1127
(page 7) 37 comments
sorted by: hot top controversial new old
[-] Cybersteel@lemmy.ml -1 points 2 years ago

Isn't tor like compromised? And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

load more comments (3 replies)
load more comments
view more: ‹ prev next ›
this post was submitted on 26 Jul 2023
1127 points (91.6% liked)

Programmer Humor

36811 readers
33 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS