scytale
link
fedilink
58d

I think you need to step back and review your threat model. Grab a pen and paper or open a spreadsheet. List all the tech you use for various things. Then determine what threats you are protecting yourself from for each. Try to use a scoring system to rank importance/criticality and convenience. Then try to find the balance, which ones you’re willing to sacrifice convenience for and ones you are willing to compromise. Then take action one by one.

Create a post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

much thanks to @gary_host_laptop for the logo design :)

  • 0 users online
  • 124 users / day
  • 1.05K users / week
  • 1.3K users / month
  • 4.58K users / 6 months
  • 1 subscriber
  • 4.19K Posts
  • 106K Comments
  • Modlog