Even with a VPN, you are revealing your IP to your VPN provider.
Discussion
Yeah, some VPNs are just IP snoops. 😁
Single point of failure. I'd trust nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3vamnwvaz7tmzv4mx7tnwdaehgu339e3k7mf0qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcqyp7vx29q3hdj4l0elxl800hlfjp538le09epsf7k9zj59ue2y37quz59hlu and nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcprpmhxue69uhkxun9v968ytnwdaehgu3wwa5kuef0qyvhwumn8ghj7am9d33k7mt99ehx7um5wgh8w6twv5hsqgpass40an279ylj3dnz0yehqj3lhr8p2w4fr4us4vgldf6j639y95pykz24 over a VPN, so that's who I tunnel through.
Even with tor your revealing your IP to an entry node. Correct, the cycle does not end. No one can send you mail without knowing your home address. You could argue post office boxes, but that requires physical isolation, in that case find a place with free wifi to connect to I suppose.
Best bet so far is to run your own relay and strip the forwarding data.
I suppose to include here, you are often nost just trusting the relay hoster, but often CloudFlare for observing your plaintext traffic, IPs, and so on, or whatever datacenter/hosting provider the relay owner is using as well. I can't imagine most relay owners are hosting their relays from their home networks.
These are often American or European companies, and therefore less likely to be a threat to me, personally, than individual nutjobs.
Pick your poison.
I think mobile internet NAT stands the best scrutiny here. Probably a majority of users anyway.