nothing afterwards \nWebsite: sees someone from a VPN is connecting but doesn’t know who. Logs. \n\nGood for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero). \n\n\nNote: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there.",
"sig": "dd28328f5eb87cffa6f885fc60569cb063074ae97dbd5ff6d1d260d3772ffccaccecf8d70f13aaefd7e98f572a6a835a85242655f8d95a19c3e753f3371c5582"
}