Comment by ziddoap Comment by ziddoap 5 months ago 0 replies Copy Link View on Hacker News This over-simplification misses different threat models and situtations where a VPN is a good fit and Tor is not.