forked from nihilist/blog-contributions
Upload files to "servers/anonuse"
This commit is contained in:
parent
5c8919fd1d
commit
156a42c612
@ -67,13 +67,13 @@
|
|||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>Why isn’t Privacy enough?</b></h2>
|
<h2><b>Why isn’t privacy with a VPN enough?</b></h2>
|
||||||
<p>Let’s say that Bob is using an open-source browser to access an open-source decentralized platform with next to no surveillance. His privacy is further strengthened by an HTTPS connection (nowadays a default), which does not permit middlemen to see what one is doing on a website.</p>
|
<p>Let’s say that Bob is using an open-source browser and a VPN to access a website. Thinking he is safe, he provides a false name and address when creating an account.</p>
|
||||||
<p><b>This connection protects his privacy, but not his anonymity.</b> The ISP knows Bob’s name because of the contract they signed, and it also knows the name of the website he is visiting, how often he does so, and how much traffic occurs between them. Moreover, if the website itself logs IP addresses, it would also likely be able to deanonymize Bob: nearly all stationary IP addresses and their respective locations are listed in databases sold by brokers.</p>
|
<p><b>It seems like Bob has some privacy, yet his anonymity can still be compromised.</b> The website’s owner notices that Bob provided an inexistent address, which is a violation of the Terms of Service. The owner files a lawsuit, and <b>the court obliges Bob’s VPN provider to deanonymize him.</b></p>
|
||||||
<img src="../torvsvpns/1.png" class="imgRz">
|
<img src="../torvsvpns/2.png" class="imgRz">
|
||||||
<p>These issues can be solved if Bob begins using Tor, which reroutes traffic in a way that obscures its origins and destinations, <b>making it nearly impossible to figure out who is connecting to what.</b></p>
|
<p>This situation would have been avoided had Bob used Tor, which reroutes traffic in a way that obscures its origins and destinations, <b>making it nearly impossible to figure out who is connecting to what.</b></p>
|
||||||
<img src="../torvsvpns/4.png" class="imgRz">
|
<img src="../torvsvpns/5.png" class="imgRz">
|
||||||
<p>Bob’s identity will be revealed only if he gives it up voluntarily.</p>
|
<p>With Tor, Bob’s identity would be revealed only if he gave it up voluntarily.</p>
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
</div> <!-- /container -->
|
</div> <!-- /container -->
|
||||||
@ -119,3 +119,4 @@
|
|||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user