Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I consider myself to be quite savvy and I'd have zero confidence in my ability to reliably shut down all identifiable traffic, except by setting up a tool that blocks all traffic (like Little Snitch[1]) and then making an exception for Tor traffic.

And then there's the fact that most people's MAC addresses are ultimately tied to their identities in a way that a powerful actor could recover it without too much difficulty.

[1] https://news.ycombinator.com/item?id=13443858



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: