Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Normal
When you're not flagged you are part of a sea of people looking and posting about grey area stuff, everything is hearsay, the internet is literally awash with it. When you regularly use tor you are hiding something and regular tor ip's get flagged and put on watch lists. Most legitimate users who want confidentiality will use end to end encryption rather than encrypted networks, with a few exceptions. Computing and security is my field. I'm just trying to explain it as best as I can without repeating myself too many times.For basic internet usage a VPN with any browser will protect your privacy more than enough as it will stop metadata logging (as long as your VPN doesn't log). You only need to use tor if you are exposing yourself to additional risks online.
When you're not flagged you are part of a sea of people looking and posting about grey area stuff, everything is hearsay, the internet is literally awash with it. When you regularly use tor you are hiding something and regular tor ip's get flagged and put on watch lists. Most legitimate users who want confidentiality will use end to end encryption rather than encrypted networks, with a few exceptions. Computing and security is my field. I'm just trying to explain it as best as I can without repeating myself too many times.
For basic internet usage a VPN with any browser will protect your privacy more than enough as it will stop metadata logging (as long as your VPN doesn't log). You only need to use tor if you are exposing yourself to additional risks online.