Today the Tor Project is launching the Run a Tor Bridge campaign. Participants are invited to contribute and help censored users by running a Tor bridge. You can find more details below, including our special reward kits for participants. The campaign will run from November 17 to January 7, 2022. Join us and help censored users!
Just to make it clear, I am not downvoting you. However, it seems you are commenting about a side effect of the article’s topic, which seems not the best thing to say, as it hurts a lot more people than some colour revolution pro imperialists. Think of the Snowdens or Assanges that do not operate as a big public entity.
Or the other option is to not add extra trust layer entity called VPN, and instead pick your exit nodes and have your data filter via DNSSEC enabled no log DNSes with countries of your choice.
Or, you could actually use E2EE communication via Tor, since no exit node matters in that case. Either of the clients would have to be compromised in that case, since the decryption happens locally with E2EE.
VPN + Tor setup has been called out on too many times at this point.
Not saying Tor is backdoored, or that it can’t be used for good.
Just to make it clear, I am not downvoting you. However, it seems you are commenting about a side effect of the article’s topic, which seems not the best thing to say, as it hurts a lot more people than some colour revolution pro imperialists. Think of the Snowdens or Assanges that do not operate as a big public entity.
I understand your point. Mine was that the primary use case of Tor is more intended for the outlined scenario.
It’s biggest funders are regime change cut-outs, just see: https://www.torproject.org/about/sponsors
For activists, it’s probably best to use Tor on top of some other VPN…
Or the other option is to not add extra trust layer entity called VPN, and instead pick your exit nodes and have your data filter via DNSSEC enabled no log DNSes with countries of your choice.
Or, you could actually use E2EE communication via Tor, since no exit node matters in that case. Either of the clients would have to be compromised in that case, since the decryption happens locally with E2EE.
VPN + Tor setup has been called out on too many times at this point.
What are you trying to imply then?