Alright. 

I came to the conclusion that this is all a waste of time.

A hacker (especially nation state) would hack your main home router.

Then hack your endpoint laptop.

Then they can see that both are connected to a dedicated Tor router in the 
middle, through its MAC address or other identifier, such as device name.

So they can see that both are connected to the same dedicated Tor router, and 
thus, they can see who you are that way.

So unless you are confident that you can secure your main home router, then 
this idea of a dedicated Tor router is hopeless.

You would be better off using a QUBES live disc and ONLY use Tor from the very 
start.

As the internal NSA Snowden documents say, "one page request" is all it takes 
to hack you.. but note, they can only do this page request if you are actually 
connecting via your real IP address.

Therefore, use a QUBES live disc, use TOR ONLY (never mix it up with clearnet), 
and make sure your BIOS is freshly installed, and then just cross your fingers 
and hope you don't get hacked while using Tor browser. By all means, use 
NoScript etc.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37ad9472-69d0-46fa-9502-73c4d3f9c8b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to