Why Is Tor Being Called A VPN in /e/?

Yes, and replied to everything which I felt is relevant.

Do you really want me to post “links”, what about the stuff I wrote in my posts? What if I were to put all of that into an article and gave you the link to it? If you really want some links, here you go:

  1. https://www.torproject.org
  2. https://support.torproject.org/about/how-is-tor-different-from-other-proxies/
  3. https://en.wikipedia.org/wiki/Tor_(network) (more links inside)

If I recall correctly, all of those links were related to using Tor in enterprises, which I entirely discounted in my previous post. You shouldn’t use Tor in a enterprise setting, period. For more info just refer to my previous post.

Knowledge is not a physical thing that I can just “show” to you, it has to be conveyed in words, which I did. So there are two possibilities here:

  1. You are ignoring what I wrote
  2. You are unable to understand what I wrote

The latter would explain why you keep asking for links instead of pointing out why I’m wrong. So please tell us which one it is.

I posted specific links, that clearly show TOR is not better, safer, more secure or private, compared to VPNs.

Yes there is information out there if you want to dig for it.

Look, I’m not trying to give you a hard time, just talking here on this subject, without showing facts, doesn’t do the community any good, it’s just talk.

You have to be partial and not biased here and look at it like you are reading someone telling you something, and then wanting them to believe it.

So you really want people to simply believe what you have to say? Because, even after I showed you the facts, by professonials, even the link on Unit42 who works with Homeland Security, you still aren’t willing to accept the facts.

You’re just being stubborn…

P.S. Time to move on… Ciao… :stuck_out_tongue_winking_eye:

What part of “you shouldn’t use Tor in a enterprise setting” from my previous post did you not understand? To give you the benefit of doubt I briefly read the article on Unit42… and guess what, they say the exact same thing:

The Tor project provides one of the most well-known tools that users can leverage to stay anonymous on the internet. People use Tor for many different reasons, both benign and malicious. However, allowing Tor traffic on enterprise networks opens the door to a variety of potential abuses and security risks.

So I’m being stubborn by replying to you in sufficient detail while you just keep ignoring what I say and keep accusing me of spewing baseless non-sense? (which ironically is what you are doing)

I really didn’t want to say this but I understand how Tor works, and if you really are the kind of person who looks at someone’s job to see if they are qualified instead of testing their knowledge, then you should know one thing… I’ve contributed to Tor directly, my code is part of the core Tor program right now.

I really didn’t want to say this but maybe this will grab your attention enough to stop ignoring what I post.

I agree, however you are welcome to post a final reply as long as you don’t start speaking about Tor in enterprise systems again.

Going into all the technical aspects/details is great, but we also have to understand, there will be less technically savvy people, who simply want to use a device and be safe, and need a simpler explanation to help them make a choice.

The great thing is that the differences between TOR vs VPN can be explained, very simple.

Tor is Crowd Blending, being in a crowd blending in.

Tor is like being in a crowd, in a city among thousands.

Being in a crowd you are anonymous, unknown in that crowd. You are not private, safer or more secure in the crowd, being in a crowd reduces these.

A VPN is like being alone out in the countryside, in the mountains.

Being alone in the mountains is more private, safer and more secure, than being in a crowd in a city among thousands next to you.

The differences in the technology between TOR and a VPN, depending on which you prefer, doesn’t limit you either way. Both technlogies can be changed in various ways and combined together, to improve their strengths and weaknesses.

In the end, the best way to look at this, is do you want to be in a city among thousands, or out in the woods alone?

Remember, we’re talking about Computer Technology, comparing the idea of either being in a crowd, vs being alone is all.

Being alone in the woods, no one knows where you’re at, they have a general idea, but they have to go find you. Being in the crowd, they have to figure out who you are in the crowd.

This analogy is not about the dangers of life in the city, vs the country. This is simply about, either being in a crowd, or being alone.

In the end, your choices are simple! Do you want to blend in with a crowd, having someone try to find you in the crowd? Or would you rather be alone out in the woods, having someone try to find where you’re at?

I prefer to be alone in the woods covering my tracks, because alone in the woods, you will always be more private, safer and more secure, instead of a crowd in a city. :slight_smile:

TOR = Blending In
VPN = Alone & Hiding

This last reply, isn’t really about condoning Mullvad, it’s about reading and understanding a little also over Wireguard too, which is something I didn’t bring up, instead of just using OpenVPN.

I strongly recommend reading everything on the subject you can read on their site, especially the information on Multi Hop with Wireguard.

If you want to hide your public IP even more, use multihopping.

Besides OpenVPN, I should of said, what /e/ should really be looking at, is implementing their own Mutli Hop Wireguard Solution(s). :wink:

This topic was automatically closed after 9 days. New replies are no longer allowed.