diff --git a/src/chapter_4.md b/src/chapter_4.md index a5abe14..4c45385 100644 --- a/src/chapter_4.md +++ b/src/chapter_4.md @@ -94,4 +94,8 @@ For me, a VPN provider should have these characteristics: - **Jurisdiction:** It’s better if it is based in a country with strong privacy laws and outside the influence of surveillance alliances like the Five Eyes, Nine Eyes, or Fourteen Eyes. - **Regular Audits:** It should have regular security audits by independent third parties to verify the no-logs policy and the overall security of the service. -But these characteristics can vary based on the user's threat model. Not everyone cares about multi-hops and no-log policies. You should always act based on your threat model. \ No newline at end of file +But these characteristics can vary based on the user's threat model. Not everyone cares about multi-hops and no-log policies. You should always act based on your threat model. + +--- + +These were the bare minimums of privacy and security. As the book progresses, the chapters will become more technically advanced and more focused on anonymity. The next chapter will be all about encryption, as it is the building block of security in the online world. \ No newline at end of file