most or all of Tor’s vulnerabilities don’t come from Tor itself, but the browser, allowing malicious Tor services or malware on the system to get the browser to unintentionally leak its real ip. this is solved easily by using something like tails or whonix.
https://www.cvedetails.com/vulnerability-list/vendor_id-12287/product_id-23219/Torproject-TOR.html
vulnerabilities in the Tor network itself (not browser) have only usually caused denial of service attacks, which does not de-anonymize you, and most of the targets were hidden services.
the article repeatedly states the US government has requested loopholes in the Tor network letting them de-anonymize users at will. this is simply not true, there have been very few cases of people being de-anonymized within just the Tor network by law enforcement. 99% of the time it’s bad opsec or browser vulnerabilites. DPR (silk road) was caught because of basic mistakes he made in preserving his anonymity, not because of the Tor network. He literally ran a Tor hidden service, which is less secure than being just a Tor user, and yet the fbi had to still follow a complicated paper trail of DPR slowly revealing his own identity in forums and practising poor opsec. Also adding to this, there are CIA agents who use Tor to hide themselves, kinda dumb to do that if there are known loopholes or backdoors as those are attack surface. also, Tor nodes are run by volunteers, and the code is open for you to read. here’s a video from DEFCON for more information:
https://www.youtube.com/watch?v=eQ2OZKitRwc
Edward Snowden, who’s still wanted by the United States for leaking classified information from the NSA, used Tor to stay anonymous and was never caught. the NSA, let me repeat, which your article states can apparently can track Tor users at will. If there was a backdoor/loophole, he’d probably be in prison by now.
more info about good opsec when using Tor: https://www.whonix.org/wiki/Tips_on_Remaining_Anonymous#Keep_Anonymity_Modes_separate
as for ISPs knowing you use Tor, there are tor bridges for a reason.
Tor and VPNs have different use cases. Tor doesn’t need an account, there’s no unique identifiers between sessions. (if used right)
the article you cited is written by someone who has never looked at the source code or even read the tor spec. funny thing is, the article calls out everyone for spreading misinformation, yet the site has previously been known to do that itself. ABOUT PROTON VPN TOO HAHAHA
reddit.com/r/ProtonVPN/comments/70wnr6/restoreprivacycom_followup
The “leaked emails” in the article are taken out of context: https://blog.erratasec.com/2018/03/askrob-does-tor-let-government-peek-at.html
the only way to identify Tor users on the network is by doing traffic analysis over entry and exit nodes, which requires a lot of resources as you need to be recording all or most of the internet’s traffic. the NSA might be able to do this (a possibility) but they most likely only do for extreme cases due to the high cost+resources required. NOTE that VPNs are also vulnerable to traffic analysis attacks. a couple of good reads about these type of attacks and how it affects Tor:
https://core.ac.uk/download/pdf/4271895.pdf
https://css.csail.mit.edu/6.858/2023/readings/tor-traffic-analysis.pdf
there’s nothing wrong with using Tor standalone in most cases. use bridges if your ISP blocks Tor, and a VPN before Tor if bridges don’t work as well. (Rare)
in a lot of countries which use Deep Packet Inspection for censorship, ISPs may flag VPN traffic much more easily than a Tor connection through a bridge using obfs4 or meek-azure.
conclusion: use actual vulnerability trackers, research papers , and your own testing to conclude if a service/software is secure or not. don’t blindly trust blog posts. im not saying the tor network is 100% secure, no network/service is. both VPNs and Tor have their benefits/drawbacks/risks. everyone has to analyse their own threat model and decide which tools are best for their situation.
Never trust anyone that doesn’t understand how Tor works to tell you how to use Tor.
i don’t think i’m the one who doesn’t understand how Tor works. you’re the one giving false information and bad advice while citing unreliable and unprofessional sources.