![Jack Rhysider on Twitter: "People keep asking me what's an alternative. You need to asses your threat model. If you're wanted in Switzerland, then use tor to anonymize your IP when connecting Jack Rhysider on Twitter: "People keep asking me what's an alternative. You need to asses your threat model. If you're wanted in Switzerland, then use tor to anonymize your IP when connecting](https://pbs.twimg.com/profile_images/1375540801401409545/BJLnwbIc_400x400.jpg)
Jack Rhysider on Twitter: "People keep asking me what's an alternative. You need to asses your threat model. If you're wanted in Switzerland, then use tor to anonymize your IP when connecting
![DroneTalks.online: DroneTalks | Francine Zimmermann | Director Aviation Policy and Strategy Division at FOCA on Apple Podcasts DroneTalks.online: DroneTalks | Francine Zimmermann | Director Aviation Policy and Strategy Division at FOCA on Apple Podcasts](https://is2-ssl.mzstatic.com/image/thumb/Podcasts115/v4/f3/d8/8c/f3d88c1a-6196-86ae-d372-c99fe0029264/mza_10380908973102468057.jpg/1200x630wp.png)
DroneTalks.online: DroneTalks | Francine Zimmermann | Director Aviation Policy and Strategy Division at FOCA on Apple Podcasts
![The Cybersecurity 202: Russia agrees to cyber rules and violates them at the same time - The Washington Post The Cybersecurity 202: Russia agrees to cyber rules and violates them at the same time - The Washington Post](https://www.washingtonpost.com/wp-apps/imrs.php?src=https://arc-anglerfish-washpost-prod-washpost.s3.amazonaws.com/public/XJGRJJWMHUI6XIREXVM32IQZPQ.jpg&w=1440)