diff --git a/legacy_pages/providers/vpn.html b/legacy_pages/providers/vpn.html
index 4f472479..68bdae38 100644
--- a/legacy_pages/providers/vpn.html
+++ b/legacy_pages/providers/vpn.html
@@ -14,7 +14,7 @@ breadcrumb: "VPN"
If you're looking for added security, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.
If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
Download Tor
- Tor Myths & FAQ
+ Tor Myths & FAQ
More Info
@@ -143,7 +143,7 @@ breadcrumb: "VPN"
Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, eg:
Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of 3 or more hops that regularly changes.
Use responsible language, eg it is okay to say that a VPN is "disconnected" or "not connected", however claiming that a user is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example the visiting user might be on another VPN provider's service or using Tor.
@@ -153,7 +153,7 @@ breadcrumb: "VPN"
Best Case:
Responsible marketing that is both educational and useful to the consumer could include:
@@ -208,7 +208,7 @@ breadcrumb: "VPN"
- VPN - a Very Precarious Narrative by Dennis Schubert
- The self-contained networks recommended by Privacy Guides are able to replace a VPN that allows access to services on local area network
- - Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
+ - Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
- Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
- IVPN Privacy Guides
@@ -225,8 +225,7 @@ breadcrumb: "VPN"
Related VPN information
- - The Trouble with VPN and Privacy Review Sites
- - Beware of False Reviews - VPN Marketing and Affiliate Programs
+ - The Trouble with VPN and Privacy Review Sites
- Proxy.sh VPN Provider Sniffed Server Traffic to Catch Hacker
- blackVPN announced to delete connection logs after disconnection
- Don't use LT2P IPSec, use other protocols.
@@ -235,7 +234,7 @@ breadcrumb: "VPN"
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
- link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
+ link="https://medium.com/privacyguides/the-trouble-with-vpn-and-privacy-review-sites-ae9b29eda8fd"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}
@@ -245,7 +244,7 @@ breadcrumb: "VPN"
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
- link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
+ link="https://medium.com/privacyguides/the-trouble-with-vpn-and-privacy-review-sites-ae9b29eda8fd"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}
@@ -255,7 +254,7 @@ breadcrumb: "VPN"
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
- link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
+ link="https://medium.com/privacyguides/the-trouble-with-vpn-and-privacy-review-sites-ae9b29eda8fd"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}