Must be hard for the investigators when so many people are potential suspects.
Must be hard for the investigators when so many people are potential suspects.
I’m at 15.9 bits of info and an almost fully unique browser. Of course, that uniqueness changes every time and they don’t test for that.
I’m on iOS.
The main defense against VPN timing attacks is to ensure your VPN exit node isn’t somewhere that the same person would have access to as your connecting IP.
That said, if someone runs a website or service where you have a unique login or custom token and they have access to your ISP’s connection logs… a standard VPN will once again give you away. This is why TOR exists.
I generally argue that an exit VPN doesn’t really provide much privacy; the only real services it provides are georelocation and protection against low effort bulk filtering (eg, identifying torrenters or bulk metadata collection).
For everything else, either encryption and third party DNS is enough, or the exit VPN isn’t enough to stop targeted surveillance.
I intentionally don’t block crossposting sites. It means that when someone cross posts, I get the opportunity to be “that guy” and mention that I can’t see what they’re referring to and would they please reference something publicly accessible?
I believe he did it.
Did his sharpie map look anything like the real Middle East? Did the nations he wrote down have any resemblance to actual names of Middle Eastern countries, and were they in roughly the right location?
Unless he was copying from an atlas, that’s much more unlikely.
Unconvincing to whom? That campaign did an amazing job of equating copyright to property ownership for an entire generation.
It’s not accurate, but I think we’ve seen that it can be very convincing for most people.
That’s great news! They’re actually willing to make concessions!