The routes of Tor traffic are dynamically changed, so a node can just pinpoint the pattern during a small period of time. So compared to a VPN which may monitor you constantly, Tor should be preferred.
If you think your traffic is not being monitored over Tor, then you have thought incorrectly. It can be monitored at the exit node no problem, and is likely monitored _more_ closely than other endpoints.
Your only hope is either not using exit nodes (and only using hidden services), or encrypting all of your traffic _and_ making sure different apps/services use different Tor circuits. This does not happen by default, meaning all of your traffic is mixed together. It doesn't matter that it migrates routes every so often.
Exit nodes don't know where the traffic is coming from, until, of course, you accidentally access your personal domain name over HTTPS just by visiting it, which leaks through SNI. Hope you don't host your own services!
>If you think your traffic is not being monitored over Tor, then you have thought incorrectly.
Tor exit nodes can only monitor traffic for a very short period of time, you create a new circuit and pick an entirely new path through the network very often.
>This does not happen by default, meaning all of your traffic is mixed together. It doesn't matter that it migrates routes every so often.
Absolutely true, a solution to this is to use Whonix or Tails which automatically stream isolates all pre-installed programs, therefore correlation by circuit sharing is impossible. Unfortunately that does not work on a phone, but in the end, using Tor for this is no worse than a VPN.
>Exit nodes don't know where the traffic is coming from, until, of course, you accidentally access your personal domain name over HTTPS
This seems like a straw man. There's not many options to Tor. A VPN will know where you're coming from by default.
conradev|2 years ago
Your only hope is either not using exit nodes (and only using hidden services), or encrypting all of your traffic _and_ making sure different apps/services use different Tor circuits. This does not happen by default, meaning all of your traffic is mixed together. It doesn't matter that it migrates routes every so often.
Exit nodes don't know where the traffic is coming from, until, of course, you accidentally access your personal domain name over HTTPS just by visiting it, which leaks through SNI. Hope you don't host your own services!
swapfile|2 years ago
Tor exit nodes can only monitor traffic for a very short period of time, you create a new circuit and pick an entirely new path through the network very often.
>This does not happen by default, meaning all of your traffic is mixed together. It doesn't matter that it migrates routes every so often.
Absolutely true, a solution to this is to use Whonix or Tails which automatically stream isolates all pre-installed programs, therefore correlation by circuit sharing is impossible. Unfortunately that does not work on a phone, but in the end, using Tor for this is no worse than a VPN.
>Exit nodes don't know where the traffic is coming from, until, of course, you accidentally access your personal domain name over HTTPS
This seems like a straw man. There's not many options to Tor. A VPN will know where you're coming from by default.