394

The simplicity of it is logic defying. It used to be that you had to find crosswalks or move puzzle pieces or type blurred letters and numbers, but NOW all the sudden I can just click a box and HEY!, I'm human?

That's hardly the Turing Test I'd expected.

you are viewing a single comment's thread
view the rest of the comments
[-] Melatonin@lemmy.dbzer0.com 11 points 2 months ago* (last edited 2 months ago)

I like that when I'm on tor browser with VPN behind it they're like "Yeah, cool, go on through"

[-] cadekat@pawb.social 13 points 2 months ago

Don't mix tor plus VPN.

If you're using tor browser without tor for some reason, carry on.

[-] Melatonin@lemmy.dbzer0.com 8 points 2 months ago* (last edited 2 months ago)

So, turn off my VPN that's always running before I use the tour browser?

[-] cadekat@pawb.social 9 points 2 months ago

There are two ways to layer a VPN and tor:

  1. Tor over VPN; or
  2. VPN over Tor.

In the first option, you gain little. Tor already encrypts your traffic, so your ISP can't see inside them. Technically, Tor over a VPN hides the fact that you're using Tor from your ISP, but Tor's snowflake does something similar if you need that.

In the second option, you're revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.

[-] wolfpack86@lemmy.world 17 points 2 months ago

So really, "no value in mixing," which is distinct from "don't mix."

The latter implies a security risk could be created.

[-] cadekat@pawb.social 3 points 2 months ago

The risk of mis-ordering your layers is a security issue.

[-] Strawberry@lemmy.blahaj.zone 1 points 2 months ago

If you're using tour vpn at the system or network level, and tor at the browser level, is there a risk of mis-ordering?

[-] nyxia@lemmy.blahaj.zone 1 points 2 months ago

A security risk is created, you're creating a permanent guard node by using your VPN with TOR. A lot of people downplay how serious this can be against a dedicated attacker. Sure, it may not matter for most, but for those with the right threat model, it will.

[-] wolfpack86@lemmy.world 1 points 2 months ago

So VPN first then Tor is ill advised for this, or only the reverse? What is the potential attack in running Tor while on VPN?

[-] virku@lemmy.world 4 points 2 months ago
[-] LodeMike@lemmy.today 3 points 2 months ago

VPN behind it. So tor is under the VPN.

this post was submitted on 24 Aug 2024
394 points (97.1% liked)

Asklemmy

43781 readers
916 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS