ProtonMail anonymity speedrun, any%:
-
ProtonMail anonymity speedrun, any%:
step 1: don’t use your real email to sign up, you absolute muppet. use a burner. gorilla mail – free, dies after an hour, leaves no trace.
step 2: free tier is fine. need to upgrade? Monero or cash. do NOT hand them a credit card.
step 3: want ToR? boot Tails OS first, full stop. Tails forgets you exist on shutdown, ToR handles the routing. together they mean something. separately you’re just cosplaying at privacy.
that’s it. that’s the whole guide. it’s not hard. the threat model does the heavy lifting, you just have to put in the work.
stay feral.

-
M mttaggart@infosec.exchange shared this topic
-
ProtonMail anonymity speedrun, any%:
step 1: don’t use your real email to sign up, you absolute muppet. use a burner. gorilla mail – free, dies after an hour, leaves no trace.
step 2: free tier is fine. need to upgrade? Monero or cash. do NOT hand them a credit card.
step 3: want ToR? boot Tails OS first, full stop. Tails forgets you exist on shutdown, ToR handles the routing. together they mean something. separately you’re just cosplaying at privacy.
that’s it. that’s the whole guide. it’s not hard. the threat model does the heavy lifting, you just have to put in the work.
stay feral.

@k3ym0 i guess for that matter don't use a credit card for any purchases, toss it in the garbage
-
ProtonMail anonymity speedrun, any%:
step 1: don’t use your real email to sign up, you absolute muppet. use a burner. gorilla mail – free, dies after an hour, leaves no trace.
step 2: free tier is fine. need to upgrade? Monero or cash. do NOT hand them a credit card.
step 3: want ToR? boot Tails OS first, full stop. Tails forgets you exist on shutdown, ToR handles the routing. together they mean something. separately you’re just cosplaying at privacy.
that’s it. that’s the whole guide. it’s not hard. the threat model does the heavy lifting, you just have to put in the work.
stay feral.

@k3ym0 Using a web browser to access your email means there is no integrity on the javascript that you execute, which means the cryptography is irrelevant and the emails are cleartext. If the emails are cleartext, you are not anonymous.
That's it. Do not use a web browser. Do not use Proton.
-
R relay@relay.infosec.exchange shared this topic