minus-squaredaniskarma@lemmy.dbzer0.comlinkfedilinkarrow-up11·14 days agoPretty sure security agencies have enough nodes to compromise tor. Try i2p.
Pretty sure security agencies have enough nodes to compromise tor. Try i2p.