is yourself. just don't rise attention with your own hardware ok? if you are under governments monitoring because of rising red flags so they can see you and your destination, they have access to these two points and easily can monitor you. same thing goes for any programmer with enough access.
spoofing the user agent for the browser and screen size attributes is not cumbersome. one more thing before i leave this interesting discussion; have a look at a program called "ProxyChains". it is used in Kali, where you can add your own list of proxies. Thank you.
And they monitor the cables that data travels over already...
Обсуждают сегодня