thumbnail of tor-ball.jpg
thumbnail of tor-ball.jpg
tor-ball jpg
(23.16 KB, 424x389)
thumbnail of face-of-coding.jpg
thumbnail of face-of-coding.jpg
face-of-coding jpg
(446.02 KB, 1400x814)
 >>/19630/
> Also TOR INC (the company that receives the 6 figure donation$$$) is stuffed full of sjw loonies/feminist nutcases/slandering whores. 

It is perfectly ok in modern IT world, especially in West. I'd be surprised if some known and popular software-related organization wouldn't be filled with these people.

It is more interesting why it works like this.

 >>/19641/
> How viable is security via obfuscation, blending in, hiding in plain sight? Is there any options for this? I know user agent spoofing exist for example.

Every security-related question about internet must be started with some things in mind: what do you want to hide and from who you are hiding.

Because there is serious difference in methods of hiding and seeking depending on context. Tor browser already tries to obfuscate some your info (and sometimes don't: https://trac.torproject.org/projects/tor/ticket/27845 )