1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-20 05:29:16 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-11-13 00:45:27 +00:00
parent 319acecace
commit 395ff53610
59 changed files with 3285 additions and 4 deletions

View File

@@ -25,7 +25,7 @@ Connecting directly to Tor will make your connection stand out to any local netw
Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like:
- [x] You → VPN → Tor → Internet
- [x] Tu → VPN → Tor → Internet
From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you.
@@ -35,9 +35,9 @@ This is **not** censorship circumvention advice, because if Tor is blocked entir
We **very strongly discourage** combining Tor with a VPN in any other manner. Do not configure your connection in a way which resembles any of the following:
- You → Tor → VPN → Internet
- You → VPN → Tor → VPN → Internet
- Any other configuration
- Tu → Tor → VPN → Internet
- Tu → VPN → Tor → VPN → Internet
- Qualsiasi altra configurazione
Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity.