this post was submitted on 02 Aug 2024
897 points (97.3% liked)

linuxmemes

21207 readers
56 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] rambling_lunatic@sh.itjust.works 8 points 3 months ago (1 children)

    Librewolf for normal stuff, Tor for stuff I don't even want linked to my IP.

    [–] A_Random_Idiot@lemmy.world 8 points 3 months ago (1 children)

    Jokes on you, cause a lot of alphabet organizations set up entry and exit nodes on Tor so you're being tracked regardless.

    [–] rambling_lunatic@sh.itjust.works 8 points 3 months ago (1 children)

    Most of my Tor activity is on onionsites, so that's okay.

    Also, even given spooky nodes, the chances of getting a spooky entry and exit node are slim. Still, given the possibility, it is advisable to do spicy clearnet activities away from home with a MAC randomizer as insurance in case you win the world's worst roulette game.

    [–] linearchaos@lemmy.world 2 points 3 months ago

    I think the big problem I have with tor is that there's no way to know how compromised the network is. From a three letter agency budget, setting up 30,000 nodes wouldn't be a big deal, you just have them doing other things.

    Of course, I'm not really doing anything that would draw the ire of a three-letter agency, so even tor is overkill.

    I was also never really big on people running bad s*** through my node. I've always felt better using a paid proxy then at least claims not to log, Even if there's a half decent chance that people are watching their ingress and egress at the ISP level.