So, I have been reading many different sites regarding TOR, VPN, and ISP's and it is still very confusing. I want to share with you some of the things I have read that contradict things said here, so nobody is misunderstanding their protections. I found this comment at a site reviewing TOR:
To my understanding, this is one of the ways in which Tor is of little or no use to those wanting anonymity for illcit purpose(s). The Tor Project claims today most
[COLOR=#215AC3 !important][COLOR=#215AC3 !important]internet [COLOR=#215AC3 !important]users[/COLOR][/COLOR][/COLOR] aren't at Tor, Windows Club or better tech levels; for instance, Andy K's WC Forum last week had therein links to
[COLOR=#215AC3 !important][COLOR=#215AC3 !important]browser [COLOR=#215AC3 !important]security[/COLOR][/COLOR][/COLOR] checkers...in my case, one scanner told me my browser was only one of 21 out of 2 million it has tested and which had my security or better.
This is known as "uniqueness", and the more unique you are the easier to track you are by style alone. Per the Tor Project, if your bent is simply not to be tracked these days it seems you can't be deemed "unique" by websites or otherwise in encrypted data which may be intercepted by so-called "evil" nodes and compared to traffic analysis in general. That is, if an "evil" node operator sees your tight security and nothing else, or a website detects it, you're going to be easier to find by process of elimination as so few private parties these days have such security and timing of your accessing Tor/appearance of highly
[COLOR=#215AC3 !important][COLOR=#215AC3 !important]secure[/COLOR][/COLOR] effects can lead right to you. So even though Tor won't let exit nodes deliver spoofed UDPs (spam), if some other "unsavory" type makes even high security exit connection to just about ANY JavaScript or Flash-using site, inter alia, and they obviously have to to be using the internet for illicit purpose, they can "beat" agencies temporarily by appearing to be part of the low-tech-knowledge crowd via ENABLING scripts and flash like "most users"...but then they are exposed to hazards of using JavaScript or Flash at sites which can then help find them via analysis of their own "uniqueness": elements of their offense!
To be sure, the average Windows Club person doesn't engage in much that requires threat of discovery by law agencies via "uniqueness", and tech-savvy people like them are not who Tor wrote the advice for. I myself disable all scripts and set Tor security options to warn me of attack sites notwithstanding (note: I find you must tell Vidalia GUI that each time you start Tor...it indeed remembers nothing!). If I want a tech tut at YouTube, for example, I can temporarily allow that single video...to my awareness nobody is "staking out" my everyday internet spots. My "anonymity" is a byproduct of wanting tight protection against malware scripting.
But if I were merely behind a national firewall of free thought generally, though not really "illicit" I too would want to avoid "uniqueness" in watching that same dull tech tut. To avoid end-to-end discovery I too would then have to deal with state-of-the-art DPI and other analyzers via turning off scripts generally...like most modern non-tech users; and I'd still have a great Tor warning system re attack sites plus my own trusted antiviral program...and Microsoft
[COLOR=#215AC3 !important][COLOR=#215AC3 !important]malware [COLOR=#215AC3 !important]removal[/COLOR][/COLOR][/COLOR] tools since I'm a windows fan.
Did anyone else read this as, TOR isn;t really protecting you from prying eyes while surfing illicit sites? Then there's the whole VPN then TOR, or TOR then VPN debates....... Jeeebus.
I feel like Steve Buscemi in Armegeddon, when they're about to take off and he says "Oh Boy! Are we staying, are we going, are we staying?!?!?!?"