We aim to preserve the ethnocultural identity of Europe and the countries founded by Europeans through peaceful activism, political education, and community & cultural activities.
-Stop the Islamisation of our countries
-Against globalization
-Stop and reverse the Great Replacement of our people with non-Europeans
Education & Resources
Why We Fight by Guillaume Faye
What is Generation Identity?
A Declaration of War From the Youth of France
A Future For Europe
Video Channels
Identitarian View
The Golden One
Red Ice TV
Defend Europe
Identitarian Organizations to Support:
US: Identity Evropa
UK & Ireland: Generation Identity
Europe: Generation Identity
Official branches in France, Germany, Belgium, Austria, Italy, Czechia and Hungary
Rules
1) No calls for violence, Cultural Marxism, anti-White speech, porn/gore, degeneracy, chronic women blaming (MGTOW), racial epithets, links to other subverses or chronic black-pilling. This is NOT a National Socialist forum. Flagrant and/or repeat violations of the rules will result in a ban.
2) All posts & comments should be made with the intent of gaining the support of the silent majority of normal and decent Europeans and European Americans for the radical goals of stopping and reversing The Great Replacement, and implementing policies that promote the Remigration of non-Europeans from our homelands.
Visit our sister sub on reddit: r/identitarians
view the rest of the comments →
[–] Spinteresting 0 points 3 points 3 points (+3|-0) ago
This is an issue, obviously. I can't think of any way to circumvent that.
If you use the Tor Browser or Tor without the browser, you have to download it from somewhere first. The moment you do that, as far as I know, the NSA or some other alphabet soup agency considers you a person of interest and adds you to some database. While the Tor Browser anonymises you somewhat, the data traffic is recognisable and stored, as far as I am aware, indefinitely, just like all encrypted data which can, at the time of collection, not be decrypted for a possible decryption at a later date.
If you jump through some more hoops and use an air-gapped computer, make encrypted e-mail accounts via pre-paid phones and don't reveal too much about yourself, your browsing habits and forensic linguistics can still give your identity away.
Even if you don't make any mistakes in software, as the recent WikiLeaks dump regarding the cyber weapons arsenal of the CIA shows, encrypted data traffic is meaningless when hardware you rely on is compromised.
I base my opinions on the following videos and articles by, among others, a private investigator. Should you choose to watch one of the videos of the private investigator in its entirety, I'd recommend the more current, second one, as it mostly overlaps with the first one and also goes into some detail about the encryption Apple uses for their devices:
https://www.youtube.com/watch?v=dNZrq2iK87k
https://www.youtube.com/watch?v=k57XIgZiPOM
Julian Assange's press conference on Vault 7, the cyber weapons arsenal of the CIA:
https://www.youtube.com/watch?v=uxmMt4EW3PQ
The Intercept's guide to leaking and how to run a "rogue" Twitter account:
https://theintercept.com/leak/
https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/