A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 57 users / day
- 383 users / week
- 1.5K users / month
- 5.7K users / 6 months
- 1 subscriber
- 3.13K Posts
- 78.3K Comments
- Modlog
Maybe if you can to through 2 VPN servers?
Like ProtonVPN and their “Secure Core” feature where it goes to first a VPN server in a country with higher privacy protections (like Switzerland, Iceland, etc.), then it goes to any location of your choice, I like to pick US, Canada, or UK, so websites always appear in English.
Its much harder to unmask a Secure Core connections with Switzerland --> United States, for example.
(Not sponsored, and other providers may also have such a feature)
Or you could just use Tor.
NSA also runs Tor nodes.
Every time you connect to tor, you are rolling the dice on 3 random nodes.
If you use Tor frequently, you’ll eventually end up with 3 NSA run nodes, it may take a week, it may take months, but it will eventually happen.
Edit: I use tor tho, I just also run a VPN at the same time, in case I get unlucky and roll 3 NSA nodes.
Many people run Tor nodes. I also used to run exits until dealing with complaints became onerous, then I ran middlemen for many years. In general one should only pipe encrypted traffic through Tor, and be it just for malicious exits which sniff and tamper with your traffic. There are use cases for using Tor together with a VPN tunnel, but these need careful consideration.