From 306ee5c45671e633232dfa5406baeac8958d8fe8 Mon Sep 17 00:00:00 2001 From: Tommy Date: Wed, 10 Nov 2021 03:59:30 -0500 Subject: [PATCH] Remove duplicated entry (#275) --- legacy_pages/providers/vpn.html | 1 - 1 file changed, 1 deletion(-) diff --git a/legacy_pages/providers/vpn.html b/legacy_pages/providers/vpn.html index a1bc582f..5713abe7 100644 --- a/legacy_pages/providers/vpn.html +++ b/legacy_pages/providers/vpn.html @@ -183,7 +183,6 @@ breadcrumb: "VPN"

A common reason to recommend encrypted DNS is that it helps against DNS spoofing. However, your browser should already be checking for TLS certificates with HTTPS and warn you about it. If you are not using HTTPS, then an adversary can still just modify anything other than your DNS queries and the end result will be little different.

Needless to say, you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.

What if I need anonymity?

-

VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.

Should I use Tor and a VPN?