

So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.
Amen. It’s like they think that somehow it is better to only encounter the world when you are in college and alone.
“If I see you on the street, I’ll shoot you.”
Character, space, space, space, space, space, space, space, character, space, space, space, space, space, space, space, space, space, character, ENTER.
Just like your grandpappy used to do.
Of all the red lines we’ve crossed so far, this one almost feels like small beans. The standard has gotten very out of whack in a very short time.
You joke, but we already know that simply using Linux gets you on an NSA watch list.
https://www.eweek.com/security/linux-lands-on-nsa-watch-list/
Searching for R34 is on you. Naming something R34 is on Nissan. The popularity of R34 is on all of us.
You are correct, they have infiltrated exit nodes, but it is still one of the most secure privacy tools available. If you are Al Quaeda, don’t use tor. If you are an average person preserving their privacy or subverting censorship, use tor.