[tor-commits] r26476: {website} Created a new FAQ entry about VPNs. Fixed an anchor. (website/trunk/docs/en)

Matt Pagan matt at pagan.io
Thu Dec 12 22:46:22 UTC 2013


Author: mttp
Date: 2013-12-12 22:46:22 +0000 (Thu, 12 Dec 2013)
New Revision: 26476

Modified:
   website/trunk/docs/en/faq.wml
Log:
Created a new FAQ entry about VPNs. Fixed an anchor.



Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml	2013-12-12 15:06:35 UTC (rev 26475)
+++ website/trunk/docs/en/faq.wml	2013-12-12 22:46:22 UTC (rev 26476)
@@ -177,6 +177,9 @@
     </a></li>
     <li><a href="#RemotePhysicalDeviceFingerprinting">Does Tor resist 
     "remote physical device fingerprinting"?</a></li>
+    <li><a href="#VPN">What's safer, Tor or a VPN?</a></li>
+    <li><a href="#Proxychains">Aren't 10 proxies (proxychains) better than 
+    Tor with only 3 hops?</a></li>
     <li><a href="#AttacksOnOnionRouting">What attacks remain against onion 
     routing?</a></li>
     </ul>
@@ -3170,6 +3173,47 @@
 
     <hr>
 
+    <a id="VPN"></a>
+    <h3><a class="anchor" href="#VPN">What's safer, Tor or a VPN?</a></h3>
+    
+    <p>
+    Some people use Virtual Private Networks (VPNs) as a privacy solution. 
+    VPNs encrypt the traffic between the user and the VPN provider, 
+    and they can act as a proxy between a user and an online destination. 
+    However, VPNs have a single point of failure: the VPN provider. 
+    A technically proficient attacker or a number of employees could 
+    retrieve the full identity information associated with a VPN user. 
+    It is also possible to use coercion or other means to convince a 
+    VPN provider to reveal their users' identities. Identities can be 
+    discovered by following a money trail (using Bitcoin does not solve 
+    this problem because Bitcoin is not anonymous), or by persuading the 
+    VPN provider to hand over logs. Even 
+    if a VPN provider says they don't keep logs, users have to take their 
+    word for it---and trust that the VPN provider won't buckle to outside 
+    pressures that might want them to start keeping logs. 
+    </p>
+
+    <p>
+    When you use a VPN, websites can still build up a persistent profile of 
+    your usage over time. Even though sites you visit won't automatically 
+    get your originating IP address, they still know how to profile you 
+    based on your browsing history. 
+    </p>
+
+    <p>
+    When you use Tor the IP address you connect to changes at most every 10 
+    minutes, and often more frequently than that. This makes it extremely 
+    dificult for websites to create any sort of persistent profile of Tor 
+    users (assuming you did not <a 
+    href="https://torproject.org/download/download.html.en#warning">identify 
+    yourself in other ways</a>). No one Tor relay can know enough 
+    information to compromise any Tor user because of Tor's <a 
+    href="https://www.torproject.org/about/overview.html.en#thesolution">encrypted 
+    three-hop circuit</a> design.
+    </p>
+    
+    <hr>
+
     <a id="Proxychains"></a>
     <h3><a class="anchor" href="#Proxychains">Aren't 10 proxies 
     (proxychains) better than Tor with only 3 hops?</a></h3>
@@ -3178,10 +3222,10 @@
     Proxychains is a program that sends your traffic through a series of 
     open web proxies that you supply before sending it on to your final 
     destination. <a href="#KeyManagement">Unlike Tor</a>, proxychains 
-    does not encrypt the connections between each proxy. An open proxy 
-    that wanted to monitor your connection can see all the other proxy 
+    does not encrypt the connections between each proxy server. An open proxy 
+    that wanted to monitor your connection could see all the other proxy 
     servers you wanted to use between itself and your final destination, 
-    as well as the IP address that proxy hop receives traffic from. 
+    as well as the IP address that proxy hop received traffic from. 
     </p>
     <p>
     Because the <a 
@@ -3192,7 +3236,7 @@
     <p>
     While Tor relays are run by volunteers and checked periodically for 
     suspicious behavior, many open proxies that can be found with a search 
-    engine are worm-compromised machines, misconfigured private proxies 
+    engine are compromised machines, misconfigured private proxies 
     not intended for public use, or honeypots set up to exploit users. 
     </p>
     



More information about the tor-commits mailing list