Everything not running on tor should be understood as compromised. But then it would be even better to have working i2p.

Reply to this note

Please Login to reply.

Discussion

No replies yet.