So the email and name will be plaintext in the public key/signatures?
memorable link to the public key’s owner.
Ok, just strange how the key generator insists on specifying them. Encryption usually doesn’t like extra metadata.
So the email and name will be plaintext in the public key/signatures?
memorable link to the public key’s owner.
Ok, just strange how the key generator insists on specifying them. Encryption usually doesn’t like extra metadata.
From my knowledge VPNs hide your IP from the destination, and the destination from your ISP.
Fingerprinting is mostly about the browser you use.
For VPN any VPN should do (eg. Mullvad VPN $5/month) and for Browser just have a non-big tech browser with ad-blockers and tracking protection (eg. Mullvad Browser or other Firefox/fork with good config).
Or Tor
Also, how serious is the “not getting tracked” need? It sounds like you are getting hunted by the social media site? Wouldn’t that need full OPSEC mode with Tails and Whonix like the real darknet hackers?
For the VM, I can’t help you much. There should be tones of cloud hosting providers out there, just a Linux VM on another guy’s computer after all.
PS: I am a newbie just repeating stuff I heard before like a parrot.
I lived in Russia, and in History class I was taught that Stalin singlehandedly showed up to save those poor helpless Europeans from bloody nazis, because it was the right thing to do.
When I loved in Europe, it were the Jewish partisans who won WW2 through brain drain on Germany, and the stupid Nazis killed themselves.
In the US I found out that the thing in Europe was typical Medieval European Kingdoms in a fight, and the real high-tech stuff was in the Pacific.
Now as a programmer, I know who truly won WW2: it was our legendary bro Alan all along.
So the email and username have no cryptographic purpose, they are just there for convenience.
Thanks I guess…