

Unfortunately this is 100% real.
2023 Reddit Refugee
On Decentralization:
“We no longer have choice. We no longer have voice. And what is left when you have no choice and no voice? Exit.” - Andreas Antonopoulos
Unfortunately this is 100% real.
+1 for Linux Mint. I’ve been on it full time since December 2024 and have been incredibly pleased with its performance, stability, and customisation. I found alternatives for all my old Windows workflows, so there’s no way in hell I’ll go back to Windows.
Don’t forget to try their other games if you haven’t already! It Takes Two is wonderful, and the recently released Split Fiction is my favorite of them all.
I see Tales of Symphonia, I instantly upvote.
HTTPS with no VPN:
You trust the web site to encrypt your data if and only if the web site has properly implemented encryption along with encrypted DNS traffic. Sometimes you make a connection to HTTP before you’re redirected to HTTPS. Your ISP can see what web sites you visit, but the ISP can’t see what you’re doing because the traffic is encrypted so long as encryption is implemented correctly. ISP knows you went to https://www.website.com/.
Conclusion: Your ISP knows exactly what web sites you visit, but can’t see what you’re doing on the web site (if encryption is properly configured by the web site provider).
HTTP or HTTPS with trusted VPN (e.g., Mullvad):
You trust the VPN provider. Your connections are encrypted entirely. Your ISP can’t see what web sites you’re visiting nor can they interpret your traffic.
Conclusion: Your ISP is completely blind to what you’re doing and where you’re going.
ExpressVPN:
"HTTPS is essential for security, but it can only do so much. Don’t fall into a false sense of security—there are limitations to HTTPS protection:
- HTTPS doesn’t hide what websites you visit. Your ISP or network provider can still see which sites you access, even if they can’t view what you do on them.
- HTTPS won’t protect data stored on a website. If a site suffers a data breach, HTTPS won’t prevent hackers from accessing your saved information.
- HTTPS cannot encrypt all your internet traffic. It only secures connections between your browser and a site—not your entire internet activity.
- You have no control over HTTPS. The protocol is set by website owners, so if you visit a website without HTTPS protection, there is no way for you to enable it." Source: https://www.expressvpn.com/blog/https-vs-vpn/
PureVPN:
"HTTPS:
- Encrypts data between your browser and websites.
- Protects against eavesdropping on web transactions.
- Activated automatically with ‘https://’ VPN:
- Encrypts and routes all internet traffic, including from apps.
- Protects the entire internet connection. A VPN is used to establish an encrypted connection - also referred to as tunnel - between your device and unsecure network like the Internet. Since all your traffic goes through the VPN’s server rather than that of your ISP, nobody can find out what you’re up to online. What HTTPS Cannot Do?
- Hide Your IP Address: HTTPS doesn’t mask your IP address. Websites and your ISP can still see your IP and location, whereas a VPN hides your IP, making your online presence more anonymous.
- Encrypt All Internet Traffic: HTTPS only secures data between your browser and websites. A VPN encrypts all your internet traffic, including apps and services outside your browser.
- Prevent ISP Tracking: Your ISP can still see which sites you visit with HTTPS, they just can’t see the exact content. A VPN encrypts all your traffic, preventing ISPs from tracking your web activities. https://www.purevpn.com/blog/https-vs-vpn/
Here are more sources I won’t quote, but you can read:
Great input and you’re absolutely correct. Very important to safeguard backups.
Use of a VPN depends on your privacy threat model.
Using VPN at all times while using the internet like one normally does is beneficial only to the extent that you encrypt your traffic and prevent your ISP from spying on you… mostly. But if you’re logging into known accounts associated with you, then it’s a moot point. Your traffic is encrypted, but your use of services leaves an easy to follow cookie trail of where you’ve been.
If your privacy threat model is much more serious, then you wouldn’t login to any known accounts while on your VPN. You wouldn’t use services that can be pinpointed to you.
Hence, use a VPN to your discretion. If you generally don’t want your ISP spying on you, keeping it on is always best practice. If you have more things to hide, you’d want to use Tor while on VPN and of course don’t use any services that could be linked to you.
Nothing much you can do except make it harder for nefarious parties to get your information. If you’re in the U.S. most of your information is public. With two pieces of info about you, you’re one Google search away from your name, physical address, schools you went to, where you’re employed, etc. You can’t stop this, so just make it harder when your data does get leaked.
Here are my best practices:
I was sort of with you on My Hero Academia as I’m currently watching it for the first time. Parts of it were good and it was enjoyable for the most part watching it as an adult. Dragon Ball Z doesn’t hold up as well but I still love it as I grew up with that.
However, just yesterday I finished s03e11 “One For All”. And holy shit was that a gut-wrenching and emotional episode about the legendary hero “All Might”. Seeing this Superman like hero being broken and exposed while the whole world watches was incredible. I won’t say anymore, but it was incredibly moving how that episode turned out. Cemented it as an incredible anime for me so far. I’m looking forward to watching the rest of it, and hopefully I will still enjoy it. But boy did it take a long time of watching and filler episodes to get to this point.
Bro my body can’t take it anymore, I’m so sick. I’ve had 23 Mountain Dews and 14 Doritos Dew It Right today. My LG tv still wants me to sing and dance to continue.
And you are correct as there are now Samsung and LG smart monitors. It won’t be long before all monitors are smart.
This sucks.
Turtle Power
Archived article: https://archive.is/rDbgD
Great questions! Seriously, those made me think for sure.
For question one, I suppose a profiler could do that. If my domain name is myemaildomain.com, they probably could track all emails and sell it collectively. But I don’t think corporations do that at this time. That would be akin to profiling all Hotmail, Gmail, Live, etc emails, appreciating those are massive services. I suppose if nefarious actors were to do that to my domain, I could consider switching domains - I have multiple domain names I own, and it’d be trivial to use the other ones. In the years I’ve been using a custom domain for email, I haven’t encountered any nefarious actors and have significantly eliminated any spam.
For question two, the domain provider I use doesn’t do that in their terms of service. However, if they did look at my MX records and decided they wanted to profile me as a user of Addy, they definitely could do that. Though it would hurt their business as many users would migrate their domains to new registrars - I certainly would move my domains to a new registrar!
When you get an email from Company A that sends to your alias email, the email goes to your inbox. When you reply to that email, your alias provider forwards it to Company A where the sender is your alias address.
In short, you simply reply and your alias service takes care of it for you so that the recipient only sees your alias email and not your true email.
I signed up with them ensuring I read their privacy policy. Based on my personal privacy threat model, I’m okay with their policy. This wouldn’t fit a more intensive threat model.
I haven’t read it recently but last I remember they do have the option to temporarily store an email in the event of a failed delivery, until it can eventually get sent to you. This is opt-in I believe, and a toggle you can enable in your account.
In the time I’ve used them I haven’t had any issues with email deliveries. Been happy with the service so far, having left SimpleLogin and Proton for political reasons.
This is what I do as well. I purchased my own custom domain name and run aliases off it using Addy. So as an example, an email for an online account would look like: random9.words@mycustomemail.com
Then I feed these accounts into a password manager so I don’t have to remember them.
All the aliases forward mail directly to my main inbox. Companies never see what my real address is. If I get spam, I know which company either sold my data or leaked my data. I can then take action by simply turning off that email alias and then spinning up a new one.
The best thing about owning your custom domain is that you’re in control and never have to change your email addresses. If I want to move to a new email provider, I can easily do that. The process, simplified:
Edit: All providers make it very simple to set up a custom domain. If you can follow instructions and copy and paste text, their systems will run checks to make sure you did it correctly and it’s syncing properly. Very easy for those who aren’t technical.
We can! So long as they let women speak for themselves in four years.