• qprimed@lemmy.ml
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      1 month ago

      randomized MACs on public WiFi, burner email addresses and Tor are the new fortress phones.

      “fortress phone”. I’m old. :(

      • Railcar8095@lemm.ee
        link
        fedilink
        arrow-up
        2
        ·
        1 month ago

        Can’t Tor usage be identified? The encryption pattern, connection to known entry points…?

        My thread model doesn’t need For, but I’m not sure if it’s enough against being singled out by a state actor.

        I’m even wondering if to attempt privacy isn’t going to be an issue if things get worse.

        • jagged_circle@feddit.nl
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          3
          ·
          edit-2
          1 month ago

          No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.

          Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.

          • Railcar8095@lemm.ee
            link
            fedilink
            arrow-up
            5
            ·
            1 month ago

            No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.

            I haven’t said anything about it’s security, so I’m not “spreading misinformation”

            Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.

            Glad you went back and added an edit to agree with what I said. I would have removed the unnecessary abrasive first paragraph too, but it’s a step in the right direction.