-
Notifications
You must be signed in to change notification settings - Fork 0
FAQ
This page addresses frequently asked questions about Gatepath and its design decisions.
No. Tor Browser provides application-level hardening and fingerprinting resistance. Gatepath provides network-layer transport only.
No. Gatepath does not provide anonymity guarantees. It provides encrypted transport and explicit routing options.
No. Tor usage is always explicit. Traffic is never routed through Tor without user intent.
Neither. Gatepath does not transparently chain Tor and VPN. Tor usage is explicit and application-scoped.
Transparent proxying can obscure routing intent and increase the risk of mixed traffic flows.
Gatepath prioritizes explicit behavior over convenience.
Traffic is blocked. Tor-only paths fail closed by design.
Gatepath does not inspect traffic contents. Operational logging is limited and documented separately.
No. Browser fingerprinting and tracking are application-level concerns.