

who and what is your threat model? as @macros@feddit.org pointed out this article was probably rather accurate.
if you just want to browse anonymously - it is likely, that even the biggest tech corpos can’t de-anonymise you.
if you do small time crime, like buying and selling contraband - likely law enforcement would try to catch you in the real world. you have more vertices and vulnerabilities there, different enforcement agencies are experienced exploiting these.
if you paint a big ass target on your back and get the interest of the CIA or similar - you are probably fucked one way or the other. they may have the ability to de-anonymise you. but if you listen to people that did get caught or do the catching (e.g: darknet diaries), most of the times it is a small mistake. if you only ever play defence, that is enough to loose the game. but what are your options if your adversary is a national agency?

most people can get behind parental control. that is why bad actors are pushing for age verification everywhere nowadays.
i think the issue many people have with that field is, that it enables bad actors to do things. all the while, it does not really do the thing it is supposed to do: if i trust my kid with
sudo, the field can easily be altered. if i do not trust my kid withsudo, it cannot install anything either way.with your last paragraph i (and probably most people) agree. but we already have those tools, right? at least until i knew computers better than my parents, there was no way i could install anything without them being OK with it. even when i was admin on my very own desktop, i was heavily reliant on the parents for everything costing money. yes, even my dumb ass figured out how to pirate stuff. but to do that while being afraid to brick your precious device with some virus - you need some tech literacy, which is for sure beyond changing one value.