@greypilgrim @jomo yes i the victim must not relate sufficiently to the person appropriating my data without consent. debian and ubuntu solved this problem on a much larger scale without end user tracking. your comment is both factually incorrect (i have been a prod sysadmin in hostile environments for 20+ years) as well as a red herring (due to what i assume is ignorance of the state of the art)