• hansolo@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    It depends entirely on your threat model. Start with privacyguides.org

    For anyone simply not wanting to have their data scooped up en mass, you still have to defeat IP triangulation, browser fingerprinting, and shadow profiling. Our data is extremely valuable to some people, and they go to great lengths to get it.