sfx2000
Part of the Furniture
@Nullity - I know you're very passionate about privacy, so am I, and I think most people here are...
Getting back on thread/topic - VPN, it's a virtual private network between two points - there is no guarantee of privacy once it's leaves an exit node, that's not it's purpose - I use VPN's all the time in my day job, and I have a VPN end-point at the edge of my home network as well...
TOR - it's really all about pattern recognition, and given enough resources, the sources and sinks will be found, it's been done time and time again - to the chagrin of people that do not understand onion routing, and upstream routing/capabilites - WikiLeaks is another great example of what happens when people use the wrong tool for the job...
I'm not going to start citing specific examples, rather, I would encourage you to dig deeper yourself and understand the issue - there's a good reason why I don't use TOR, and being an experienced large scale network engineer, I have my reasons, and I'll keep them to myself, I've said enough..
Getting back on thread/topic - VPN, it's a virtual private network between two points - there is no guarantee of privacy once it's leaves an exit node, that's not it's purpose - I use VPN's all the time in my day job, and I have a VPN end-point at the edge of my home network as well...
TOR - it's really all about pattern recognition, and given enough resources, the sources and sinks will be found, it's been done time and time again - to the chagrin of people that do not understand onion routing, and upstream routing/capabilites - WikiLeaks is another great example of what happens when people use the wrong tool for the job...
I'm not going to start citing specific examples, rather, I would encourage you to dig deeper yourself and understand the issue - there's a good reason why I don't use TOR, and being an experienced large scale network engineer, I have my reasons, and I'll keep them to myself, I've said enough..