Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: unixfox

> If you use the internet, a land line, a cell phone, credit
> card, CB radio, etc ,etc. you can be tracked. PERIOD.

Indeed, but you can minimize your exposure, and you can shield your content from the spooks.

Here are some simple steps anybody can take.

* Use cash whenever possible, especially for things like church or political giving and ammo and firearms. I understand that some political giving must be done with credit card, but limit these as much as possible. Cash is always better.

* Turn your cell phone off unless you absolutely need it. They cannot track your whereabouts if your cell phone is off. This is especially important if you have a “smart” phone, though with some of those, you may need to remove the battery if you can. I advise against using “smart” phones at all.

* If all you do with your computer is email, browse, write letters, and maintain a few spreadsheets, use Linux. For newbies, I can recommend Ubuntu and its variants, or perhaps CentOS.

* If you have applications that must run under Windows, like Video or Audio editing and recording (Cuebase, Camtasia, etc), use a separate computer that is not connected to the internet. You can transfer files with “sneakernet” (usb “thumb” drive). If you have the know-how, you could create a local subnet that has no visibility beyond your environment.

* If you cannot have two separate computers, most modern computers are fully capable of creating “Virtual Machines”. Use VirtualBox for Linux and create a Windows “guest” with limited or no internet access. Files can be transferred through “shared” disk folders. You can use your current Windows license, usually on a sticker somewhere on your computrer, to activate Windows on the guest.

* Only connect your computer to the internet when you need to get email or browse. All other times, either disable the network device or shut off your computer. In Linux you can easily do this from the command line.

* Do not use Google, Apple, or Microsoft applications. Most of them are phishing expeditions and have “back doors” for the spooks.

* If you have an Apple, you’re hosed, unless you can get it to work without an internet connection. Then you can make it your secondary computer, used only for applications that won’t run on Linux.


17 posted on 06/15/2013 6:50:52 AM PDT by Westbrook (Children do not divide your love, they multiply it.)
[ Post Reply | Private Reply | To 12 | View Replies ]


To: Westbrook

You have provided some good advice. However, you can barely move these days without a camera watching your every move.

We have succumbed to the most surveilled society in the history of mankind. And there is no escaping it.

But we still can’t find out if Zer0 has a valid birth certificate? PATHETIC.


19 posted on 06/15/2013 7:02:48 AM PDT by unixfox (Abolish Slavery, Repeal The 16th Amendment!)
[ Post Reply | Private Reply | To 17 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson