

For the children tm


For the children tm


VPN cause you can bind to it.


If you don’t use Tor
Nice try NSA /s
![]()


Privacy guides - http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/en/
Techdirt is a good independent site


If the EFF de anonymization tool can de anonymize your browser, then the ad network can too.
Try searching for something with tor browser - no javascript


Per reddit u/pathtracing - Thu Jun 19 08:27:23 2025 UTC - https://old.reddit.com/r/ipv6/comments/1lf5dmi/question_about_vpn_with_ipv6/
I think the problem is you (and others) using the term “vpn” to cover various different needs.
There’s:
You want 3 or 4, which is fine. Making item 1 provide a subnet doesn’t help 1 do its job any better and definitely will harm unskilled users.


Torrentio seeds. It’s using torrent technology. It will be sharing copies of the movie with others. Illegal.


Just need to start a rumor that this will allow the government to identify GUN OWNERS, for some future gun CONFISCATION effort. Cart_catalog
I look forward to a large contingent of MAGA voters suddenly insisting that they are now, among other things, experts on statistical methodology and census operations. You know, topics that they knew nothing about last week. Or this week. Rirere


Too late. OP is now noted as a google plant. I’ll stick to more reliable source like the other people on this sub


Yubico keys. Never had an issue after years of dangling on my keychain. They get replaced with upgrades to the key before they can break.


Using a VPN makes the original question redundant. The VPN would have everything super encrypted for either home wifi or home 4g/5g. Your question transforms into “can i trust this vpn company”


Decrypting the 4g/5g network will require a key from the telecommunications company. I argue it’s insignificantly less secure because a malicious actor can intercept it and decrypt it if they manage to steal the key from the company.
Practically, only your government would be able to get a copy of the key. But they’d also be able to watch your actual cable internet as well. And when your government gets interested in you then you fucked all the way up.
Honestly, pedos & terrorists get the whole world cooperation on doxing them. So if they’re not using a tool or method then it’s not proof against nation states.
Why the need for complete anonymity though? Literally only pedos operate at that level so that nobody can squeal on the others if they are busted (they inevitably need to mess up a real kid because their CSAM isn’t good enough).


SimpleX is currently the best one possible.
All the security of signal without needing a phone number.
Everything can be through tor. Contact link can be formed with a one time use code that you DM someone privately.
Anything more advanced and you’re basically in internet dead drop territory. An encoded message on a pastebin through tor. Congratulations, you’ve entered pedophile/terrorist level security realm.
sorry to ruin your day but some privacy nuts did pro-bono work for reddit in setting up a reddit onion address. https://old.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/
Definitely no tracking through 6 hops.
Theoretically - It doesn’t matter. They flag all your data with a “user asked for it to be deleted” flag. It’s still data that their statisticians can play with. If it was public then internet archive grabbed a screenshot.
Practically - Deleting it is almost always sufficient. They probably take a month to get rid of it. Nobody want’s to explain to a future compliance officer why data is just sitting around waiting to be subpoenaed in a privacy lawsuit. If it’s fake deleted then it’s probably pseudo anonymized for internal research. Almost all search engines will forget the data existed over time.
Nice
everything is overgendered