

292·
18 hours agoI’m sure you’re a great couple but if your concern is future-proofness consider separate domains.
I’m sure you’re a great couple but if your concern is future-proofness consider separate domains.
Privacy is a trade-off against convenience, and there is no perfect privacy.
VPNs are a mediocre privacy tool, because they presuppose trust in the VPN provider. Tor is flawed because it is open to correlation attacks.
There are low-hanging fruit that everybody should be using like sensible cookie policies, HTTPS-only mode, and DNS over HTTPS.
If you are looking for a solution on the far end of privacy/inconvenience you could look into I2P and use that situationally.
That depends on your threat model. It’s a useful strategy to hide your traffic from your local network admin (e.g. at the workplace) and your ISP, but it’s a bad strategy for hiding your identity from the sites you’re visiting.