I just assume they are, but my threat model isn't trying to defend against state-level actors, which I'd guess is near to impossible. Since my TM is my data thieving ISP, a VPN works well for me.
I just assume they are, but my threat model isn't trying to defend against state-level actors, which I'd guess is near to impossible. Since my TM is my data thieving ISP, a VPN works well for me.