I don't use smartphones.
Well then, be sure not to use the same IP address!
It's been a while since I checked Tutanota via Tor, but ProtonMail was fine with Tor just some...
So who are they?
They only have Android and iOS apps.
Any email service is more-or-less private as long as they don't know who you really are. But of course, that doesn't work for stuff that needs to...
You won't likely be able to make the crack disappear. But you can reduce the chance of it lengthening. And perhaps ironically, doing a thorough...
It's like junkies who know that heroin is evil, but can't stop ;)
Just a wild guess. Sometimes when you have multiple fans working on the same enclosure, fan speeds will start oscillating. And if they're all at...
Very funny :)
OK, that's two out of three.
That's a decent machine. It's light on cores, but i5 is OK. Buy a USB DVD drive, and install using that. And why not learn Linux? Start with one...
That's why it's best to use a disposable machine. You can start each time with a fresh system restore. And even reflash all the firmware. That...
@Umbra - Sensible :thumb:
They seem like good people. And not so anti-Tor as some make them out to be.
It's easy to run private VPN proxies on VPS. And as @Beyonder says, not necessarily that expensive.
However, you'll be the only one using it. And...
Sure, but what you don't know may bite you.
On the "can't trust" scale, I'd say that Windows is #1 :)
What do you mean by "password protect"?
Encrypt? For Windows, VeraCrypt. For Linux, I prefer LUKS.
Buy an old used PC to play on.
And put it on a LAN by itself.
This is about enterprise VPNs, not VPN services.
As I understand it, it's the browser that prepares information to be uploaded. For GET, data gets appended to the URL. For POST, it gets appended...
Yeah, but eventually it'll come out, I bet.
Huh. So Firefox will add a "Tor browser" mode?
That's cool 'n' all. But I'm concerned that even more people will pwn themselves through clueless...
Hasn't Symantec been hacked already?
Separate names with a comma.