this post was submitted on 02 Aug 2024
900 points (97.4% liked)

linuxmemes

20880 readers
16 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 3 months ago (1 children)

Librewolf for normal stuff, Tor for stuff I don't even want linked to my IP.

[–] [email protected] 8 points 3 months ago (1 children)

Jokes on you, cause a lot of alphabet organizations set up entry and exit nodes on Tor so you're being tracked regardless.

[–] [email protected] 8 points 3 months ago (1 children)

Most of my Tor activity is on onionsites, so that's okay.

Also, even given spooky nodes, the chances of getting a spooky entry and exit node are slim. Still, given the possibility, it is advisable to do spicy clearnet activities away from home with a MAC randomizer as insurance in case you win the world's worst roulette game.

[–] [email protected] 3 points 3 months ago

I think the big problem I have with tor is that there's no way to know how compromised the network is. From a three letter agency budget, setting up 30,000 nodes wouldn't be a big deal, you just have them doing other things.

Of course, I'm not really doing anything that would draw the ire of a three-letter agency, so even tor is overkill.

I was also never really big on people running bad s*** through my node. I've always felt better using a paid proxy then at least claims not to log, Even if there's a half decent chance that people are watching their ingress and egress at the ISP level.