You Should Connect to Tor via a VPN
A video in which I respond to Mental Outlaw’s “Stop Using Tor With VPNs” video that somebody shared with me, and then also talk more about Tor security.
A video in which I respond to Mental Outlaw’s “Stop Using Tor With VPNs” video that somebody shared with me, and then also talk more about Tor security.
This video was based on my recent article at Privacy Guides, included below: Memory Integrity Enforcement Changes the Game on iOSApple’s new support for ARM’s Memory Tagging Extension in iOS and their A19 SoC is an underrated feature for journalists, activists, and other high-profile figures.Privacy GuidesJonah Aragon
For most protesters, activists, and journalists, your smartphone is an essential tool you depend on for organizing with your peers, accessing and distributing information, and helping others. It also represents a great risk, as a tool that is easily appropriated by authorities for targeted and mass surveillance. The perennial question
"No shady privacy policies or back doors for advertisers" proclaims the Firefox homepage, but that's no longer true in Firefox 128. Less than a month after acquiring the AdTech company Anonym, Mozilla has added special software co-authored by Meta and built for the advertising industry directly
After installing torrc and pointing your hidden service to your Caddy server: # Redirect base domain to www subdomain http://example.onion { redir http://www.example.onion{uri} } # Proxy all subdomains of example.com http://*.example.onion { @hostnames header_regexp hostname Host (\S+)\.example\.onion # note the backslashes before the dots