preference for mullvad and ivpn

This commit is contained in:
anarsec 2024-04-24 19:04:09 +00:00
parent 1aa4e02215
commit 61a9fdb3e8
No known key found for this signature in database
3 changed files with 13 additions and 5 deletions

View file

@ -214,7 +214,7 @@ For more information, see [the No Trace Project Threat Library](https://notrace.
Every website visited through the Tor network passes through 3 relays. Relays are servers hosted by different people and organizations around the world. No single relay ever knows both where the encrypted connection is coming from and where it is going. An excerpt from a leaked top-secret NSA assessment calls Tor "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting". The Tor network can be accessed through the Tor Browser on any operating system. The [Tails](/glossary/#tails) operating system forces every program to use the Tor network when accessing the Internet.
For more information, see [our description of Tor](/posts/tails/#tor) and [Privacy Guides'](https://www.privacyguides.org/en/advanced/tor-overview/). To understand the limitations of Tor, see the [Whonix documentation](https://www.whonix.org/wiki/Warning).
For more information, see [Tails for Anarchists](/posts/tails/#tor) and [Privacy Guides](https://www.privacyguides.org/en/advanced/tor-overview/). To understand the limitations of Tor, see the [Whonix documentation](https://www.whonix.org/wiki/Warning).
### Two-Factor Authentication (2FA)