Bang on. Something is trying to update its clock.
OP, I suggest you ok that traffic, but if you want to lock it down allow *.pool.ntp.org and *.(Your country prefix).pool.ntp.org
https://tosdr.org/en exists so you can get an idea on how some orgs are blatantly lying in public statements about privacy.
They buy it from data brokers. Some governments are limited on what they can store where companies can store whatever they want as long as it is “legitimate interest”
It is worse because if you gpdr Facebook they only have to remove you from their data sets not their partners who scalp the Facebook datasets.

On my computer, I usually have KeePassXC unlocked for the entirety of being logged in.
Honestly, it sounds like you can solve the issue by only logging in when you need a password and setting the database to lock when minimised or your screen locks.
Now I know that makes using it more annoying but you can enable quick unlock so after your first login of the day you only have to use a pin or to unlock the database.

Because so many bad actors use VPNs for ban evasion or span sources, blocking the VPN endpoints from posting or commenting is a low hanging fruit way of dealing with some spam. This is Lemmy.World stance.
There are many others instances that work over VPNs so in the spirit of decentralization you can use another instance to access lemmy.world content.

Nothing. Because it discards any data returned from the click.
https://github.com/dhowe/AdNauseam/wiki/FAQ#how-does-adnauseam-click-ads

They are bound by anti money laundering laws (AML) and are required to Know Your Customers (KYC).
https://support.kraken.com/hc/en-us/articles/know-your-customer-kyc-questionnaire
Yes it does compromise privacy because now when the exchange is asked who owns this wallet they have to hand your details to law enforcement.
Exchanges without KYC are getting rarer.
In an absolute sense, yes a modem can spy on you by hijacking requests and redirecting them to controlled locations. We use TLS to prevent this, even stronger with technologies like HSTS.
Does this happen in real life though? More then you think, but less of an impact then you think.
Some US providers will hijack DNS requests and redirect them to their own DNS servers, but this can be solved with DOH or DOT.
TLS interception is a thing but it requires the device you are using (phone, PC, tablet, laptop) to have a root certificate installed that the ISP also controls. Almost all browsers will only install root certificates from root certificate providers with good standing and have no quarm in untrusing the root certificate if things go badly.
That is built for purposes vs trying to hide something.