this post was submitted on 30 Jul 2023
16 points (94.4% liked)
Privacy
33926 readers
601 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
On second reading this post seems a little more combative than I intended. You absolutely will reduce the surface that you are trackable on, so it's a good thing, don't let perfect get in the way of good enough. But your original post does ask if something is good enough, which begs the question, good enough for what? What's the threat model
I'm not searching perfect.
I'm trying to understand if custom with system wide hosts is the same as strict. Obviously not exactly the same, because of the hosts i choose.
I've read lots of different info and can't figure it out.