Comment by lcnPylGDnU4H9OF
Comment by lcnPylGDnU4H9OF a day ago
> used 1-2 additional methods on top of TOR
Curious: what did you do and what were you hoping to mitigate?
Comment by lcnPylGDnU4H9OF a day ago
> used 1-2 additional methods on top of TOR
Curious: what did you do and what were you hoping to mitigate?
Just playing around, not mitigating anything. I think it would be poor practice to share my ideas/techniques- think of your own! Contrary to popular philosophy- obscurity is a powerful security method. People still rob houses with expensive locks… nobody robs secret underground bunkers.