09-09-2018, 12:19 PM
(09-08-2018, 06:28 PM)Tyler Wrote: TOR has been compromised in the past so saying you trust it is funny.
VestaCP has also been compromised at one time, so has Google and Yahoo. Doesn't make them less good - just compromised. It goes with the territory.
I'm in agreement with @Golden. TOR for me is a good alternative, particularly since it seems to be legal in the UAE whereas VPN is blocked and illegal. Apparently there is a difference between TOR and a VPN. I'm still trying to wrap my brain cells around the difference but how I understand it and the reason why VPN is not liked in the UAE is that the VPN connections pass through another server where the Administrator of that server can see absolutely everything you're doing, but the Administrator of your ISP can see you're connected but not more than that. So hence why one should be careful what VPN one is using. It's a great way for an iffy VPN administrator to get access of what you're doing.
With TOR there isn't a server involved. Best description of how it is different from VPN I found in the discussion below:
Quote:With the onion routing of TOR there isn't a single server who knows who you are and who you are talking to. Each node knows where it got traffic from and where it sent that traffic, but that doesn't mean it knows where the ultimate source or ultimate destination is (only the entry node knows the original source [but it doesn't know it knows this], only the exit note knows the ultimate destination, and neither of them knows who the other one is, because they only talk through a third relay node). Because it's decentralized, there's no single point of failure who can identify you and what you're doing.Source: https://security.stackexchange.com/quest...er-and-vpn