

Yes, the cell tower can see the unique IMEI of your phone, so as long as the cell radio is on, the cell company can at least see what tower that IMEI is in range of. And if they can track the purchase of the phone to you, then they can identify your signal.


It’s common in the US Tech industry. It’s considered “voluntary” because you could always say no and find a different job, or you could negotiate the removal of that clause. Often at the beginning they give you an opportunity to list your existing obligations that would be exempted. Always read the fine print of your employment agreement.
And they keep making it harder and harder to not use a Microsoft Account.
Assuming that you trust what Proton says, when they receive a (possibly unencrypted) message they re-encrypt it with your key as soon as possible and they don’t log the content. So, after that point, they (or anyone else) can’t read the email contents. If it was also encrypted in transit, then there’s only a small window inside their email processing system where the plaintext was passed from one encryption to the other. It’s only decrypted again in your browser or proton mail app with the key that only you have. It’s not bulletproof, but it’s better than most providers.
Your domain name could be ordered to be removed from US-based dns providers, no matter which TLD it is. That would essentially block your website from most US-based viewers without actually shutting down your hosting. Advanced users could still get to it, though. Consider hosting through Tor and a .onion address for more resiliency.
Look into https://simplelogin.io/
They make creating random aliases for custom domains like this easy.
As for the domain name itself, anything that already looks like a mail service is good. “examplemail.com” or “mailexample.com”
Tailscale (https://tailscale.com/) works great for remote access to your private services. Once the wireguard tunnel is established, then the traffic is peer-to-peer (assuming it’s configured correctly) and not through their centralized servers. Even from a mobile device.
You might enjoy reading Extreme Privacy by Michael Bazzell


The vendor will absolutely take that custom code and use it to extract maximum profit from a different customer. I’ve experienced it from both sides of the transaction. Open source at least allows the functionality to be “developed” only once.


It doesn’t even have to be offshore accounts. Just a fat long-term maintenance contract would be enough to hide a lot of corrupt costs.


U.S. Immigration and Customs Enforcement www.ice.gov


https://simplelogin.io/ (owned by Proton) is great for this. They have a feature to generate an email address by random word or even by uuid.


iOS has Lockdown Mode which it sounds like you could benefit from.


Also on iOS: Settings > Phone > Silence Unknown Callers
Looks like you’re paying $138/yr for Proton, SL, and vpn. Consider getting Proton Unlimited for $120/yr which includes all of the above, and use Proton vpn.


Are all of those drives powered up constantly? What’s your power bill like?


Memorize and practice this! You can do it in 2 seconds.
Or HPE software