WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.0K

Here is the brief history.

  1. VPN fired up, opened Tor browser a month or two ago
  2. Created burner email account via Tor Browser
  3. Used burner email to open a new Gab.com account (also via Tor Browser)
  4. Posted a lot of JQ facts, got a bunch of followers etc, only using Tor Browser
  5. Made a reply about HT possibly being controlled opposition, immediately blocked by the OP and gang raped by HT groupies
  6. Next morning: I can log in, but I can't post. Everything is a "403 status" when I try to post or comment.

New tor circuits don't fix it (I've tried at least 100 times). No changes to my Tor version or anything else. I guess I'm banned from Gab.

The timing is suspicious.

Edit: so I figured it out. They started blocking Tor exit nodes for comments and reactions. The account wasn't shadow banned.

Here is the brief history. 1. VPN fired up, opened Tor browser a month or two ago 2. Created burner email account via Tor Browser 3. Used burner email to open a new Gab.com account (also via Tor Browser) 4. Posted a lot of JQ facts, got a bunch of followers etc, only using Tor Browser 5. Made a reply about HT possibly being controlled opposition, immediately blocked by the OP and gang raped by HT groupies 6. Next morning: I can log in, but I can't post. Everything is a "403 status" when I try to post or comment. New tor circuits don't fix it (I've tried at least 100 times). No changes to my Tor version or anything else. I guess I'm banned from Gab. The timing is suspicious. Edit: so I figured it out. They started blocking Tor exit nodes for comments and reactions. The account wasn't shadow banned.

(post is archived)

[–] 4 pts

The entire internet is a honeypot.

[–] 2 pts

It's a scale. If you fuck around using Chrome and/or no VPN, you are vulnerable to dragnet surveillance and an easy target.

If you use VPN and a non-Chrome browser, you're still pretty easy to target via device fingerprinting - and most of the extensions to prevent this don't really work that well.

If you use VPN and Tor or i2p, you are a hell of a lot harder to target. Unless there's a state actor doing traffic analysis to match communication between you and your VPN service and the exit node of the Tor network, you are pretty safe.

[–] 1 pt

I've yet to use i2p or tails; my "threat" model is basically saying "nigger, jew, tranny" and that's about it. When things get really ugly then I'll seriously use them.

[–] 1 pt

I've used tails from a USB drive. It works. I would use it if there was a way to have a persistent password manager. It might have that, not sure.