4 questions (Network segmentation, VPN Routing, Tor and Security in general)
-
@tim-mcmanus
Couldn't agree more. At its core Tor is just a couple of proxies; a couple of ISP's to "strong-arm" and they've got you.
I'm attempting to implement some security practices that make it a lot harder. More specifically 2 end-to-end encryption tunnels (via 2 different "reputable" VPN's and hopefully one of the Raspberry PI devices that turn a tor connection into a network connection, essentially meaning that I will have 8 hops rather than 3.
The data itself is rarely ever sensitive in nature.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.