114
submitted 11 months ago by freddy@lemmy.one to c/privacyguides@lemmy.one
top 42 comments
sorted by: hot top controversial new old
[-] sir_reginald@lemmy.world 40 points 11 months ago
[-] jet@hackertalks.com 20 points 11 months ago
[-] sir_reginald@lemmy.world 38 points 11 months ago

I know what Tor is and how to use it, thanks. I was just wondering what the video had to say about Tor + VPNs that hasn't been said a million times. But I'm not watching video content.

[-] jet@hackertalks.com 21 points 11 months ago

It's kind of weird to comment on a video saying you're not going to watch the video but hey fair enough.

Just for you here is the video transcript

https://pastebin.com/ijpuwQZ7

Apologies for the link, it was too large to fit in a post

[-] CodexArcanum@lemmy.world 21 points 11 months ago

Hey thanks for the text link but I can't read all that! Is there an audio link to this transcript being read by the stolen AI likeness of Stephen Fry?

[-] Mr_Blott@lemmy.world 3 points 11 months ago

I don't have the attention span. Could someone link a TikTok?

[-] wildginger@lemmy.myserv.one 10 points 11 months ago

This is a lemmy post, with a link to a video. The comment is not on any video.

[-] jet@hackertalks.com 6 points 11 months ago

You're correct. Let me amend my previous post.

It's weird to reply to a Lemmy post about a video, saying you're not going to watch the video.

[-] wildginger@lemmy.myserv.one 16 points 11 months ago

Is it? Its a pretty common forum comment, saying that they have no interest or capability to watch or listen to a video, and would rather the info was written down so they could read it.

This is a normal request from digg, from reddit, here on lemmy, all over niche hobby forums....

Text based website users usually want text based content. Not really weird.

[-] jet@hackertalks.com 4 points 11 months ago
[-] wildginger@lemmy.myserv.one 5 points 11 months ago

You tend to find text based site users wish they werent?

[-] jet@hackertalks.com 5 points 11 months ago

If people click on a video link, the discussion is typically about the video. Coming into the discussion about the video saying you're refusing to watch the video is not productive in my mind. People who want to engage in the content of the video typically wish to have a productive conversation.

For people who wish to be text only, I respect that, and I understand that, that's why I provided the previous parent a link to the transcript that is also available on the YouTube video.

[-] wildginger@lemmy.myserv.one 7 points 11 months ago

But, again, not a video? You click on the post link, which opens the post and comments. The title says nothing about video either. I didnt know it was a video until after opening the post.

People who are using a text site, who want to engage with your posts title's implied topic of discussion, are just a bit expecting the text site to have more text to read.

Kinda hard to engage with a video you cant watch, when the post implied a topic of discussion you wanted to read about, no?

I dunno man youre just acting real shocked and surprised that the people at the chinese restaurant expected noodles and rice, and are giving you side eyes for offering them street tacos. Im not saying the tacos arent good tacos.

[-] jet@hackertalks.com 6 points 11 months ago

I see the issue, I'm using the Voyager app, it's very clear it's a video before I open the post.

I guess if different apps don't make that clear, there would be a point of contention. Fair enough thank you for bringing that up

I provided a link to the transcript of the video, you can engage with that textually and join the discussion.

[-] Redoomed@lemm.ee 8 points 11 months ago* (last edited 11 months ago)

To add on to the video transcript that @jet@hackertalks.com posted, here is Jonah's post from the Privacy Guides forum that more or less summarizes the video: https://discuss.privacyguides.net/t/clarify-tors-weaknesses-with-respect-to-observability/3676/14

It also includes links to useful resources and noteworthy articles referenced in the video, like the case regarding the Tor user and the Harvard network admins. You can also toggle dark mode on the forum website, which is useful for those using anti-fingerprinting browsers such as Tor Browser or Mullvad Browser.

[-] sir_reginald@lemmy.world 10 points 11 months ago

thanks, there were some bits there that I was not aware of. This is why the written form is superior to videos, I can quickly scan through the paragraphs searching for the information I want.

[-] JohnDClay@sh.itjust.works 4 points 11 months ago

But written is less easily monetizable and requires more attention.

[-] ecnkmaxo@futurology.today 35 points 11 months ago
[-] freddy@lemmy.one 11 points 11 months ago
[-] Mr_Blott@lemmy.world 5 points 11 months ago

No, post an article, then put the video on the videos community

[-] freddy@lemmy.one 5 points 11 months ago

You could read our Tor overview or @jonah@lemmy.one's post on our forum (which you should totally join)

[-] LWD@lemm.ee 18 points 11 months ago* (last edited 11 months ago)
[-] jet@hackertalks.com 14 points 11 months ago

It's a good video, filled with nuance, and good discussion. Definitely worth watching

[-] Deebster@beehaw.org 4 points 11 months ago

Agreed - it's 25 minutes without filler or repetition. Good stuff.

[-] t0m5k1@lemmy.world 10 points 11 months ago* (last edited 11 months ago)

The onion router was a clue in itself as to how you connect to the Internet, especially when you need to hide. Add more than a normal vpn into the mix, proxies, ssh tunnels, dns tunnels, net cat, and maybe i2p. Once done, you could even fire off an ion cannon in a particular orbit if you fancy.

Just bear in mind that some vpn companies are owned by companies who also own other companies that own large networks, so they don't necessarily need the vpn to log traffic to get your meta data.

[-] jet@hackertalks.com 8 points 11 months ago* (last edited 11 months ago)

Canonical link : https://www.youtube.com/watch?v=vo22D-dUeCA

Tldr via notegpt io

  • 🔥 Hot take of the month: Should you use a VPN before connecting to Tor? Probably yes!
  • 🔍 Counter-argument to Mental Outlaw's video on "Stop Using Tor With VPNs"
  • 🌐 Tor Project acknowledges the benefits of using a VPN with Tor
  • 🤝 Privacy Guides is not affiliated with any VPN providers
  • 🔒 Using a VPN before Tor enhances privacy and security
  • 🌍 Reasons to hide Tor usage from ISPs and network administrators
  • 🚫 Misconceptions about Tor's anonymity and the need for VPN usage
[-] elbarto777@lemmy.world 19 points 11 months ago

This tldr doesn't explain anything.

[-] jet@hackertalks.com 4 points 11 months ago

It's machine generated off the video transcript, so it's hit and miss but it should give you enough information to determine if you want to watch the video

[-] PipedLinkBot@feddit.rocks 7 points 11 months ago

Here is an alternative Piped link(s):

https://www.piped.video/watch?v=vo22D-dUeCA

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.

[-] tux0r@feddit.de 6 points 11 months ago

I never leave my VPN, so that's the easier way anyway.

[-] Saki@monero.town 6 points 11 months ago

While doing this is generally not recommended, EFF does indeed suggest this option in some context: https://ssd.eff.org/module/choosing-vpn-thats-right-you#things-to-consider-what-vpns-don-t-do

[-] jet@hackertalks.com 14 points 11 months ago

I think there's a huge difference between we cannot make a recommendation and you shouldn't do this.

The tor FAQ says we cannot endorse this in all scenarios.. "generally speaking"

https://support.torproject.org/faq/faq-5/

The video makes a reasonable argument that if you can't trust your ISP not to log, adding a VPN that has less incentive to log you makes sense and in worst case is the same as your ISP logging you so you lose nothing by trying it

[-] Saki@monero.town 5 points 11 months ago

Also, one should consider using Bridges (obfs4), so that your local ISP may not know you’re on Tor. Tails suggests that too. Using a VPS is not necessary a best option for that, though it might be a good option under some situation.

[-] jet@hackertalks.com 5 points 11 months ago

The video covers that as well, if your bridge becomes discovered later, log traffic can be used to identify your tour usage in the past. And if that's not acceptable in your threat model, then a VPN still makes sense

[-] Saki@monero.town 3 points 11 months ago

Agreed. It’s an option worth considering (even EFF said so)—in fact a bridge itself could be run by something like Team Cymru (Augury), removed in TB v11.5.4. On the other hand, a VPN could collaborate with “them” so you’ll have to trust them… adding yet another unknown.

There are many ways to de-anonymoze Tor users indeed. Like Keystroke fingerprinting or Deep Packet Inspection… Usually a local ISP is not a big problem but it depends. The fact remains that even in a country with heavy Internet censorship, currently a nation-state can’t block Tor (via Bridge or Snowflake).

[-] jet@hackertalks.com 4 points 11 months ago

The issue of people in oppressive countries, where internet traffic is logged, is that using Tor won't be blocked, but will mark somebody as a person of interest.

So there's a lot of people on this planet who are connected to the internet and have a legal requirement to have their traffic logged. Those people absolutely should be using a VPN, the VPN cannot possibly be worse than their ISP

[-] Gooey0210@sh.itjust.works 1 points 11 months ago

I believe this is why privacy groups mostly recommend using tor without vpns More users, more traffic, less being a single target in a field

[-] Anamnesis@lemmy.world 2 points 11 months ago

What are you guys actually using Tor for, anyway?

[-] Mr_Blott@lemmy.world 7 points 11 months ago

Not for watching YouTube vids that should've been a fuckin article anyway

[-] InfiniWheel@lemmy.one 3 points 11 months ago

For shits and giggles, mostly

[-] lseif@sopuli.xyz 3 points 11 months ago

thats besides the point

this post was submitted on 30 Nov 2023
114 points (100.0% liked)

Privacy Guides

16263 readers
1 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS