>>1020711
>-when you use VPN, you connect to VPN IP (example: 1.2.3.4), then when you connect to website, that website gets 1.2.3.4 IP. police can just check who connected to 1.2.3.4 IP on that day, it will be you and some other people. then they can use your country or useragent to identify one person (you) that connected to the website with that VPN
How would they know what country a user is from? Browser timezone settings? Besides knowing the useragent and country aren't enough to pin point one specific person, of course it might be possible with hardcore javascript fingerprinting and trackers
>-when you use VPN and open 30 different websites, you get same IP for all of them. so your actions and accounts can be easily linked. if you log into real account with that VPN you are fully identified on all websites that you visited.
Keep a separate browser (chromium) that doesn't connect to your VPN for anything linked to your real identity
-when you use VPN with normal web browser, you can be fully fingerprinted with useragent and other things
if you use Tor Browser, you are protected against fingerprinting
Harden your browser my dude
-when you use VPN and get disconnected from it, your OS could just send everything in clearnet, without notyfing you
if you use Tor, when your Tor connection is disconnected, it simply stops working, it won't leak anything in clearnet
Setup your firewall to block all non-VPN traffic for everything except the personal-use browser mentioned above
You gotta have good opsec no matter your proxy of choice, i like to use use a mix of everything, I.E Tor for IRC, 8ch, news and tor-only email, porn, VPN for piracy, steam, browsing, chromium for banking, work and the few times a year I have to use google services