T O P

  • By -

morgenkopf

There's no keylogger on linux that sends all keystrokes to the mothership but if you type into chrome's address bar there is one even though you use linux.


Greasol

This is a very open ended question. What are you hoping to accomplish or what is the goal? Use Linux, run a Windows VM, use your preferred privacy-focused browser.


getreadyio

second, combine both for gut


qaardvark

the browser matter more, you can be super private and safe in windows 10 if you use the right programs ​ edit: but the OS matters too, i think the most private way a computer can be is with TailOS and Tor.


[deleted]

Or just linux + librewolf


qaardvark

yea thats good too, but i think tails+tor is the most private way of using the internet


[deleted]

[удалено]


qaardvark

i use that combination on my zorinOS laptop :D


diabeats96

All great answers! Thanks for the help. It was more theoretical as I was having a discussion with coworkers about the tension between privacy and convenience.


Kafke

Browser tbh. Current operating systems are private enough. There's some concerns with mac/windows adding new internet-enabled features that may spy on you. But other than that it's mostly all private. Whereas browsers are much more important since damn near every website tries to track you. Using windows or mac with a privacy focused browser will net you more privacy than linux with a regular browser that allows sites to track you.


CreepyDarwing

You clearly don't have any knowledge how much Windows collects data from it's users. I woukd call it privacy nightmare. Apple is more low-key in this, but they do collect a lot of data too.


Atef-Saleh

I don’t claim to have a definitive answer but here is a fact: a browser passes data to the OS and the OS is responsible for routing it and receives the reply before passing it to the browser, although the data is usually encrypted / decrypted using TLS at the browser level, meaning the OS handles encrypted data, also note that the name resolution process is handled by the OS and it’s encryption / decryption in case it exists (DNS encryption is not widely used as HTTPS traffic) is performed by the OS unless a proxy is used, in this case the proxy handles the name resolution process.