1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-09-13 12:49:07 +00:00
parent 2686141c29
commit 7bcb38a578

View File

@ -41,15 +41,15 @@ Needless to say, **you shouldn't use encrypted DNS with Tor**. This would direct
## Devo usar Tor *e* uma VPN?
By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides zero additional benefits to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. [Read more about Tor bridges and why using a VPN is not necessary](../advanced/tor-overview.md).
Ao usar uma VPN com Tor, você cria essencialmente um node de entrada permanente, geralmente com um rastro de dinheiro anexado. Isso não oferece nenhum benefício adicional para você, enquanto aumenta drasticamente a superfície de ataque da sua conexão. Se você deseja ocultar o uso do Tor do seu ISP ou do governo, o Tor tem uma solução integrada para isso: Tor bridges. [Leia mais sobre Tor bridges e por que não é necessário usar uma VPN](../advanced/tor-overview.md).
## E se eu precisar de anonimato?
As VPNs não podem fornecer anonimato. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data. Use [Tor](https://www.torproject.org/) em vez disso.
As VPNs não podem fornecer anonimato. Seu provedor de VPN ainda verá seu endereço IP real e geralmente possui um rastro de dinheiro que pode ser vinculado diretamente a você. Você não pode confiar em políticas de “no logging para proteger seus dados. Use [Tor](https://www.torproject.org/) em vez disso.
## E os provedores de VPN que fornecem nós Tor?
Não use esse recurso. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
Não use esse recurso. O objetivo de usar o Tor é que você não confia no seu provedor de VPN. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.