On 6/7/16, Rayzer <ray...@riseup.net> wrote:
> But honestly. If you use tails with tor on a public library computer
> miles from where you live to deliver documentation there's no physical
> trace on any computer anywhere and even IF the exit entrance and ALL THE
> TOR NODES were pwned by the FBI's DITU crew they STILL wouldn't know who
> you are or be able to geolocate you accurately.

All nodes?... then even with your e2e-TLS they still know your
endpoint, time and bytes. They see that, pull your face from
the library video and roadways of your plate, fingerprints from
that book you picked up, DNA from the fuck all mess you left in
the loo, the IMEI from the towers, your facebook gps presence
via your phone, bounce it all around Lexis and IAFIS Part Deux,
etc... and you're rushed and zeroed all for doxing some corruption...
or maybe just buyin a lil weed off darkmarket to smoke in ur VW
bus while talkin harmless shit about the man... man. lol.

> How secure do you need to be Juan?

As in swimming, coding, and locksport, everyone
should practice opsec... just in case they need it.

https://www.youtube.com/watch?v=MJQ30fPYec8
https://www.youtube.com/watch?v=LpHhPaVHhxw

Keep in mind that was *18 years ago*...
Today it's more than real...

https://www.youtube.com/watch?v=oS-BQF1X7Qw
https://www.youtube.com/watch?v=Tant0AMirJ8
https://www.youtube.com/watch?v=QlSAiI3xMh4

Other takes on the EOS phrase that came up in youtube...

https://www.youtube.com/watch?v=zvLf2gqSJ98
http://www.fullmoon.nu/book/side_issues/IdentityCards.htm
https://www.youtube.com/watch?v=_sTfpj-IF_Y

https://www.youtube.com/results?search_query=enemy+of+the+state

Reply via email to