Nut-job Conspiracy Theory Ping!
To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I dont add you to the list...
We all just need to increase our electronic information flow 1000 times the current volume. See if we can clog the drain.
I read someplace that the encrypted emails were given special attention by the gov spies.
“but the PCWorld’s review of the Tor browser shows it to be a slow but anonymous way of browsing the Internet”
TOR was invented by the US Navy!
As of 2012, 80% of the Tor Projects $2M annual budget comes from the United States government.
http://en.wikipedia.org/wiki/Tor_(anonymity_network)
“No Conspiracy Theory Needed: Tor Created for U.S. Govt Spying” The TorFAQ clearly states that exit nodes can eavesdrop. Yes, the guy running the exit node can read the bytes that come in and out there. Tor anonymizes the origin of your traffic, and it makes sure to encrypt everything inside the Tor network, but it does not magically encrypt all traffic throughout the internet.
http://www.networkworld.com/community/blog/no-conspiracy-theory-needed-tor-created-us-go
So think about that: The government was heavily involved in TOR, it seems to be a spy network within the internet which is itself a giant spy network. As if the people with the most to hide are deliberately manipulated to use TOR where their activities can be monitored. I don’t know if TOR deserves trust either.
To protect your PC, unplug it, drag it to back of the garage and cover it with it with an old blanket your dog used to sleep on. No one will want to go near it.
Also get inside the thing and clip a few of those wires hackers use. Your PC is now safe from intrusion.
All things any hard-core terrorist has certainly known for a few years now.
My experience has been that this normally results in a lot of lost data.
Thanks!
It currently takes two separate passwords for my laptop to even boot up. Then it takes a third to log in. My data is on an encrypted partition, so even if they took the drives out, they couldn't read it.
For browsing get the Tor Browser Bundle
Cons: Something of a learning curve. URLs are complex. For example the URL for The Silk Road marketplace is: http://silkroadvb5piz3r.onion/
Pros: untraceable, complete anonymity.
N.B. Never, ever log into a web service such as Yahoo email while using TOR as all your anonymity can go up in a puff of smoke.
If these are more than you want to bother with, start using Ixquick for your web searches and use the anonymous proxy links.
Regardless of the excellent job their PR firm has done with the MSM, do not ever use Duck Duck Go and think you have achieved anonymity.
When I clicked on the Duck duck go link in the story I got this:
http://www.dnsrsearch.com/index.php?origURL=
When I google it I get this:
Is this a research site? On our side or not? Kinda strange ...
bfl
Don’t use it. Or make it “old style” with no communications with any other computer other than sneakernet.
Only two things will work:
1) Pull the ethernet cable out
2) Shut off the WiFi card
If you’re on the network, they will be able to get you if they really want. Even encryption isn’t foolproof, as it has to exist somewhere and at some time unencrypted in order to be created and viewed.
From reading the article, the short answer appears to be: join the Amish.
How about instead we just mount a campaign against such government intrusion and get elected to Congress people who will make such intrusions highly illegal (as they should be now according to the Constitution - secure in their “papers”, etc.) and punishable by long prison sentences.... and enforce it!!
It has come to this.
Land of the free. Home of the brave.
An atavistic alternative is to somehow go back to a regular 56k etc modem phone line, put a fax machine between the phone line and your computer and all attempts to query info from your pc will be printed out by the fax machine as incoming messages and never reach your pc.
Bookmark