From 3ecef0fc53f6708d262a97e020994b2019c51833 Mon Sep 17 00:00:00 2001 From: johnnyburnaway <60918126+johnnyburnaway@users.noreply.github.com> Date: Wed, 10 Nov 2021 15:25:39 +0100 Subject: [PATCH] Fixed some broken links on the VPN page (#153) --- legacy_pages/providers/vpn.html | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/legacy_pages/providers/vpn.html b/legacy_pages/providers/vpn.html index 4f472479..68bdae38 100644 --- a/legacy_pages/providers/vpn.html +++ b/legacy_pages/providers/vpn.html @@ -14,7 +14,7 @@ breadcrumb: "VPN"

If you're looking for added security, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.

Download Tor - Tor Myths & FAQ + Tor Myths & FAQ More Info @@ -143,7 +143,7 @@ breadcrumb: "VPN"
  • Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, eg:
  • Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of 3 or more hops that regularly changes.
  • Use responsible language, eg it is okay to say that a VPN is "disconnected" or "not connected", however claiming that a user is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example the visiting user might be on another VPN provider's service or using Tor.
  • @@ -153,7 +153,7 @@ breadcrumb: "VPN"

    Best Case:

    Responsible marketing that is both educational and useful to the consumer could include:

    @@ -208,7 +208,7 @@ breadcrumb: "VPN"
    1. VPN - a Very Precarious Narrative by Dennis Schubert
    2. The self-contained networks recommended by Privacy Guides are able to replace a VPN that allows access to services on local area network
    3. -
    4. Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
    5. +
    6. Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
    7. Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
    8. IVPN Privacy Guides
    @@ -225,8 +225,7 @@ breadcrumb: "VPN"

    Related VPN information