


Some of the aspects of Bill C-51 include Internet censorship. Look up local providers in your area, and figure out what you need, and what works best for you for obvious reasons. It gives you the freedom to use your device where you want to, how you want to. However, this helps you take more control of how you use your devices and what is shared on the internet. Where it might be changes every couple of hours or days, but it never remains the same.ĭisconnecting from wifi means you're running on your own data, which costs more. All of this is because, when you use a VPN, it masks your device's location so that it shows from another location. Case in point, the other day I was receiving ads in Italian. Some sites straight up won't work because they require your device's personal information to run. Your device's internet isn't going to be as fast. However, if you're connected to a cell tower in the area, of which thousands upon thousands of people are talking through, it's harder to pin you down. When you're connected to your personal Wifi, someone can see that you're the only one connected to your wifi, and can see that you're using a vpn. One of the ways a vpn like this works is similar to getting lost in a crowd. When Orbot is running, disconnect yourself from Wifi. Just to be clear, a VPN isn't going to protect you from everything, but it adds another layer of protection from those who are seeking you out. But, also, you have to worth it, it can take many hours to go through stuff just to find one thing (if you do stuff correctly) or cost a lot for a single exploit.It's a free VPN ran by volunteers and software nerds. Because they sit down and look for anywhere you fucked up and gave an email address with your real name or in some case because they use exploits. So you request something, it goes to the ISP to the VPN and too wherever it goes, then back to the VPN then back to the ISP then back to your house.įor the FBI/Police to be able to track you through Tor, they need to have been able to see the traffic going through them, or the nodes need to have kept logs, which they could then get.īut yea, if they wanted to, they will get you. Your question about pwning nodes, while possible, requires an exploit (or even multiple), and running that exploit, either in real time, or on 6000+ computers.Ī note on the VPN, since your lines don't make sense: It sits in-between the ISP and Entry Node, or ISP and X. You seem to be unaware of the fact that all Tor nodes are listed publicly, so no, it wouldn't take a long time to find all the nodes, it would take less than a minute.

But it probably isn't important for the other things. If you want to know more TLS and DH key exchange are what you want to look at.

For Tor, DNS is done by just sending it to an exit node, and then the exit node is expected to deal with it. Here's just a dump of stuff/answers I made while watching your video.
