On 6/7/16, Rayzer <ray...@riseup.net> wrote: > But honestly. If you use tails with tor on a public library computer > miles from where you live to deliver documentation there's no physical > trace on any computer anywhere and even IF the exit entrance and ALL THE > TOR NODES were pwned by the FBI's DITU crew they STILL wouldn't know who > you are or be able to geolocate you accurately.
All nodes?... then even with your e2e-TLS they still know your endpoint, time and bytes. They see that, pull your face from the library video and roadways of your plate, fingerprints from that book you picked up, DNA from the fuck all mess you left in the loo, the IMEI from the towers, your facebook gps presence via your phone, bounce it all around Lexis and IAFIS Part Deux, etc... and you're rushed and zeroed all for doxing some corruption... or maybe just buyin a lil weed off darkmarket to smoke in ur VW bus while talkin harmless shit about the man... man. lol. > How secure do you need to be Juan? As in swimming, coding, and locksport, everyone should practice opsec... just in case they need it. https://www.youtube.com/watch?v=MJQ30fPYec8 https://www.youtube.com/watch?v=LpHhPaVHhxw Keep in mind that was *18 years ago*... Today it's more than real... https://www.youtube.com/watch?v=oS-BQF1X7Qw https://www.youtube.com/watch?v=Tant0AMirJ8 https://www.youtube.com/watch?v=QlSAiI3xMh4 Other takes on the EOS phrase that came up in youtube... https://www.youtube.com/watch?v=zvLf2gqSJ98 http://www.fullmoon.nu/book/side_issues/IdentityCards.htm https://www.youtube.com/watch?v=_sTfpj-IF_Y https://www.youtube.com/results?search_query=enemy+of+the+state