On Tue, Jul 2, 2024 at 5:27 AM jeremy ardley wrote: > > > On 2/7/24 16:24, Lee wrote: > > And if I don't want to leave Internet footprints - or if I just want > to give the finger to whoever is watching, I'll use the tor browser. > > > That is probably the worst thing you can do. On my last check *most* Tor exit > points are operated by intelligence or police agencies.
OK.. I'll bite. How do you know most Tor exit points are operated by intelligence or police agencies? I mean, it sounds reasonable, but how do you *know*? > Going about your business just using a regular ISP makes it unlikely anyone > will pay attention to you unless you frequent disreputable sites. > > Using Tor will automatically put you on a watch list. Yeah. I've heard that too. But using tor - or any encryption, is still legal, so what I'm doing doesn't even rise to the level of civil disobedience. So if they're going to put me on a list, they're going to put me on a list. I've been using tor since however long ago when it came bundled with privoxy, so I doubt that me not using tor now is going to make a difference. > Your identity can easily be found because your ip address at the exit point > will be recorded and matched with ISP records. Indeed. The TOR documentation used to be up-front about tor not being proof against a global adversary, so I doubt the NSA needs to bother my ISP asking for records. I was just poking around on torproject.org (which has been rumored to be enough to get one on a watch list) and I don't see any strong warnings about using tor :( Or even much of anything that would discourage one from using TOR. Oh well.. I guess they need lots of cannon fodder to provide covering traffic for .. who? Regards, Lee