A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 108 users / day
- 435 users / week
- 1.32K users / month
- 4.54K users / 6 months
- 1 subscriber
- 4.38K Posts
- 111K Comments
- Modlog
Did you also register your account with a unique name and email?
privacy is measured in vaginas, not penises!
Deeper you go, darker it gets.
i agree
Do not buy the iPhone, your penis will shrink.
Pretty small if you have to ask. Privacy isn’t all or nothing. Depends on your threat model too. If you want an iPhone go buy one.
Fine choices and nothing wrong unless there’s someone actively out to get you. In that using TOR as VPN leaves a very distinct fingerprint compared to the vast majority of Tor users on the standardized Tor Browser.
Unfortunately, the post radiates small 🍆 energy.
VPN first is fine if you don’t want your ISP and your nation state to know you use Tor.
removed by mod
Easy, don’t use digital technology and live in a shack in the middle of Bir Tawil. That’s the exact attitude Apple, Google, et al. want people to have.
Privacy is not a game of absolutes. You make a threat model and do the best you reasonably can. I hope you at least enjoyed your head start on privacy by choosing GrapheneOS.
This is quite an astute observation and one that I struggle with. I have taken the path of running my home office network like a full blown enterprise network, only scaled down a bit. I’ve had a computer in front of me since the mid 70s. If we likened my knowledge base to a 25’ tape measure, I possess about a 1/4 " of knowledge on the topic, but that leaves soooo much I don’t know. The further down the rabbit hole you go, the more you understand that, realistically speaking, the only truly safe network is one that is turned off. So you have to make concessions. Is Scenario #6 something that I can 100% control? If not, then you plug and patch what you can, and monitor the rest, and that’s the best that can be done for Scenario #6. This drives me crazy because I think, can I not mitigate Scenario #6 because I lack 24’ 11 3/4" of knowledge, or that it’s just one of those things that you just have to do what you can with what you have, and monitor the rest.
It is never safe to trust any network. And running a tight ship is a lot of work.