diff --git a/pages/providers/vpn.html b/pages/providers/vpn.html index e6fc0517..0bb0a082 100644 --- a/pages/providers/vpn.html +++ b/pages/providers/vpn.html @@ -146,7 +146,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
The answer to this question is also the not very helpful it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
-However you shouldn't use encrypted DNS with Tor as that would put all your DNS queries through a single circuit instead of separating them to different exit nodes and thus allowing the encrypted DNS provider to deanonymize you.
+However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.