Comment by ziddoap Comment by ziddoap 2 days ago 0 replies Copy Link View on Hacker News This over-simplification misses different threat models and situtations where a VPN is a good fit and Tor is not.