Profile: 99107619...

Yuo would be a good CryptoAG PR specialist, not manager of course.

"Crypto AG rejected these accusations as "pure invention", asserting in a press release that "in March 1994, the Swiss Federal Prosecutor's Office initiated a wide-ranging preliminary investigation against Crypto AG, which was completed in 1997. The accusations regarding influence by third parties or manipulations, which had been repeatedly raised in the media, proved to be without foundation.""

If you use .onion address you don't use exit nodes. Your traffic is encrypted within Tor and doesn't leave Tor.

Big tech can track you as well even if you use 'sandboxed' services or different profiles. Your phone has unique ID.

Protonmail scans officially all unencrypted e-mails.

Don't you scan unencrypted e-mails?

GrapheneOS is a perfect tool to fingerprint specific users.

Bear in mind that they encourage users to use their servers if you want to possess a working device for instance for having accurate clock, system and apps up to date.

For so many years they have not been able to create .onion version of their main site or download site to avoid direct connection or even via exit nodes. They don't have a possibility to update system via Tor.

Is it rocket science for experienced developers? NO, IT'S NOT.

You can assume that this is on purpose. They talk about privacy but they don't care about privacy and your personal security.

If you have doubts. Remember that CryptoAG fooled over 120 countries for dozens of years.

GOS encourages users to use so called sandboxed Google apps.

Keep in mind that even if you use them in separates profiles your phone with GrapheneOS shares the unique ID of your phone.

Using GrapheneOS you're a beacon for any actor who monitors internet traffic.