It adds a layer of protection, though that protection depends greatly on the VPNs leadership willingness to be imprisoned for refusing to give up user data.
Using an onion browser gives additional layers of security IIRC, though I need to research that better.
Ultimately if you are using the VPN on you phone & have GPS that can be traced, it doesn't matter where your VPN says you are. Your device is physically tied to your geolocation & I would assume any data requested for that device can be tied to where you specifically are if a VPN is compromised somehow.
I think it's a bigger issue that people use ToR with the same system they browse the internet, leaving behind fingerprints that can ID them when they use it on ToR.
I believe it was one known node, but who knows if that's even the case anymore. Personally, I wouldn't do anything illegal on Tor to begin with so it's ultimately just a layer of security and a bit of enthusiast level fun.
I haven't been on any Tor adventures for the last 10 or so years though so things may have changed.
People should always remember that the core principles and code came from the U.S. Naval Research Lab, though the Tor Project is not officially affiliated in any capacity to the best of my limited knowledge -- does not mean there aren't unofficial affiliations.
Government handshakes even apply with non-extradition countries so if they reaaallly want you, your data can find its way into their hands that's for sure. Probably without directly implicating the VPN service.
So are VPN's useless guys?
VPNs can be tracked yes.
I thought so. Thanks friend!
It adds a layer of protection, though that protection depends greatly on the VPNs leadership willingness to be imprisoned for refusing to give up user data.
Using an onion browser gives additional layers of security IIRC, though I need to research that better.
Ultimately if you are using the VPN on you phone & have GPS that can be traced, it doesn't matter where your VPN says you are. Your device is physically tied to your geolocation & I would assume any data requested for that device can be tied to where you specifically are if a VPN is compromised somehow.
You can just host your own VPN on a VM hosted in a CoLo. This can be done very cheaply now a days: https://youtu.be/gxpX_mubz2A?si=ZNgnuYCgmJXGXJAw
Or even for free!!...
https://youtu.be/1dIy0rZ_GKs?si=qETTAZubBXirXosV
They are only good for hiding yourself from advertisers and every day stuff. Use Tor if you're serious about privacy.
It's essentially been proven that enough nodes on Tor are compromised that you can be tracked on it too.
I think it's a bigger issue that people use ToR with the same system they browse the internet, leaving behind fingerprints that can ID them when they use it on ToR.
I believe it was one known node, but who knows if that's even the case anymore. Personally, I wouldn't do anything illegal on Tor to begin with so it's ultimately just a layer of security and a bit of enthusiast level fun.
I haven't been on any Tor adventures for the last 10 or so years though so things may have changed.
People should always remember that the core principles and code came from the U.S. Naval Research Lab, though the Tor Project is not officially affiliated in any capacity to the best of my limited knowledge -- does not mean there aren't unofficial affiliations.
False
they will at least hide you from other people but not from NSA etc
Government handshakes even apply with non-extradition countries so if they reaaallly want you, your data can find its way into their hands that's for sure. Probably without directly implicating the VPN service.
COOL thanks guys for all your replies! Keep doing the Good work! =)