206 comments
joecool1029 · 12 days ago

Show replies

mastazi · 12 days ago

Show replies

neilv · 11 days ago
Step 1: Determine your threat model.

Step 2: Realize that none of these measures are adequate for that threat model, in the current environment. (For pretty much any threat model.)

Step 3: Realize that some of these measures draw attention to yourself, however.

Show replies

wayathr0w · 11 days ago

Show replies

tptacek · 12 days ago
One of the first things you can do with any of these kinds of lists is to see if they recommend Firefox over Chrome. It's an excellent shibboleth, because Firefox codes (rhetorically) profoundly more activist- and privacy- friendly than Chrome does, but Chrome has much more sophisticated and better tested runtime protections. Firefox seems like it would be the better recommendation, but if what you care about is not being easily (==cheaply) targeted by exploits, it's not.

Show replies