In this case The exit node can not snoop on you, but instead VPN can snoop on you. User-Node 1 (Guard)-Node 2 (middle node)-Node 3 (exit node)-VPN-destination site The second option is to use the following topology: This may or may not give you some additional piece of mind that your data can not be used even in an anonymous way for reserch purpose. Tor will not be able to determine where you are connecting from, even for reserch purposes. There is one addtional outcome to this setup. User-VPN-Node 1 (Guard)- Node 2 (middle node)- Node 3 (exit node)- destination site This is in a case where the schematic of your network looks something like the following: This is a matter of who are you trusting more? Your ISP or your VPN provider? Since you have a lot more choices with VPN providers than ISPs, it is logical to prefer the VPN provider over ISP.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |