104
submitted 15 hours ago by KarnaSubarna@lemmy.ml to c/privacy@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] autonomoususer@lemmy.world 8 points 14 hours ago

What else you going to use?

[-] Prunebutt@slrpnk.net 22 points 13 hours ago

I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.

[-] HelixDab2@lemm.ee 1 points 1 hour ago

I've tried to use it, but have not managed to get it to work. Which is a bummer.

I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn't working correctly.

[-] Prunebutt@slrpnk.net 1 points 33 minutes ago

Remember that you need to let the server run for a bit, so it can establish , the routes.

I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.

[-] ShortN0te@lemmy.ml 8 points 12 hours ago

AFAIK it only makes it harder not impossible.

[-] Prunebutt@slrpnk.net 1 points 5 hours ago

At least they can't utili'e the applied tactic to host their own node.

this post was submitted on 20 Sep 2024
104 points (95.6% liked)

Privacy

31275 readers
418 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS