VPN is traceable. Even “no log” VPNs. To remain truly anonymous you need to use TOR, configured correctly, using an amnesiac OS, and practicing OPSEC to safeguard against social engineering and profile building.
TOR WAS a DOD project. Currently it is open source and funded by a non profit. Many security conscious people are constantly analyzing the code and identifying threats.
Simply using a VPN does not effectively conceal your identity, regardless of physical server location.
The next step is to seize .win servers and identify the “terrorists” who post memes about dear leader. This is not hyperbole.
VPN is traceable. Even “no log” VPNs. To remain truly anonymous you need to use TOR, configured correctly, using an amnesiac OS, and practicing OPSEC to safeguard against social engineering and profile building.
TOR WAS a DOD project. Currently it is open source and funded by a non profit. Many security conscious people are constantly analyzing the code and identifying threats.
Simply using a VPN does not effectively conceal your identity, regardless of physical server location.