Chains of anonymization
D2W_OS developers have developed 4 types of anonymity chains. To hide your real IP address from websites and ISP.
-
Client → TOR → VPN → Internet
-
Client → VPN → TOR → Internet
-
Client → TOR → Internet
-
Client → VPN → Internet
Your internet connection will match the selected circuit
Client → TOR → VPN → Internet
The Client → Tor → VPN → Internet chain is used when it is important to hide the TOR exit node from the site. For example, some sites either do not allow users with Tor's output IP or torment the user with an endless captcha.
Pros:
-
Strong chain of anonymity
-
The site sees the IP of the VPN server, not the TOR exit node
Minuses:
- The provider sees that the user is connecting to TOR
*Recommendations: use a VPN up to the chain additionally. For example, built into the router.
Client → VPN → TOR → Internet
The Client-VPN-Tor circuit is used when the fact of entering an encrypted connection needs to be hidden from the ISP. The network is easily controlled by the user at the entrance, which allows you to connect KillSwitch and not allow traffic to leave the user's device
Pros:
-
Strong chain of anonymity
-
The provider does not see the fact of entering TOR
Minuses:
- The site sees TOR usage. Most sites just won't let the user in
*Recommendations: in order for the target site to give access and not see the fact of using TOR on the exit, we recommend connecting a proxy
Client → TOR → Internet
Tor (literally "onion router") Tor has layers of privacy similar to the layers of an onion, hence its name. The more Tor users that use these servers, the more hidden your traffic becomes. These levels of protection are created by a labyrinth of intermediate relays (middle relay), end relays (end relay) and bridges (bridge).
Pros:
-
Secures your privacy
-
Tor protects your privacy by not exposing your IP address to the sites you visit.
-
Whether you need to do illegal work or just someone who loves security, using TOR keeps your privacy SAFE!
-
The distributed network eliminates the possibility of network attacks and ensures high data security.
Minuses:
-
Low speed. Since traffic passes through many relays, you can often see a delay in displaying content. In particular, photos and videos may have problems loading. The more users that do not host a relay, the slower the entire chain runs.
-
Block web services. Many major web services block access to Tor. When you visit such sites, they return an error message, for example, 404. Others allow access, but include a whole labyrinth of captchas (CAPTCHA) on the site, in which you must enter a verification code.
Client → VPN → Internet
VPN technology (virtual private network, from the English. Virtual Private Network) will not only allow you to access blocked content, but also protect you and your Internet connection.
Pros:
- Your personal traffic is encrypted and transmitted securely over the internet. This will protect you from many online threats. If you use a VPN service, it becomes extremely difficult for hackers to gain access to your data and correspondence. Using VPN services, you can access geo-blocked content.
Minuses:
- If the VPN service is configured incorrectly, DNS and IP address leaks can occur, which can be used for criminal purposes by hackers. Using a VPN as the only link in the network is not safe. We recommend that you use more complex chains. There are many security protocols available today, and you may not know for sure which one is the best.