After reading that whole page, I think your point is missing.. The use case of Tor and i2p isn't correctly explained on that site.
=> More informations about this toot | View the thread | More toots from melroy@kbin.melroy.org
=> View Findmysec@infosec.pub profile | View sploodged@lemmy.dbzer0.com profile
text/gemini
This content has been proxied by September (3851b).