• adr1an@programming.dev
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    4 months ago

    Plus, just connecting to Tor is very much a huge exposure imho. I’d use a VPN. Now, if I’m having a VPN, probably wireguard, why would I need Tor? Some providers grant you the ability to interconnect devices under your account. So, just run the VPN on the server. This is why I love NordLynx. It’s just like tailscale.

    • deafboy@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      just connecting to Tor is very much a huge exposure imho

      Exposure of what, to whom?

      • adr1an@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 months ago

        using Tor is enough meta data if you were to use it to safeguard from some actors (e.g. state). I’m just saying from the perspective of some of the hypothetical personas as defined by Tor project itself. If it were to boil this down to me, I would rather live without the correlation attacks (e.g. ISP giving me seemingly random disconnects) and just do my casual reading on cracking on the clear-net.

        • deafboy@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 months ago

          This is not a guide to hide from the government or ISP. Just a way to tunnel to your home server without publishing the sshd for random strangers. Personally, I’d just publish the ssh and be done with it.

          I would rather live without the correlation attacks

          The more people using Tor, the less useful targeted disconnects become.