Skip to content

Anonymous

My feedback

2 results found

  1. 18,210 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Anonymous commented  · 
  2. 7,692 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Anonymous commented  · 

    just use tor or icecat(If tor is too slow) because they're decentralized so nobody can buy it (or threaten to arrest everyone for not disclosing info). Keep in mind your isp can see you're using protonmail, so can google fiber. And phones, operating systems, and computers made by microsoft, amazon, google, or apple also will most likely keylog your information. Be careful of third party software as they could also track (or conveniently let amazon store and steal all your info [[brave browser]]) you.

Feedback and Knowledge Base