1126
(page 7) 37 comments
sorted by: hot top controversial new old
[-] Cybersteel@lemmy.ml -1 points 1 year ago

Isn't tor like compromised? And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

load more comments (3 replies)
load more comments
view more: ‹ prev next ›
this post was submitted on 26 Jul 2023
1126 points (91.6% liked)

Programmer Humor

32562 readers
407 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS