Oddbean new post about | logout
 The next step would be private, personal relays running on your device/phone.  I am working with the assumption that your personal data is being stored by an adversary to begin with. It’s all about tradeoffs.