you are viewing a single comment's thread.

view the rest of the comments →

[–]thefirststoneThat's my purse! I don't know you! 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (5 children)

  • Don't trust anyone with private details. This used to be standard practice, but the advertising-government complex benefits from forthcoming comsumers.

  • Don't use the same name at different places. When one gets leaked, it doesn't need taint the rest.

  • Don't use closed services at all, especially those known for ideological leaks, like Discord. You can't trust them, and they hate you. Just don't use it.

[–][deleted]  (4 children)

[deleted]

    [–]thefirststoneThat's my purse! I don't know you! 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (3 children)

    Use free email addresses, access them the same way you access the site -- like vpn or tor or public hotspot -- so you don't get them any extra info on you.

    By closed service, I mean something running closed-source code nobody can audit and nobody can run themselves. There's no point when distributed and self-hosted services exist, or in the case of chat pre-date all this Slack and Discord shit. Don't put your thoughts and friends in hostile hands.

    [–][deleted]  (2 children)

    [deleted]

      [–]thefirststoneThat's my purse! I don't know you! 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

      It depends. With VPNs, you trust providers not to collect all your connection meta data, attached to your payment method. There's no way to prove they or their data centers don't do that.

      With Tor, every exit node is untrustworthy, but you don't tend to use the same ones in the same sites over time. Encrypted connections, which is almost all of them, are mostly good enough to keep exit nodes from tampering or listening in. But more sites block Tor than VPNs, so it can be more difficult to use.

      Neither protects you from state agencies, or anybody who can MITM encrypted connections by compromised certificate authority certificates. Both can protect from your ISP snooping.

      "Safe" depends on your threat model. Mostly, volunteering information is where people get in trouble.

      [–]Girondin 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

      You can use both VPN over Tor. You connect your PC to a VPN and then you use the tor browser.