freddy's recent activity
-
26 votes
-
Comment on Megathread: April Fools' Day 2025 on the internet in ~talk
-
Comment on Delete the workforce in ~tech
freddy If you read the London Review of Books expecting a news report you may be disappointed. What they do offer, however, is the most superb review essays - and this is a pretty good example.If you read the London Review of Books expecting a news report you may be disappointed. What they do offer, however, is the most superb review essays - and this is a pretty good example.
-
Delete the workforce
11 votes -
Privacy is also protecting the data of others
25 votes -
In Memoriam: Mark Klein, AT&T whistleblower who revealed US National Security Agency mass spying
32 votes -
Comment on Anonymity for everyone: Why you need Tor in ~tech
freddy Shit, my privacy efforts must be failing /s In all seriousness, thanks for the kind words. It's always nice to see one's projects being appreciated! And don't worry, your comment didn't seem...I know who you are
Shit, my privacy efforts must be failing /s
In all seriousness, thanks for the kind words. It's always nice to see one's projects being appreciated! And don't worry, your comment didn't seem disparaging or dismissive at all ;P
-
Comment on Anonymity for everyone: Why you need Tor in ~tech
freddy Absolutely right - and the video mentions this! Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users)....Worth mentioning is that Tor isn't entirely bulletproof so it's worth still being cautious when using it
Absolutely right - and the video mentions this! Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered Critical and High (as opposed to Medium and Low).
Use a reputable VPN in addition to Tor for an extra layer of encryption.
A great piece of advice that is often ignored. Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic has been done in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions.
Privacy Guides (full disclosure: I'm a team member) has a great overview page that covers all of these points in detail.
-
Anonymity for everyone: Why you need Tor
16 votes -
In praise of the ellipsis
20 votes -
No, privacy is not dead: Beware the all-or-nothing mindset
47 votes -
Why blog if nobody reads it?
41 votes -
Using Tails when your world doesn't feel safe anymore
31 votes -
Do you need a VPN?
13 votes -
New industries come from crazy people
15 votes -
Comment on Tips for increasing online privacy (without going insane)? in ~tech
freddy Rather late to this but thanks for sharing the site!Rather late to this but thanks for sharing the site!
-
Comment on Is the .io top level domain headed for extinction? in ~tech
-
Is the .io top level domain headed for extinction?
14 votes -
When the mismanagerial class destroys great companies
21 votes -
The attempt to reform Intel
8 votes
The Dangers of End-to-End Encryption