>>7341
>Nobody brought up forks until now.
I brought it up because it's become a common retort against the possibility of subversion and corruption of the Tor project.
>That is a theoretical future problem, not a current one. If that happened and TOR was ruined and alternatives were shut down, maybe then VPNs would be the best solution left for a time. We're not in that hypothetical future yet, though.
I never
once said that VPNs were the best solution than even Tor, what I've been getting at is that VPNs are not something inherently shitty and untrustworthy. If you still want to use Tor, I would advise you to use both Tor
and a VPN you've found to be worth using; just don't be retarded and dismiss one of your options right out of the gate.
>>7347
> but you are manipulated by VPN sellers.
Fuck off, I tell people to use VPNs out of my own free will.
>Because? Tor gives anonymity and privacy, VPN does not. So use Tor only.
That is terrible advice, you dumb cunt
>For what purpose?
To get the protections
both can offer you.
>Why aren't you posting on this site from Tor?
Because I don't fucking trust them for reasons I stated.
>This won't do shit because from spying the last Tor node you won't see who sent the data.
Then they wouldn't spy from the last Tor node in the chain, only the first.
>Deanonymizing VPN users is trivial.
How so?
>Torrents are not serious crime. If you leave empty beer bottle on pavement or grass, the police won't be checking fingerprints from bottle or doing any investigation. Torrents are lowest tier crime.
Please tell me how one being serious and one isn't, changes things.
>Then good luck buying anything.
Non-bitcoin cryptocurrencies are starting to become more accepted.
>Wrong. Tor guard node (first one) knows your IP, but the last one that connects to website doesn't know your IP. So they can't sell your IP to feds.
You keep admitting that the first node knows your IP, therefore,
They know your fucking IP. Just because it's
not known to the last 2 nodes and the destination website, doesn't mean that it didn't get ever get to see it.
> The single VPN server knows your: IP, payment data, what sites you visit, what data you send (without SSL).
"Payment data" is too vague of a term to use, and this same information can be found on different Tor nodes.
>They have all that and can sell it or give to feds. You have to trust a shady corporation that exists only to make profits.
As I already stated,
Tor is directly funded by the fucking feds. They are not any less shady. And again, they could likely get a hold of this data and use it for malicious purposes just as well. Not to mention that you should obviously look for a VPN who seems trustworthy, to reduce any issues with shadiness.
>Because?
Because I recognize the benefits of VPNs and aren't retarded enough to deny them.
>Why don't you?
Because I don't trust Tor for the reasons I've stated earlier (founders are subversives, they get funding from the government, and the images I and
>>7201 posted earlier.,
>This cannot be proven for any VPN.
I just said that it
can, albeit that "method" would done inadvertently.
>Also, even if they didn't log in the past, they can now on in the future.
Why the hell would they suddenly keep logs on their users if they didn't before they got
their own security breached?
You're right to be skeptical about VPNs, but this almost blind trust in Tor that you simultaneously have is infuriating. Do your research on
both (as everyone
else should), go with whichever one looks most trustworthy, and pass who they are and why you trust them, on to others. Just don't be stupid and disparage one or the other when
both have their uses.