Since Wireguard uses UDP and peers only reply to a received packet if it's expected and valid, it won't show up in port scans and barely increases your attack surface. Tailscale and Zerotier are quite nice, but personally I dislike NAT-punching protocols.
Yes, I am aware of what they do. And I am of the opinion that spreading access to knowledge is vastly more important than copyright laws made decades before the internet was a thing. Especially when is comes to US copyright laws being forced upon the rest of the world.
A computer that is used by a user, aka "not a server"
Bad analogy imho. This would be like going in a mall, entering a store, and being told that it's actually a house and you're trespassing
Weather getting ever odder you say? Hmmm
Contributing by updating roads and POIs is fairly straightforward and can be pretty fun ^^ https://openstreetmaps.org/edit
I'm sure he's devastated.
Not true, SSH keys need their passphrase to be used. If you don't set one, that's on you.
Probably not worth trying to actually use today. I'd leave it as it is, imo it's better as a small piece of history - Android on PC is pretty niche
European law generally isn't precedent-based, but the commission already put out a statement saying that "pay-or-okay" models are not GDPR compliant. https://www.edpb.europa.eu/system/files/2024-04/edpb_opinion_202408_consentorpay_en.pdf
You do realize that you are not answering in good faith, nor providing anything to this thread with this comment? You're being one of the people you're complaining about ¯\_(ツ)_/¯
It seems like your whole threat model is avoiding DNS poisoning, which is fine, but I fail to see how you can compare using DoH/DoT to a VPN.
Except for the DNS provider (in your example, Google, so... yikes), the operator of the network you're on (since the destination IP can be rDNS'd or WHOIS'd, or simply grabbed from the Host header if your browser still tries HTTP first). Any traffic that is not encrypted will be snoopable. Traffic volume and connection times to each destination can be analyzed.
By contrast, a VPN will also use secure (if you trust the provider ofc) DNS servers for your requests, plus making all of the traffic completely opaque except for "going to this server".
You can also make your own, free VPN service with a little technical knowledge.