JoeKrogan, 1 year ago I would instead recommend running a tor relay or i2p node. That way you have encrypted traffic and are helping others and further legitimizing privacy by its everyday use
I would instead recommend running a tor relay or i2p node. That way you have encrypted traffic and are helping others and further legitimizing privacy by its everyday use