>>903173
>VPN provider can match the traffic flowing through its nodes, how is it any better than Tor?
For starters its a private company and not funded by the US of A. Two, you would pay a legit looking company who says that they aren't going to log you and take a look at their past history when responding to court cases against them. Three, all of your information is hidden from your ISP who could be using it against you. Like they don't want torrenting and say they will disable your service. Buying a vpn is basically paying a group of people money so they watch what you do instead of your ISP with the hope they ignore anything/everything you do.
The US government can get track you down, identify your data, MiTM, etc if only they wanted you enough for some reason. Buying drugs is not one of those reasons. Looking up CP is one of those reasons, within reasons. If you make it easy for them to catch you with CP they'll fucking catch you. Otherwise don't expect them to bother much. Buying drugs off of a darknet is nothing special and you don't have anything to worry about if you can rub two braincells together and have opsec.
Now comparing it to Tor....
Tor is a free service, open to a lot of people, has been proven to be easy to find out where someone is by owning nodes and other shit.
Very different from you being an important, paying, customer who votes with their money to just another shazbot who is using a program funded by the government that you're trying to hide from. VPN services care about having customers, if they get a bad rep by selling people out to the feds then they will have less money coming in from people.
The NSA and other government organizations have a ton of server that they can use to de-anon people in Tor. Studies posted all around this place from time to time and you can just google it yourself.
Tor, if anything, is a placebo.
You need to be smart, research shit on your own and stop relying on people to teach you everything. Choose carefully and use the chunk of gray matter between your ears to figure out what software you want to work with based upon your threat model.
>>906746
Stop being a retard who needs spoon-feeding.