Update 'ips-README.md'

This commit is contained in:
r2300 2020-08-31 16:07:09 +00:00
parent 6e4f9b8b84
commit c95ef1c49c

View file

@ -14,7 +14,7 @@ As I'm sure you're aware, digital piracy of copyrighted material is illegal, to
## Ad-blocking
I make do with the ad-blocker built into the [Brave browser](https://brave.com/), but I cannot recommend enough to you [uBlock Origin](https://github.com/gorhill/uBlock), a browser extension that can block ads. Installation instructions are within the link. It is very feature rich, and so if you are only looking to block ads, do not bother with the many configurations. After installing it should be enabled by default.
I make do with the ad-blocker built into the [Brave browser](https://brave.com/), but I cannot recommend enough to you [uBlock Origin](https://github.com/gorhill/uBlock), a browser extension that can block ads. Installation instructions are within the link. It is very feature rich, and so if you are only looking to block ads, do not bother with the many configurations. After installing, it should be enabled by default.
## Sandboxes and Virtual Machines
@ -35,16 +35,16 @@ A virtual machine can run a second, virtual computer within your real computer.
## Virtual Private Networks (VPN)
From Wikipedia:
> ["A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network."](https://en.wikipedia.org/wiki/Virtual_private_network)
> ["A Virtual Private Network, or VPN is a set of technologies which are used to link computers to create a private network. Another network is used to carry the data, which is encrypted."](https://simple.wikipedia.org/wiki/Virtual_private_network)
But that's a little technical for some people. What you need to know, is that a VPN can protect your location and identity from sites and tools you use, by changing your [IP Address](https://simple.wikipedia.org/wiki/IP_address). While it sounds like a godsend, it's crucial to remember that there is no such thing as complete anonymity on the internet. Because your VPN provider can still see your data, a VPN is only as secure as it's provider is trustworthy. However despite it's insecurities, VPNs can still be helpful and even necessary in specific situations. Namely while torrenting, but more on that in the [torrenting section](). Please review [this information](https://www.privacytools.io/providers/vpn/#info) about VPNs before purchasing one or discounting them altogether.
But that's a little technical for some people. What you need to know, is that a VPN can protect your location and identity from sites and tools you use, by changing your [IP Address](https://simple.wikipedia.org/wiki/IP_address). While it sounds like a godsend, it's crucial to remember that there is no such thing as complete anonymity on the internet. Because your VPN provider can still see your data, a VPN is only as secure as it's provider is trustworthy. Despite it's insecurities, VPNs can still be helpful and even necessary in specific situations. Namely while torrenting, but more on that in my Movies and TV Piracy Guide. Please review [this information](https://www.privacytools.io/providers/vpn/#info) about VPNs before purchasing one or discounting them altogether.
If you decide a VPN would be useful for you, please purchase one. Free VPN providers are significantly more likely to dishonor no-log policies and sell your data. Refer to That One Privacy Guy's [VPN comparison chart](https://thatoneprivacysite.net/#simle-vpn-comparison) when choosing one. Once you've purchased a VPN and installed the application for it, use is usually as simple as clicking 1 button to enable it.
If you decide a VPN would be useful for you, please purchase one. Free VPN providers are significantly more likely to dishonor no-log policies and sell your data. Refer to That One Privacy Guy's [VPN comparison chart](https://thatoneprivacysite.net/#simle-vpn-comparison) when choosing one. Once you've purchased a VPN and installed the application for it, use is usually as simple as clicking 1 button to enable it. Personally, I recommend [ProtonVPN](https://protonvpn.com).
## The Onion Project (TOR)
Not to be confused with [torrenting](), Tor is a computer network that serves to keep it's users anonymous. When you browse the internet with Tor, your internet traffic is sent through 3 of Tor's computers, called Tor relays, before it reaches it's intended destination. This design ensures that no 2 of the relays know about the other, so that traffic cannot be traced back to you. Rest assured, this is a secure by design system. Issues typically only occur when it's users are careless. When used properly, Tor is an extremely rare case where near complete anonymity can be achieved. Learn more about that [here](https://www.youtube.com/watch?v=-uDYvy2jQzM).
Not to be confused with [torrenting](), Tor is a computer network that serves to keep it's users anonymous. When you browse the internet with Tor, your internet traffic is sent through 3 of Tor's computers, called Tor relays, before it reaches it's intended destination. This design ensures that no 2 of the relays know about the other, so that traffic cannot be traced back to you. Rest assured, this is a secure by design system. Issues typically only occur when it's users are careless. When used properly, Tor is an extremely rare case where near complete anonymity can be achieved. If you want to use Tor, you MUST be conscious of how to use it properly. Learn more about that [here](https://www.youtube.com/watch?v=-uDYvy2jQzM).
Tor is primarily used with the [Tor browser](https://www.torproject.org/). Please understand that when using the Tor browser, only your browser data is being encrypted. Other data sent through other apps on your device will not be encrypted with Tor. If Tor is blocked in your area, or if you don't want your internet provider to know that you're using Tor, read up on [Tor Bridges](https://tb-manual.torproject.org/bridges/) before you install Tor.
To learn more about Tor and how it works: [Myth-busting Tor](https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor).
To learn more about Tor and how it works: [Myth-busting Tor](https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor).