JoeKrogan, 8 months ago I would instead recommend running a tor relay or i2p node. That way you have encrypted traffic and are helping others and further legitimizing privacy by its everyday use
I would instead recommend running a tor relay or i2p node. That way you have encrypted traffic and are helping others and further legitimizing privacy by its everyday use