• qprimed@lemmy.ml
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      5 days ago

      randomized MACs on public WiFi, burner email addresses and Tor are the new fortress phones.

      “fortress phone”. I’m old. :(

      • Railcar8095@lemm.ee
        link
        fedilink
        arrow-up
        2
        ·
        5 days ago

        Can’t Tor usage be identified? The encryption pattern, connection to known entry points…?

        My thread model doesn’t need For, but I’m not sure if it’s enough against being singled out by a state actor.

        I’m even wondering if to attempt privacy isn’t going to be an issue if things get worse.

        • jagged_circle@feddit.nl
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          3
          ·
          edit-2
          4 days ago

          No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.

          Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.

          • Railcar8095@lemm.ee
            link
            fedilink
            arrow-up
            5
            ·
            4 days ago

            No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.

            I haven’t said anything about it’s security, so I’m not “spreading misinformation”

            Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.

            Glad you went back and added an edit to agree with what I said. I would have removed the unnecessary abrasive first paragraph too, but it’s a step in the right direction.