Thanks for clarifying.
Jason2357
Wireguard is just the vpn software, not a service. Most of these services are running wireguard under the hood now because it’s so good. You can also use wireguard yourself to connect your own machines together, (or friends machines, allowing file sharing like a LAN) but that doesn’t help you with torrenting.
Unless you are willing to do the math, “no entropy really” deserves a [citation needed]
I really like the idea, but if someone is going to put in the work to change over their main online identity to a new email address, it’s not ideal to change over to an address of a random company. It’s a lot of work, and think of the accounts that use your email for logging in, the friends that may email very rarely, etc. Consider using one that supports a custom domain and buying your own. That way you can move providers whenever you want. Barring that, I would make sure the company has been providing email reliably for at least a decade, preferably two, before investing in it as a main email. Email is a long term thing. As a secondary email account?, give it a try. Everyone should have a few anyway.
I think most people concerned with privacy have anonymous email accounts and at least one tied to their real identity. How do you communicate with your prospective employer? Your family? Your lawyer? That email should protect your privacy, but it sure isn’t anonymous.
Yes it is. Signal isnt PGP email. A lot of work went into protecting metadata.
They have a long history of supporting both ends of the spectrum and really anyone they deem will destabilize the hegemony. Noam Chomsky used to be such a regular guest on RT he could have been considered staff back during the Iraq war. The difference is that they have had wild success with the far right to the point that no one is even really hiding it anymore. Trump and brexit being the biggest successes on the books.
Because he campaigned on diversifying our exports. The Americans love carbon tax free products, but the EU does not, and will penalize them.
Margins are only high when you externalize so much of the costs to the public and state.
What is the threat model where this matters? You have to trust the recipient with Signal. The only one I can think of is the case where your recipient is using a compromised fork and is unaware. In this case, talking about the tool and checking with them about what they are using is really the only countermeasure.
Entropy is calculated from the character set size to the exponent the length of the string: E = log2(R^L). A long string of numbers can have more entropy than a shorter alphanumeric string with special characters. I looked it up and apparently their account number is 16 digits. That’s 53 bits of entropy, which is not guessable. Someone brute forcing would have quadrillions of login attempts to try.