Google, Facebook, your ISP, your cell provider, and many others watch everything you do. What you type, what you search, what you view, who you talk to and when, etc.. And this is analyzed by algorithms and networks are formed and understood. An entire world of people is being manipulated by their data, politically, socially; manipulated to be better consumers, to follow specific political ideologies, to hate some while loving others.
And yet, despite all this, people still say, "Well, I have nothing to hide!" But do you not have the right to talk and act without someone looking over your shoulder every moment, then manipulating you and potentially prosecuting you based on what you say or do? And to prevent a lot of this spying is fairly easy. Chain a couple VPNs then run them through TOR with limited iptables and kill switches. Install a privacy based OS on your phone, use encrypted texting, and leave it at home or put it in a faraday bag when you go out. Even better yet, just use VOIP texting/calls from a secure machine or just use a house phone. Don't use social media. Block tracking with extensions like UBlock Origin. Etc.
You could set up a pretty privacy secure system in a day, and yet people don't. They just feed the monster, more, and morw. Its like shooting yourself and the future of society in the foot every day. When will people learn that the current level of tracking and privacy invasion is a massive threat to individual and social freedoms and make the minimal amount of effort to try and stop it? Why are people so fucking dense and stubborn with protecting their data?
If you think you can hide your activity to intelligence agencies using, "one cool trick", you're a moron. If you want to protect yourself from non government entities, practice good opsec. But don't fool yourself into thinking Uncle Sam can't watch you when he wants to.
Lol I wouldn't want to deal with all that even if I was drug dealing child pornographer
Brody Roberts
Of course if you became a person of interest a skilled hacker could likely find ways to track you and read your data, but that is not the case for most people. Most of the data that gets collected is done simply through wide sweeps, that get everyone. Then, if you become a person of interest later, they can search through that sweep data and hone it in on you. And for that, using a combo of VPN, TOR, encrypted cell communications, open source OS, limited use, signal blocking, etc. I think can be very effective. Yes, you may not cover everything, but if you can significantly reduce what they get from you, its worth while.
Why not. You can set it all up in a day and then just switch over from your old methods to the new ones after? Is taking a day for this really worth giving up all your privacy and contributing to the system of mass tech surveillance social engineering that grows larger and more powerful each day?
Oliver White
You already have to pay good money for a fast VPN even without a dedicated server, who would want to bottleneck it with tor. That's not even including the larpy stuff with the Faraday cage.
WRONG. They record everything we do and back it up - they don't have the manpower to manually sift through all of that data, no one does. And that's an important distinction for anyone posting here.
Chase Williams
Nobody is watching, they just try to desperately save everything and hope that items of interest can be recalled when it becomes relevant. Internet traffic is a fire hose and big brother is drowning in it.
Henry Johnson
KILL ALL TECH COMPANIES, jEWS, AND FEDS
Christopher Jackson
Tor works to separate IP from routing. If you are not on your home internet and no personally identifying info about you is on the device or sent in packets, no javascript exploit or processor backdoor can affect you.
Jace Ortiz
Yeah goy user go bareback on the interwebs, condoms are made by the jews!
All that rich conntent!
Manually - I have some bad news for you
Alexander Jenkins
...
Jack Wright
Of course they aren't actually watching everything everyone does in real time. The manpower for that would be unreal. They collect your data, then use it in algorithms and if you become a person of interest later, then they will actually go through it, and perhaps then start real time monitoring things like cell location, etc. But if the later is true, it is essentially like they are watching you, for even though they might be doing so now, your entire history is backed up for them to access anytime they wish.
Ryder Stewart
Lies.
Also chemical castration isn’t real. It’s a meme.
Brayden Wright
Uhh yeah tor is REALLY slow my dude, are you trying to argue the contrary?
Luis Gomez
Sorry I'm not up on the latest maymays what's an endnigger?
Eli Torres
Good image. RIP original nyaa and your thousands of rare old fansubs that will never see the light of day again. It'd be cool to pool some people together and create a backup server for this reason, that would automatically scrape sites of interest, in case they shut down.
Like go on YouTube (behind seven proxies) and you will still find the oldfag Grumpy Jiisan /a/ videos are still up after many years. Go on Frank Yang's YouTube channel though (/fit/) and you will see he recently removed all of videos. Same thing with lolicore.ch, which had thousands and thousands of breakcore, lolicore, etc. albums on it from the golden era of the net. This also went down recently (though thankfully someone uploaded a mirror on a new URL).
SAVE THE MEMES FOR FUTURE GENERATIONS
Cameron Collins
VPN & TOR are useles if you don't negate Windows/Intel Managment Engine
1. DO NOT use Windows (or Apple) 2. DO NOT use a cpu with Intel-ME (VPro)
nice easy setup for noobies 1. get a cpu/motherboard prior to 2008? (32 bit processors are fine) 2. install Linux Mint (easy as pie) 3. install Firefox add-ons U-Matrix and U-Block-origin and HTTPS-everywhere 4. get a VPN (one outside 14 eyes) 2.
Cameron Campbell
Yeah, no shit you don't use Windows. Why is that even worth mentioning? Anyone who would want to run a privacy based system but would do so on Microshit would be a total moron.
Also, if you want to also avoid Intel-ME, I'd suggest going a step further and putting libre/coreboot as a firmware replacement as well. Old thinkpads are a good option for this.
Nice easy setup, overall, though. Maybe add hard drive encryption during Linux install as well.
Jaxson Roberts
You're making a really simple mistake, OP. Your assumption is that you're the one capable of deciding which data you share or won’t share. However, you’re not, everybody else is. This is actually kind of brilliant: Google and co. don’t try to appeal to the privacy-aware people, they focus on the stupid friends of the privacy-aware people, or their governments and other public institutions. Current your and my data is in the hands of utter morons. Hospitals and insurance companies using American hardware and software with proven backdoors, your friends and family using spyware apps, universities using Google’s or Microsoft’s web services, etc. How do we fight this? I don’t know.
Cameron Bell
I am making that post for noobs
John Brown
if you dont want to be fucked with you have to go somewhere where they won't
David Lopez
Very good point and nice clip. The chain is only as strong as it's weakest link, and unfortunately most of the links now are broken.
I have found some personal success in pushing privacy views and apps/software/OS on a lot of people I know, though. Most people I know now only contact me through encrypted text and voice after I pushed them to install such apps on their phones, or else just not be able to reach me. For facial recognition, I don't let people take pictures of me with cell phones, and if they take it with a camera, request they not put it online. If I find someone has posted a photo of me online, I won't let that person take photos of me anymore. The increased popularity of privacy invasion from big tech in the news and PRISM makes it easier to push people over to being more privacy conscienceless, as well.
Is all this extra work? Yes. Does it make you seem paranoid to most people? Yes. But I have found it effective in a lot of ways too. I also think it's worth the effort. If you truly believe that the current state of privacy invasion and social/individual manipulation gathered through data mining (and personal tracking for special interest cases) is a serious problem, then you should be willing to take steps to stop it, even if it creates some inconveniences or changes for you and friends/family. That's how I feel at least.
David Price
kek. and you were doing so well till then OP.
Brody Perez
Also, for as how to fight this on a wider scale, I think general social influence tactics can have a big difference, if repeated enough to gain notice. For example, I live in a major city. Over a couple days, I then printed thousands of double sided sheets on a printer I had access to that I could print for free on. The first side had a list of the ways people are being tracked every day, along with sites where people could read more. The back side contained information on very basic ways to protect your privacy, like stated:
as well as more sites with more info, like the EFF, Riseup's security guide, etc.
I then went around the city for a few days and left these print outs on the subways, at bus stops, in the main train station, in cafes, etc.. Will this single act have an effect on society? No. But it could have an effect on individuals, and if done as simply one action in a greater series of actions and conversations, then I think it actually could have a wider influence on the general public.
Meme magic is real, but only if the people have a believing heart. How to facilitate this is what we need to figure out. And while most now do not even know who Lain is, I believe that someday, if we work towards it, perhaps we truly will all love Lain.
Matthew Rivera
CIA Nigger pls.
Jonathan Richardson
There is truth to this, though. At least in America, it is much harder to (legally) tap a house phone. You don't need shit for warrants to trace someone's cell phone and a cell is also going to be caught up in all the general data mining that exists, which can then be pin pointed on you specifically. A house phone, on the other hand, provides significantly less data (ex. no text messages, no GPS tracking that maps your every movement, etc.). In order to (legally) tap someone's house phone, you also need a warrant from a judge to do so.
Jonathan Foster
One user in the past suggest a tarbomb like approach
Flood there monitoring with so many false positives that you overload their capacity
Luis Moore
This Anti Shabbos is exposing them and all this info daily!! If you havnt heard
Start exposing all the bad behaviors of intel agencies, tech companies by making a website where all the pentesters can drop the nasty things that they found
Start teaching normies how technology work, because when you don't know how computers work, you can't understand the exploits
Then all the user, and people who are tired of this uncle sam have to regroup themselves and start building new computer OS with an ultra sophisticated bots that perform the securitt guard of your computer..
Finally, build a new INTERNET
Aaron Nguyen
You’re clinically retarded.
Hunter Carter
Here is a site with some nice instructions on how to make DIY phone bags:
The HF+LF Shielding fabric they reference in it can easily be purchased online through numerous sources and blocks a signal DB rating enough to fully block out wifi, 4G, and GPS frequencies. It's also fairly cheap and a yard of it is enough to make not just a Farday bag for yourself, but a dozen others, as well.
The benefit of the Faraday bag is that you can bring your cell phone anywhere you go, but not have it be visible to any type of tower, GPS, etc. tracking, until you wish it to be so, by taking it out of the Faraday bag, if you decide to do so.
To address the possibility that your phone may still be audio recording you even when turned off, you can use a mic blocker, which acts as a dead end external mic, and redirects audio recording to nothing.
Or anons file lawsuit at every college and university in the US that recieves tax money and argue for open-source non-botnet non-js software for courses and then do it again with your doctors and dentists. It will work.
Aaron Edwards
...
Matthew Baker
Well you tor boys sure care your the third one to reply to that same post.
Isaiah Taylor
Any audio plug will work so long as it is trrs not trs. Notice in user's pic related the two sections between the tip and base (sleeve), they are called rings; tip, ring, ring, sleeve.
Cameron Garcia
I pity the guys who are charged with keeping an eye on gabbai.
VPNs can see whatever you do. VPNs before Tor means any of your VPNs can rat you out. VPN after Tor means the VPN only knows that some Torfag was doing something on their VPN, they can't connect back to you personally.
NSA collects all unencrypted phone calls including house phones.
Signal is the only messaging ap I trust to be secure, most of the others are compromised.
Gabriel Bailey
Not all phones and they are mechanical switches when plugged in to audio jack.
Carson Fisher
Obvious NSA blackpilling attempt. You're intentionally vague (you can't beat the government) instead of talking about beating any specific government spying program, which can absolutely be done.
NSA bulk browsing collection: hindered by no-log VPN or Tor
NSA e-mail collection: defeated by encrypted e-mail
CIA hacking tools: hindered by antivirus and hardened operating system.
Prove you're not a fed by discussing specific vulnerabilities you're concerned about in a factual manner without vague blackpilling.
Camden Watson
Opsec beats the hell out of being murdered or gulaged.
Using proper opsec PREVENTS you from becoming a person of interest.
Faraday cages aren't a larp. Drug dealers wrap their burner phones in aluminum foil pretty regularly now to deny the police information about their location.
In that situation Tor denies them your location.
Joshua Myers
Windows does suck, but this is a little bit of a meme. Windows with Tor browser or even firefox private mode with a VPN still defeats most of their passive data collection, it's just a lot easier to hack Windows.
Linux Mint is much better than Windows, but far from the best version of Linux if you're concerned about security. If Windows is a 1/10 on security (it is), and Apple is 3/10, Mint would be like 6/10. I'd be thinking more like Tails, Kali, or Qubes.
Julian Adams
There are open source picture/video apps that you can find in Google and Apple stores. Probably not the most secure thing, but better than sending everything straight to Google like the default apps do. I encourage normies to use these.
Aiden Butler
Thank you for getting off your ass and doing something about this.
Nathaniel Gomez
I've done all the measures, no vpro intel CPU, uses linux and VPN. Fuck GCHQ, CIA and other spy niggers
Jack Foster
…but you give positive reviews to stuff you pirate and like? Discuss it with people, suggest it to them? Did some of the bought a copy of the product you've been supporting? And online service… You don't "pirate gmail" or similar services. You simply set up an account and use it "for free", right?
Ryder Sanchez
NSA is bulk collecting phone calls, not tapping phones. They probably can't get every single call from a home phone, but they get a lot of them and I would assume every call is being recorded if it's not encrypted.
This approach will appeal to reasonable people of above average intelligence. Not a bad approach, but useless for an 85 IQ mouth breather working at McDonald's. You have to use pure meme magic to reach them. Look at how this old white COP is able to get a room full of blacks riled up and supporting him by talking about something they know and understand (CIA creating crack cocaine):
A few layers of aluminum foil are surprisingly effective.
Do you know any lawyers that have the resources to take on any of those suits? Actual question, not trying to be a blackpilled dick.
Dylan Rogers
lolno. The Tor browser is notorious for having dated exploits (ex: payloads via webfonts) and it was never designed to reject tracking cookies or wipe tab history, which is primarily how people get identified. Also windows is riddled with back doors, state threats don't have to hack shit. Hacking is for skids and incompetent foreign state agents that cant find said back doors. The correct method is using a physical gateway for Tor and using virtualized desktops to try and protect your host system, like qubesOS does.
Jeremiah Martin
Sadly not anymore. Good English language anime discussion died in early 2014.
Yeah, that's the problem I also considered when thinking of this. Most phones actually only have one mic, though. The mic you use when the phone is by your head is the same one used when on speakerphone. How to block this mic, I have yet to figure out.
I've tried various DIY noise blocking phone cases, but none seem to block noise well enough. I want to try a ballistic gel case next, as I think the density, which is almost like water, might be enough to work. Alternatively, I wonder if you would be able to physically removed the mouthpiece mic and only use the external mic via a headset, or if this would cause the phone to refuse booting, etc.
Don't trust Signal too much. Its servers are AmazonAWS and it is closed source. Look into Conversations, which is open source and runs off of XMPP servers (you can also choose which XMPP server you use, and even host you own), with OTR, GPG, OMEMO as encryption options. I also feel like Conversations is less likely to be a honeypot because it is less commonly used and promoted in radical communities, etc.
Of course then,you have to get people to move from Signal to Conversations, and with Signal becoming a more widely used standard for encrypted cell communication, that becomes a whole new endeavor. All you can do is try though, and what first might just be you and a couple tech nerds using [TECHNOLOGY], eventually with enough pushing, it might become a much larger group. That's how it was for me with Signal and I hope a switch to Conversations and whatever else follows, will turn out the same.
Henry Clark
Didn't your image contain some… suggestions?
Kayden Martin
Buying based on age isn't enough. Via CPUs just got exposed for have a built in instruction set that gives user privileges just by typing in a certain memory address. Honestly PowerPC seems to be the way to go.
Jonathan Phillips
Exactly that's meta discussion not anime discussion.
Austin Watson
…in this thread. Let me get it straight: when asked, you would suggest some "good thing to see" animo you pirated at some time?
Jose Garcia
… you;re not from around here are you, we don't cotton to strangers, i think you better scram, weirdo
Sebastian Sullivan
You begin by dismissing the legitimacy of Tor browser, which is when I realized you were full of shit. NSA's own documents state that Tor is nearly impossible for them to defeat.
Turn them off. I believe this is turned off in the default settings.
This is not stored in default settings.
The definition of a back door is a vulnerability that allows it to be hacked. Inb4 you start arguing about what words mean to steer this discussion in the wrong direction because you got caught out so badly.
It doesn't store the conversations on its servers, and its used by US State Department. If there were a backdoor, the chinks and the russians would hack every US diplomat on earth.
Henry Sanders
link to said documents?
Charles Adams
Shut your whore mouth and let the guy speak for himself. Negro.
Cameron Sanchez
Agreed. Reviews on torrents are often exceptionally helpful. For anime (at least before Daiz and Crunchyroll killed fansubs), user comments were very good in determining which release had the best translation and A/V quality. This was especially useful if archiving and building a library. For software, such comments help users determine which release is least likely to contain viruses, able actually function without having a lot of defects, allow updates, etc..
Kayden Sanders
but we already know this goy
Dylan Young
be me, no phone, social media, use startpage [dot] com for searches, socks5 and VPN
I wonder why they are trying to ban end to end encryption
Levi Garcia
Exactly. This, reviews like that count as "advertising". People talk about shit, make it famous, money flows, even if piracy was involved.
Isaac Price
Those fucking japs, using google to sell fansubbed 80s mecha.
Joseph Robinson
Sir, you jest.
Aiden Bennett
Statistical correlation made possible via global bulk collection. See "Global adversary".
With the previously stated bulk collection, they have all encrypted comms. Now its just a matter of time before modern standard encryption is broken, once it is they have all past comms unencrypted.
Most importantly, what negates all previous points, hardware back doors for which there is no practical defense. We cant all manufacture our own hardware. Even if you could, you would require electrical engineering expertise to ensure the design does not have a hidden hardware back door.
As an aside, depending on geographic location you are more likely to become a POI by using anonymizing software such as TOR. Unless you are in a major city its largely pointless and only makes you stand out more.
Nicholas Sanchez
You're right. There's also a lot of hentai on nyaa.
No. They have to compromise both nodes in order to even begin to do this, and it still takes a great deal of time to start to guess what websites you visit. This can be countered by always using Tor and other methods such as cover traffic that make correlation far more difficult. Even if they figure out where you went, they have no idea what you did there.
Yes, you should avoid giving personal information even in an encrypted communication. But we aren't close to breaking strong encryption like AE 256. It's not even on the horizon.
You can patch the back doors as they become known. You're implying the feds can just get into any device at will, without being detected, and do whatever they want, which is nonsense.
Bullshit, you fucking fed. Visiting 8 chan bumps you up the threat algorithm a lot higher than Tor use does. You're too obvious with the blackpilling combined with suggesting that protecting ourselves will actually put us at risk.
Evan Long
I don't have much hope for the ones most likely to get it either. Sage for off topic
James Foster
Just to tell you, its written in the STANDARDS of Tor, they NEVER intented to defend themselves against traffic analysis. So you're just lying. And obviously, it's not considering that most of Tor nodes are US controlled, which at 90% chance they certainly are.
You can patch what? Do you know how to patch the firmware of your HDD? Patch literaly the 20 differents components in your computer that could hold any backdoor? You can't, that's a retarded point. Moreover, who cares about the fed. We're talking about the NSA, and other three letters agencies that we know and don't know about. They basically can do anything to anyone. You're making pure none sense. And it's not like Edward Snowden exists.
You're the retard. You're considering that only Tor exists as a mean of anonymity. Everything is just a matter of protocol.
The reality behind Tor is that Tor have been built by the US government, and it's very likely that its main use is actually a door for US operations themselves. We never were the target in the first place. You'll never see any weird revelation or attack on Tor that could let think that Tor is totaly controlled by them, for the simple reason that they need Tor users to actually believe its trustful. Moreover, stopping pedos/little delinquent is the job of the FED, as you said, NSA/CIA don't give a fuck about pedos, nor about drug (the CIA is basically the biggest drug dealer in the world). You shall never use Tor without a VPN to hide out your traffic. I remember some hackers btw, saying that Tor is the absolute dream for any MitM attack. I think that's the one who stole a lot of private information just controlling some Tor nodes.
It's 2018. People needs to understand that (nearly) nothing is free, especially these kind of tools.
Aiden Evans
Let's walk through your logic. Tor's standards say they don't explicitly defend against traffic analyis. You claim this means that absolutely nothing can be done about traffic analysis. Your claim is totally unsupported by the evidence you just presented. The evidence only says that Tor doesn't claim to be foolproof. However Tor does have built-in, strong defenses against traffic analysis. Unlike a VPN, they have to compromise both nodes, and get a lot of information on your traffic to even have a chance to figure you out.
Now, I have a question. Why are you using faulty logic that doesn't come close to proving your point? Why do you combine this faulty logic with extreme aggression and personal attacks? You are using all of the tricks that an intelligence operative would use to dissuade us from countering your surveillance.
You'd certainly like us to believe this is within the capabilities of your employer, wouldn't you?
No, I'm not. You are now lying about what I said because you can't discredit any of the facts that demolish your NSA blackpilling attempts. Why do you lie and constantly use inflammatory rhetoric devoid of facts, then pretend you stand for privacy and freedom?
If it argues like COINTELPRO, it's COINTELPRO.
I'm glad you work for the NSA, not the CIA. You may avoid the day of the rope, but I doubt it.
Christian Gomez
umm no, sorry sweetie, but you are a torcuck and wrote that "document" in power point by yourself to trick ppl
Justin Young
Okay you got me, fucking idiot.
James Young
FYI for any alphabets reading this who know im actually not a fed, if you want to change that I'd be happy to oblige. You know what i can do.
I mean, just search "tor traffic analysis" and stop being a fucktard.
Dude, wtf… READ THE FUCKING STANDARD (chapter 3): "A global passive adversary is the most commonly assumed threat when analyzing theoretical anonymity designs. But like all practical low-latency systems, Tor does not protect against such a strong adversary. Instead, we assume an adversary who can observe some fraction of network traffic; who can generate, modify, delete, or delay traffic" svn.torproject.org/svn/projects/design-paper/tor-design.html
I just did some basic research on fucking startpage.
Gabriel Wood
...
Carter Perez
The shills aren't sending their best.
We all know. You're not very clever, and neither is this "admit it but pretend you're joking" gambit you're trying because your counterintelligence tactics keep getting called out and countered and you're worried people will pay attention and learn what to do when you come back to another thread. Faggot.
The statement
is a perfect description of the NSA. They do not have 100% control of Tor nodes as you are implying, it's probably not even 1%. Caught lying about NSA capabilities yet again. Do you actually believe this shit or is this what your boss tells you to say?
It actually sounds like you believe the shit you're saying, and I'd like to redpill you in order to undermine your future work product. Did you read the Tor Stinks presentation? They don't share that kind of information with you, but Tor is a very powerful tool for overcoming NSA's passive data collection. Not impossible to overcome, but remarkably powerful given the ease of use (just download the browser). You are grossly overestimating the ninja power of your employer. You're also intelligent enough to do your own research and see that they've been lying to you.
Another logical fallacy. You're implicitly claiming "all programs funded by the government are compromised." Obviously the government uses programs and would not want an adversary to be able to access them, so we can disprove this claim quite easily. In order to prove Tor is compromised, you need to prove an actual compromise. It's open source, so this would be easy to do if such a compromise existed.
Why would you use startpage if opsec is pointless and Tor is compromised like you were just saying? This is your most damning comment of all, you practice advanced opsec but don't believe in opsec? You're a fucking spook, bro. Give it up, and join the resistance.
Shills supporting each other.
Gavin Nguyen
Now is the point in my COINTEL training where Im supposed to say this is clearly the result of some delusional mental illness, then you say this is textbook shilling in response.
Whether I really am or not doesnt matter to the pleasure I'm taking in your paranoia, because youre such a gigantic fact ignoring faggot i really hope your mental illness progresses to the point of offing yourself while thinking its actually some spooks doing it.
Cooper Martinez
I'm speechless. I mean, at least try.
Justin Sanchez
I think maybe hes trolling?
Jaxson Ramirez
This is a stupid generic black pilled response. It shows that you don't know what you're talking about as far as technical threat analysis goes. The NSA isn't some agency of magic wizardy. If I has to given them my hard drive with AES 512, layered with Twofish, layer with a few more layers of encryption, then five factor authentication and a 150 character password and say, "Here, crack this," how would they go about that? Mathematical impossibility and current limitations of technology would make it impossible to do so.
The type of mentality is very dangerous because of how defeatist it is. Just because a group is powerful, skilled, and has a lot of resources doesn't mean they are gods. The NSA is just like any other security group, except with a lot more computing power and data to work with. They still have limitations, and we still have ways to protect ourselves from them, even if they do not cover all 100% of situations and there are unknown backdoors, etc.. With your mentality, we might all just lay down and die, for all hope is lost. Take your illogical black pill elsewhere. Maybe go study networking, systems, and encryption for a bit instead of shitposting.
Wyatt Howard
What the fuck dont you understand about hardware backdoors you fucking idiot? You think youre safe when the OS is booted with something like that in play?
Jonathan Nelson
You're right, I was wrong to overgeneralize like I did. What I wanted to say is that there must be little "sections" used by the head of the US that basically can do anything to anyone. Now, the NSA is as you said, and surveillance is not that good yet, that's for sure. But in a very close future, that'll go crazy. Just look at the social credit system in China, that plan to use facial recognition to punish people directly on act. That's a future that will be true, at some point. My point of view regarding surveillance is that it's not mature yet, they're building it, thus not really using it directly on us. (and that's not that true, knowing Palantir, and how they took down groups in my country that could threaten them, without anyone noticing).
There will be always a way out, I'm convinced of that. But it'll be very costly. Just an exemple, in the history of china, under the Qing dinasty, they would kill an entire village if they heard just a glimpse or criticism towards the emperor from ONE person. Death penalty to any chinese that would not shave his forhead and not have its "queue" haircut. It lasted for a very long time. They are a lot of exemple of shit like that in history. Never assume that you'll always have your freedom etc… Shit can get real very fast, and everything can only get worst. Progressism is a lie. I'm personaly sur that the next civilization, the "new age", that will emerged from the economical crysis/ww3, or later if things change (russia seem to impose their multipolar globalist vision), this will have the worst monstruous oppression system ever conceived. The Stasi in eastern germany would know every details of everyone's life. Computers did not exist (were not in use globally). Now, just fucking imagine what is possible.
Julian Moore
He's just going to continue bitching about And the resistance like an edgy 16 year old faggot. Preachy boy probably not even using half the countermeasures hes pushing, not that they are all that important because again, hardware backdoors.
Juan Morgan
OP is obviously a person who doesn't know how to influence people IRL. Or a troll.
Kevin Gray
You guys are a lot more obvious than you think. And you have no idea how dangerous it is going to be for people like you. Imagine begging for your life from an angry mob, and the only person left to possibly intervene and try to calm them down will be someone like me. Get out while you can.
Why the fuck don't you explain yourself with facts and calm, rational analysis instead of squealing like a child without saying anything of substance. Blatant COINTELPRO, you faggot.
At least pretend to be one of us when you agree with the other shills.
Isaac Howard
Indeed nobody is watchig, but they are storing massive data in the hopes of eventually quantum computers help making any sense from Pepe memes and zoo porn.
Asher Ramirez
At that point you can assume they have this technology since a long time. Maybe it's not the case, but it certainly is.
Cooper Reyes
At this point I'm ready to throw my hard drive in the river, only use live CD's, and buy a new burner phone every month. Not that I have anything to hide it's just a matter of principle.
Check out TailOS, you download it and burn it to a cd, and then boot your computer from the CD. After you reboot no trace is left on the computer.
For those who want convenience you can get a Tor hardware router. Its not perfect but its better than nothing. I got mine from this site: anonabox.com/ Or if you are tech savvy build your own, there are plenty of instructions online how to go about it. You can get TailsOS USB thumb drives on ebay for under $20. There is no excuse to have at least SOME security.