A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
much thanks to @gary_host_laptop for the logo design :)
- 1 user online
- 29 users / day
- 105 users / week
- 186 users / month
- 352 users / 6 months
- 8 subscribers
- 642 Posts
- 2.07K Comments
Tor doesn’t seem to help here if I got it right, because the data traffic is assigned to your phone number.
They can’t do much if you use any proxy, be it Tor, a public single-node proxy, or a commercial VPN (which I think is inadequate for an use like this, after all VPN providers are ISPs in a way, so you are just hiding traffic from your own ISP and giving it to another one).
They could just see the traffic encrypted between proxy client and server, and maybe do some correlation with time of usage and stuff like that.
If you have bad opsec, it’s possible to completely deanonymize you on Tor and track what you do, but it’s not easy and so it’s something that only law enforcement does. Entities with simple commercial interests don’t go above certain limits of complexity. Most websites for example use browser fingerprinting techniques, and as far as I know some stuff uses advanced user fingerprinting tactics (logging the unique way you move the mouse or type on the keyboad, like Google ReCaptcha 2 does), an ISP could do even less.