Change your route, people using tor with the same exit as you are doing too many username checks.
Privacy
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
As a said inmyp previous comment onion site was used so they dont have access to info and ip of my exit node, and,anywaty, I have tried to change circuit and access again but without success.
While on dread recently I stumbled across this old post regarding issues with their onion adresses https://encryp.ch/blog/disturbing-facts-about-protonmail/
When a user makes a new account with Protonmail on TOR they are re-directed from Protonmail’s “.onion” to “.com” address. This breaks your secure encrypted connection to their onion address, enabling your identification. There are absolutely no technical reasons for this feature. In fact, the only other websites that operate like this are suspected NSA/CIA Honeypots.
Goddamn. We live in a nightmare. There is someone fucking us all every goddamn second of the day.
Yes, I knew this info, there is a lot of strange things with company
that sucks, this means no more hiding metadata. However, they aren't ditching switzerland (yet) - this only happens if the government applies the new surveillance rules which is not set in stone yet.
I use pgp and host mail myself. It's not as hard, and it's by far less problematic than a lot of people make it out to be. Don't trust hosters.
that sucks, this means no more hiding metadata. However, they aren’t ditching switzerland (yet) - this only happens if the government applies the new surveillance rules which is not set in stone yet. I could agree with you but my threat model currently allows me to use third party providers
I generally agree with you but my current threat model allows it