freddy's recent activity
- 
          22 votes
- 
          Private vs public surveillance: reflections on Edward Snowden’s personal record19 votes
- 
          Ghosts in the machine: the fight for privacy after death12 votes
- 
          Encryption is not a crime28 votes
- 
        Comment on Megathread: April Fools' Day 2025 on the internet in ~talk
- 
        Comment on Delete the workforce in ~techfreddy Link ParentIf you read the London Review of Books expecting a news report you may be disappointed. What they do offer, however, is the most superb review essays - and this is a pretty good example.If you read the London Review of Books expecting a news report you may be disappointed. What they do offer, however, is the most superb review essays - and this is a pretty good example. 
- 
          Delete the workforce11 votes
- 
          Privacy is also protecting the data of others25 votes
- 
          In Memoriam: Mark Klein, AT&T whistleblower who revealed US National Security Agency mass spying32 votes
- 
        Comment on Anonymity for everyone: Why you need Tor in ~techfreddy Link ParentShit, my privacy efforts must be failing /s In all seriousness, thanks for the kind words. It's always nice to see one's projects being appreciated! And don't worry, your comment didn't seem...I know who you are Shit, my privacy efforts must be failing /s In all seriousness, thanks for the kind words. It's always nice to see one's projects being appreciated! And don't worry, your comment didn't seem disparaging or dismissive at all ;P 
- 
        Comment on Anonymity for everyone: Why you need Tor in ~techfreddy Link ParentAbsolutely right - and the video mentions this! Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users)....Worth mentioning is that Tor isn't entirely bulletproof so it's worth still being cautious when using it Absolutely right - and the video mentions this! Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered Critical and High (as opposed to Medium and Low). Use a reputable VPN in addition to Tor for an extra layer of encryption. A great piece of advice that is often ignored. Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic has been done in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Privacy Guides (full disclosure: I'm a team member) has a great overview page that covers all of these points in detail. 
- 
          Anonymity for everyone: Why you need Tor16 votes
- 
          In praise of the ellipsis20 votes
- 
          No, privacy is not dead: Beware the all-or-nothing mindset47 votes
- 
          Why blog if nobody reads it?41 votes
- 
          Using Tails when your world doesn't feel safe anymore31 votes
- 
          New industries come from crazy people15 votes
- 
        Comment on Tips for increasing online privacy (without going insane)? in ~techfreddy Link ParentRather late to this but thanks for sharing the site!Rather late to this but thanks for sharing the site! 
- 
        Comment on Is the .io top level domain headed for extinction? in ~tech
- 
          Is the .io top level domain headed for extinction?14 votes
The Dangers of End-to-End Encryption