It comes down to the hostile actor you are trying to defend against. If you are Jason Bourne and you have been burned by your agency so multiple nation-states are looking for you, then you have to go fully off-grid and live a quiet life without ever communicating with anyone in your prior life again. It doesn’t matter if you are using Signal, or SMS, or even a dial-up BBS. If you are communicating with people that are also under heavy surveillance, you cannot hide.
If you want to reduce your “digital footprint,” then not using google/facebook/other social media is the most worthwhile thing you can possibly do. Your phone doesn’t matter. Use iOS, never install any of the social apps, use Safari in incognito mode, and you’ll never be tracekd across websites again.


yea, ever since TPM was first making the conspiracy rounds in the 90’s there has been a huge misunderstanding of its purpose, let alone its capabilities. I 100% agree with the author that looking at the TPM as an evil blackbox is really just depriving users of a tool that can be implemented in an open source way to secure user privacy. The GPU however is impossible to implement in an opensource way by everyone except a small handful of semiconductor companies, and even then you would rely on proprietary microcode that woul take millions of manhours to reverse engineer if it were even possible. So if I were some megacorp who relied on Imaginary Property, the GPU that was exclusively created by a fellow megacorp is where I’d place my trust.
I also dont know why Win11 requires a tpm2.0, but since it does, and my current computer doesnt have one, I’m certanly not going to run it.