MigratingtoLemmy, (edited )
  1. Use DoT
  2. Use Librewolf
  3. TOR has been compromised, use it sparingly.

Understand the fight. We have three major pipelines for leakage of inferences/data on the internet:

  1. IP
  2. Metadata
  3. Content we produce
  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #