From b168da1d2fef1e2dd439f9e69bd18a662e19db17 Mon Sep 17 00:00:00 2001 From: Tommy Date: Thu, 11 Nov 2021 01:14:59 -0500 Subject: [PATCH] Remove duplicated line (#281) --- legacy_pages/providers/vpn.html | 1 - 1 file changed, 1 deletion(-) diff --git a/legacy_pages/providers/vpn.html b/legacy_pages/providers/vpn.html index e829a6ea..8f656418 100644 --- a/legacy_pages/providers/vpn.html +++ b/legacy_pages/providers/vpn.html @@ -182,7 +182,6 @@ breadcrumb: "VPN"

Unless your VPN provider hosts the encrypted DNS servers, no. Using DOH/DOT (or any other form of encrypted DNS) with third party servers will simply add more entities to trust, and does absolutely nothing to improve your privacy/security. Your VPN provider can still see which websites you visit based on the IP addresses and other methods. Instead of just trusting your VPN provider, you are now trusting both the VPN provider and the DNS provider.

A common reason to recommend encrypted DNS is that it helps against DNS spoofing. However, your browser should already be checking for TLS certificates with HTTPS and warn you about it. If you are not using HTTPS, then an adversary can still just modify anything other than your DNS queries and the end result will be little different.

Needless to say, you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.

-

What if I need anonymity?

Should I use Tor and a VPN?