This article discusses what you can do to protect your privacy against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.) when even the most widespread tools seem to fail this goal.
By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.
If a file you wish to view isn't highlighted, and is a text file (not binary), please
let us know and we'll add colourisation support for it.
This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.