You are viewing a single comment's thread.

view the rest of the comments →

0
3

[–] Spinteresting 0 points 3 points (+3|-0) ago 

This is an issue, obviously. I can't think of any way to circumvent that.

If you use the Tor Browser or Tor without the browser, you have to download it from somewhere first. The moment you do that, as far as I know, the NSA or some other alphabet soup agency considers you a person of interest and adds you to some database. While the Tor Browser anonymises you somewhat, the data traffic is recognisable and stored, as far as I am aware, indefinitely, just like all encrypted data which can, at the time of collection, not be decrypted for a possible decryption at a later date.

If you jump through some more hoops and use an air-gapped computer, make encrypted e-mail accounts via pre-paid phones and don't reveal too much about yourself, your browsing habits and forensic linguistics can still give your identity away.

Even if you don't make any mistakes in software, as the recent WikiLeaks dump regarding the cyber weapons arsenal of the CIA shows, encrypted data traffic is meaningless when hardware you rely on is compromised.

I base my opinions on the following videos and articles by, among others, a private investigator. Should you choose to watch one of the videos of the private investigator in its entirety, I'd recommend the more current, second one, as it mostly overlaps with the first one and also goes into some detail about the encryption Apple uses for their devices:

https://www.youtube.com/watch?v=dNZrq2iK87k

https://www.youtube.com/watch?v=k57XIgZiPOM

Julian Assange's press conference on Vault 7, the cyber weapons arsenal of the CIA:

https://www.youtube.com/watch?v=uxmMt4EW3PQ

The Intercept's guide to leaking and how to run a "rogue" Twitter account:

https://theintercept.com/leak/

https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/