No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.
I haven’t said anything about it’s security, so I’m not “spreading misinformation”
Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.
Glad you went back and added an edit to agree with what I said. I would have removed the unnecessary abrasive first paragraph too, but it’s a step in the right direction.
Odds are you’re on a watchlist for using Lemmy
Definitely if you’re on a .ml address.
randomized MACs on public WiFi, burner email addresses and Tor are the new fortress phones.
“fortress phone”. I’m old. :(
Use Tor.
Can’t Tor usage be identified? The encryption pattern, connection to known entry points…?
My thread model doesn’t need For, but I’m not sure if it’s enough against being singled out by a state actor.
I’m even wondering if to attempt privacy isn’t going to be an issue if things get worse.
No, it can’t. Dont spread misinformation. Tor is extremely secure, when used properly. TAILS helps.
Edit: they can see that you’re using tor. They can’t see your traffic or who you’re communicating with.
I haven’t said anything about it’s security, so I’m not “spreading misinformation”
Glad you went back and added an edit to agree with what I said. I would have removed the unnecessary abrasive first paragraph too, but it’s a step in the right direction.