Embed Notice
HTML Code
Corresponding Notice
- Embed this notice@p @DutchBoomerMan @NonPlayableClown @SarahGation
I like the point you raise about traffic being different from tiktok/facebook. To be entirely frank, if it were up to me to design such a system, I would probably use that as a first pass myself.
It is speculation on my part, but I suspect that the lists which contain people whose traffic is meaningfully different from tiktok zoomer et al and the lists which contain people who use Tor are not the same lists. I've not seen any documents that describe the sort of lists that spies keep on citizens, but it is unlikely to be something I will find well-engineered.
>but here's something you may not have known: visiting LWN or the LKML archives got people flagged and added to a watchlist by the NSA for a while.
I certainly was not aware of this.
Looking briefly, I see that this was a controversy from 2010. I doubt anything has improved.
>it if it were more common.
I would already be using it if it this were the case.
In the end, I want to emphasize that many individuals of a technical mindset place too much faith in intsec and deeply underemphasize fundamental security practices such as compartmentalization, discretion, and inconspicuous. Discussions are often about Tor, about proxies, but you never hear anyone say to buy a second computer. And if you read about cases such as the silk road raid, those criminals are nearly always done in by a lack of basic security fundamentals. It may be an extreme comparison, but there's no point in using Tor if your browser has facebook cookies.
>if you think a proxy is less suspicious than Tor, because nearly all proxy services are on the list.
I was not aware of this. If anyone else had said as much to me, I would not have believed it. I looked briefly online but was not able to find any details, so i hope that you can recall a hint that helps me search for more to read about.