ava @ava - 11mo
his argument is that it's more "obvious" to use vpn with tor. i usually like mental outlaw's videos, but i disagree with his point of "don't use a vpn with tor because it makes you more obvious." yes, there are some times it doesn't make sense to use both tor and a vpn but that's a nuanced discussion for later. what is important is not exposing your ip to the internet whenever possible. splittunneling or using multiple vpn qubes (on qubesos) and having a direct connection not routed through the vpn traffic work for those "other times" when you do have to expose your ip to an app or website. keeping an always-on vpn, not disconnecting, then connecting to tor, then forgetting to reconnect the vpn and exposing your ip is far more risky. just leave it on. the fact is, your isp will likely hand over your personal data faster with less resistance than a respectable vpn would if there is no account or email with your actual identity attached (like mullvad vpn) and you were using a fingerprint resistant browser with a vpn on when you signed up, or signed up over tor and paid with non kyc or cash, what can they hand over?
great question #cybersecgirl #privacytechpro #vpn #tor nostr:nevent1qqsvjeqgejw9pje982pj8t5pf79l8wfrsks5mendg0rnuamv02vlwfgpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqzyp8t3qcs666wm9wx6e4rjkea8n64nwzl4my0w6ga4l2qt2fwq4wk6qcyqqqqqqge4pevp
tldr, yes you are trusting a 3rd party with your ip, but it makes more sense to trust a privacy-first open source vpn company (who's reputation depends on them not logging user ip) like mullvad, who stores this info in temporary ram, not to permanant hard disk...and who has post-quantum safe resistant vpn tunnels...to not log my ip (they have been tested) than any isp when using tor. it's a silly argument imo. i think it was a filler video.