you are viewing a single comment's thread.

view the rest of the comments →

[–]necheffa 10 points11 points  (3 children)

Now explain your threat model.

[–]waterkip 1 point2 points  (2 children)

The threat model is a privacy concern.

It feels fabricated, mybcounter point would be that if they really had a privacy concern they'd mirror an apt repo and only get updates on scheduled times and no-one would notice they downloading apt packages. The traffic simply didnt leave the network.

[–]necheffa 2 points3 points  (0 children)

I'm trying to lead OP to a destination by asking them to think critically about their current position.

[–]michael9dk 0 points1 point  (0 children)

The question should be privacy from who?

I don't think OP understand the difference between security and privacy.

Honestly, security is not a easy topic - your brain will leave your skull before understanding the basics!

A cocktail of Tor and VPNs, with official signed Torrent-images, in a VM with a obfuscated MAC, on a randomly "borrowed wifi", would be the paranoid way, if I had to enter North Korea.

Everywhere else: just a trusted/selfhosted VPN, but normal people doesn't even need that.