The VPN client uses a network lock, but can these techniques capture my person info:
When a user opened the spreadsheet, it would silently connect to a server controlled by police. Investigators would receive their real IP address, and not the anonymous IP address they would otherwise be assigned by Tor.
have embedded tiny invisible images inside emails for years to track who opens their emails, at what time, and from where.
How do I protect myself from this?