I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)

  • Ardens@lemmy.ml
    link
    fedilink
    arrow-up
    9
    arrow-down
    3
    ·
    16 hours ago

    But you do know that Tor/VPN is not really privacy, nor security? It hides your IP, but that’s about it. If you still login, and give any information, and that could just be your “fingerprint” you are not anonymous…

    • swelter_spark@reddthat.com
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      5 hours ago

      Hopefully you don’t log in or give personal info to every website you use. Hiding your IP is still more private than not hiding it.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        3 hours ago

        Do you know what your fingerprint is? And all the ways you are being tracked that is not about your IP?

        You do give personal info to every website you visit - with the exception of a very few, who respect your privacy. If you think you need to log in, to give personal info, then you are sadly misinformed.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      9 hours ago

      Encryption is a type of security, and Tor/VPNs encrypt your traffic. Accessing .onion sites over Tor is (at least in theory) more secure than accessing clearnet sites.

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        3 hours ago

        In theory - but it’s still primarily your IP you are hiding. And very few people only visits -onion pages…

      • Ardens@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        3 hours ago

        Only a few take their privacy serious. They, sadly, believe in the ethics of the Tech giants…

      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 hours ago

        I2P is king here but it has a limitation that makes it stronger but less practical. I2P doesn’t generally do outproxies. A few exist but they typically aren’t trusted or used. Instead, I2P tries to keep private by only routing around traffic the originated within its own network rather than piping things from clearnet from one place to another. An issue with arrives that do that is you can see traffic from a honey pot going into a black box and with enough monitoring where it ends up leaving that black box. It’s very difficult to track traffic flow within the network but once it jumps back into clear net you can find it again.

        Now while you can argue that it doesn’t come out on clearnet, just originates from there, I counter that with Microsoft Windows telemetry, it might as well be clearnet. Windows is the dominant player at the moment so it’s most likely the traffic ends up on a windows machine. There are really benefits behind the telemetry date but they also means there’s a single point an authoritarian regime can apply pressure to to monitor whatever they want. With advances in AI, chewing through tons of collected data is much easier to do, so the idea of “they can’t stop all of us” is ridiculous. They will just pick off the undesirables in smaller chunks.

        Ultimately nothing is completely safe but if you really value privacy, make yourself such an enormous pain in the ass that monitoring you becomes a chore.