https://tosdr.org/en exists so you can get an idea on how some orgs are blatantly lying in public statements about privacy.
They buy it from data brokers. Some governments are limited on what they can store where companies can store whatever they want as long as it is “legitimate interest”
It is worse because if you gpdr Facebook they only have to remove you from their data sets not their partners who scalp the Facebook datasets.

On my computer, I usually have KeePassXC unlocked for the entirety of being logged in.
Honestly, it sounds like you can solve the issue by only logging in when you need a password and setting the database to lock when minimised or your screen locks.
Now I know that makes using it more annoying but you can enable quick unlock so after your first login of the day you only have to use a pin or to unlock the database.

Because so many bad actors use VPNs for ban evasion or span sources, blocking the VPN endpoints from posting or commenting is a low hanging fruit way of dealing with some spam. This is Lemmy.World stance.
There are many others instances that work over VPNs so in the spirit of decentralization you can use another instance to access lemmy.world content.

Nothing. Because it discards any data returned from the click.
https://github.com/dhowe/AdNauseam/wiki/FAQ#how-does-adnauseam-click-ads

They are bound by anti money laundering laws (AML) and are required to Know Your Customers (KYC).
https://support.kraken.com/hc/en-us/articles/know-your-customer-kyc-questionnaire
Yes it does compromise privacy because now when the exchange is asked who owns this wallet they have to hand your details to law enforcement.
Exchanges without KYC are getting rarer.
In an absolute sense, yes a modem can spy on you by hijacking requests and redirecting them to controlled locations. We use TLS to prevent this, even stronger with technologies like HSTS.
Does this happen in real life though? More then you think, but less of an impact then you think.
Some US providers will hijack DNS requests and redirect them to their own DNS servers, but this can be solved with DOH or DOT.
TLS interception is a thing but it requires the device you are using (phone, PC, tablet, laptop) to have a root certificate installed that the ISP also controls. Almost all browsers will only install root certificates from root certificate providers with good standing and have no quarm in untrusing the root certificate if things go badly.

How will they enforce it? I’m sure big/medium businesses will comply, but how can you track a cash transaction between private citizens?
Because that is not the point of the laws.
Infact the NL implementation of the laws specifically says it is for business to business and business to consumer.
There is no mention of private transactions.
This whole article is an advert for this companies own new secure messenger because…
Why Would We Stop Using Signal?
We had a security breach of some root keys for a legacy chat server we were running and it got attacked and destroyed. It was too hard to restore after the attack and was abandoned. We tracked down the data leak to Signal, as the engineers had used Signal to send these keys between themselves.
Human error. Why are you allowing private keys on untrusted devices?
About the same.
Mobile networks have their own security problems that wifi doesn’t, but wifi has security problems that mobile networks don’t.
Using a VPN does help secure your “last mile” connection but then you need to trust the VPN provider.