If, as you're saying, a complex system of corruption has affected where public money is spent, isn't that actually a great reason to question the legitimacy of police budgets and consider pushing for that money to be spent elsewhere?
Which is exactly why it was chosen, the 'purpose' of networks is moving data from point A to point B so the 'goodness' of networks is how much data from point A to point B and how far away is point A from point B.
Then the Internet became a transport for time sensitive data (movies, voice, Etc.) and so the latency between bits gets wedged in sometimes.
I've always struggled with the application of Jevon's paradox to decision making. Does it mean we shouldn't try to make our usage of scarce resources more efficient?
https://panopticlick.eff.org/ reports that 1 in 1.67 browsers send the DNT header, so the best option fingerprinting-wise might be to leave it on, at least information-wise.
Sorry, I left that part out. My browser sends DNT=1, and I get 1/1.67, which should mean that 1/1.67 browsers send DNT=1. This means that the total share of browsers that send the DNT header at all is at least 1/1.67, but probably higher.
Maybe the making of the thing deprived no one, but once it's made it could always be given to someone else, so owning it means that someone else who could own it doesn't.
U2F credentials are tied to a particular domain, and so do not rely on the user making sure they are on the correct website. As such, they are not susceptible to typical credential phishing attacks.
This is assuming an owned machine. Not the easiest attack but still possible. Obviously things like Google Authenticator (while good) are even more susceptible to MITM phishing.
[1] https://www.pfsense.org/ [2] https://openwrt.org/