It’s already trivial to see that you’re connecting. You’re not making anything at all more difficult for state level actors, just yourself.
It’s already trivial to see that you’re connecting. You’re not making anything at all more difficult for state level actors, just yourself.
There’s no point in hiding the transaction. A state level actor will see that you’re connecting to the Mullvad VPN addresses and won’t need to check your credit card statement to determine that you’re using it.
I understand the concerns of privacy, but working in academia means that you give up some of the privacy.
Yes people will have your real name and they will know what college you work at and if some crazy person decides that they want to stalk you on campus because you’re woke or part of the deep state turning the frogs gay with chemicals they’ll be able to easily do that.
You’re gonna have 100s of strangers in your classes during the year. You’re going to tell them exactly when you’re going to be in your office for office hours.
If you are unable to handle that I doubt academia is for you.
Academia is about furthering human knowledge especially a PhD. There are sacrifices involved; your privacy is probably one of them.
Part of being an academic is being available to discuss your publications. Your full name will not only be flying around the internet but recorded permanently in libraries and journals.
Science is about collaboration, and standing behind the work you do, publicly. You will find it extremely difficult or impossible to get your PhD without being known to the academic community.
I think you won’t find many anonymous scientific papers held in high regard.
The issueI have with the “always unique” plan is that if they can determine your browser was associated with some set of unique IDs, then they can track you. Imagine a TOTP where the keys were leaked so the adversary can determine the entire set of possible codes.
If everyone’s fingerprints always match each other’s, then you have plausible deniability.
The idea with anti-fingerprinting is the idea that no matter who you are or what your setup is, the fingerprint is created, it matches many, many other browsers
Imagine a sea of people in Guy Fawkes masks.
If your fingerprint is unique, that means you can’t be confused for someone else.
That is literally the opposite of anti-fingerprinting.
You want to look like 1000’s of other people, so they can’t prove it was you that visited a particular site and use that information against you.
Ah, didn’t realize pfSense is the OS, not something that runs on linux. My command examples won’t work for you.
So my first question is how can it be that my little mini J1900 Celeron (2 GHz) with 4 GB RAM cannot handle this bandwith?
sudo ethtool enp2s0 | egrep 'Speed|Duplex'
Your device name may be different from enp2s0
. use ip link
to see all devices. if it’s notSpeed: 1000Mb/s
Duplex: Full
then that’s probably a bad sign.
Partition
There, their its are not it’s they’re its. It’s as simple as “its”, as it’s the its it’s.
uBlock is a content filter. Cookies are set when a server responds to a web (http/https) request. So if uBlock has a domain blocked, not only are any cookies blocked, but no requests make it to that domain (whatever.com) at all.
If a domain is not blocked by uBlock Origin’s filters, then cookies are set per your browser’s configuration. Firefox I believe blocks some 3rd party tracking cookies by default, but can be configured to block all third-party cookies as well, but this may break site functionality like single sign-on.