VPN and Tor are a good example. Both are bandaids for a flawed system and its transfered data leaks.
Look at Reticulum. You can do it the right way and encrypt the baselayer so you have no leaks to higher levels.
VPN and Tor are a good example. Both are bandaids for a flawed system and its transfered data leaks.
Look at Reticulum. You can do it the right way and encrypt the baselayer so you have no leaks to higher levels.
No replies yet.