(no title)
jpalioto | 11 years ago
Me -> TOR encrypts data -> VPN encrypts data -> data goes through tunnel -> VPN decrypts data -> TOR encrypted data passes through first node -> TOR encrypted data passes through relay node -> TOR decrypts data as it passes through the exit node -> swish nothing but net
This gives protection from the ISP and from the VPN provider -- I have to trust neither.
Houshalter|11 years ago
jpalioto|11 years ago