In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.
100% Certified Good Boy
Used to mod Smash Bros Brawl on the Wii (Smash Bros Legacy TE Co-Lead & Stage 3D Modeling)
Now I’m a NYC-based Penetration Tester
Lemmy Alt: @WorseDoughnut
In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.
I promise you that like 90% of the creepy stories you’ve heard are people either exaggerating or just straight-up lying to sound cool on the internet. The kind of stuff that actually needs to operate over the TOR network doesn’t exactly want to be easily discoverable by normal people.
You’re no more likely to accidentally stumble across illegal / dangerous content while using TOR than you are while using any other browser.
There are none. It is carcinogenic.
Obligatory “PIA is owned by adware distributors” warning.
Still bitter about Vlemmy, and I haven’t made a replacement account yet.
Were they filled with spam? Or does your instance just really hate Star Trek lol
The one thing I would add, is that if you do switch you might want to consider reformatting your drives from NTFS to something linux compatible like ext4.
It can be a bit of a pain in your case though since you have so much to redownload afterwards
Used to be a manager, and thankfully left right before they brought back the Mexican Pizza…
That thing was / is torture to make, and always breaks or is put in the bag sideways (because it literally does not fit in the largest bag if you try and just place it in straight down).
The Nacho Fries comes in a close second though, but mostly because frying it essentially halved our capacity to fry literally anything else throughout the day.
Looks great! Any chance this could add the ability to collapse child comments? Or is that beyond the scope / ability of this kind of stuff?
To simply use TOR you do not need to run any kind of guard/middle/exit relay (this has always been the case), but yes there is the risk of being held accountable for other users data while hosting an exit relay.
This hasn’t gone away thanks to any legal precedent as far as I’m aware, so I imagine it all depends on the tech literacy of your local jurisdiction & how good of a lawyer you can afford.