From e1a868134278742b49e42191c6c318759c11ee19 Mon Sep 17 00:00:00 2001 From: mfwmyfacewhen <94880365+mfwmyfacewhen@users.noreply.github.com> Date: Tue, 16 May 2023 23:29:21 -0500 Subject: [PATCH] cannot to can't --- docs/basics/vpn-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/basics/vpn-overview.md b/docs/basics/vpn-overview.md index fd418bc6..1f3d7ed8 100644 --- a/docs/basics/vpn-overview.md +++ b/docs/basics/vpn-overview.md @@ -25,7 +25,7 @@ An ISP can see the flow of internet traffic entering and exiting your network te They usually can't see the content of your traffic since encryption protocols such as HTTPS are commonly used on the internet, but they can see the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). A VPN will prevent your ISP from seeing what domains you connect to, although the VPN provider is still able to see all your traffic. -==VPNs cannot encrypt data outside of the connection between your device and the VPN server.== VPN providers can see and modify your traffic the same way your ISP could. And there is no way to verify a VPN provider's "no logging" policies in any way. +==VPNs can't encrypt data outside of the connection between your device and the VPN server.== VPN providers can see and modify your traffic the same way your ISP could. And there is no way to verify a VPN provider's "no logging" policies in any way. ### Hiding your IP address from third parties @@ -49,7 +49,7 @@ Doing so may trigger spam and fraud detection systems, such as if you were to lo ### For anonymity -VPNs can't provide anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data. Use [Tor](https://www.torproject.org/) instead. +VPNs can't provide anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You can't rely on "no logging" policies to protect your data. Use [Tor](https://www.torproject.org/) instead. ### For E2EE