In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.
100% Certified Good Boy
Used to mod Smash Bros Brawl on the Wii (Smash Bros Legacy TE Co-Lead & Stage 3D Modeling)
Now I’m a NYC-based Penetration Tester
Lemmy Alt: @WorseDoughnut
In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.
I promise you that like 90% of the creepy stories you’ve heard are people either exaggerating or just straight-up lying to sound cool on the internet. The kind of stuff that actually needs to operate over the TOR network doesn’t exactly want to be easily discoverable by normal people.
You’re no more likely to accidentally stumble across illegal / dangerous content while using TOR than you are while using any other browser.
There are none. It is carcinogenic.
Obligatory “PIA is owned by adware distributors” warning.
The one thing I would add, is that if you do switch you might want to consider reformatting your drives from NTFS to something linux compatible like ext4.
It can be a bit of a pain in your case though since you have so much to redownload afterwards
When DeStefano tried to file a police report after the ordeal, she was dismissed and told this was a “prank call”.
Why am I not surprised.
Disappointing but I understand it in the sense that their goal has always been “safe, controlled community” way before they accidentally became one of the largest instances.
I had an account there first, and then made one on kbin since the federation issues with kbin could have potentially lasted awhile, but after this I think it’s best to leave beehaw behind if this if going to be any indication of how they’re handling their inability to properly moderate at scale. Big red flag IMO.
Looks great! Any chance this could add the ability to collapse child comments? Or is that beyond the scope / ability of this kind of stuff?
To simply use TOR you do not need to run any kind of guard/middle/exit relay (this has always been the case), but yes there is the risk of being held accountable for other users data while hosting an exit relay.
This hasn’t gone away thanks to any legal precedent as far as I’m aware, so I imagine it all depends on the tech literacy of your local jurisdiction & how good of a lawyer you can afford.