If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
Why didn’t anyone mention burning it to ashes?
It’s not, i’ve got two non-tech friends on my private instance, biggest issue was me nuking wrong folder on server. You just need a good client, i go with Dino for desktop and monocles chat for android. My non-techies are mobile-only and i and my techy friend are on Dino on desktop, only feature it lacked is group calls which i’ve monkeypached with a feature for my bot that generates Jitsi invites.
Tried and can confirm almost every webpage even static ones which could be simple as rock needs truckload of bloat js code to be loaded from ext servers.
To add to Possibly Linux’s precise and correct answer: Those leaks are made by hackers taking over organisation’s servers and publishing what they found, noone can control it not even orgs in question.
Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.