editor wrote: ↑
Sat Jul 15, 2017 5:20 pm
You wrote in an earlier message that most of your computer activity is done using a flash drive in your pocket, and you'd be interested in privacy measures that help you achieve greater security.
In my opinion, the only way to prevent spying is to never use any device with a computer chip...
I have already informed you that Linux isn't secure.
I only use the computer in internetcafes, but stay away from the internet most of the time. I copy the information from interesting sites to either Word or save the PDFs (that I somtimes later convert to Word). I use "old" Word, usually I have 2 documents open at the same time (one with information and one with my writings). I don't think Word is a "good" tool, but it's usable.
When I use Word "newer" than 2007, the "Compatibility" mode of Word deletes a lot of spaces from the documents. Sometimes when I copy a document to USB it saves an empty file. I've found out that this has to do with knowing the names of a document I'm working on. This informs me on what information they don't want me to post.
One by one the owners of the internetcafes are "replaced" (art. 21 of the Dutch Law “Wet op de Inlichtingen- en Veiligheidsdiensten
”), and then they upgrade their software...
I also have some legal procedures, but don't really worry if the intelligence agnecies find out, as I'll have to file them anyway.
The Tor Project is supposedly a private non-profit that provides encryption that is “NSA-proof”.
The Tor sham has been supported by respected limited hangout operations, like: ACLU, Fight for the Future, Wired, Vice, The Intercept, The Guardian, Rolling Stone, Edward Snowden and Daniel Ellsberg that have pumped up Tor's rebel status to mythical proportions.
In reality Tor is almost 100% funded by the US government, it received millions of dollars from 3 US national security agencies: CIA spinoff Broadcasting Board of Governors (BBG), the Navy and the State Department.
The BBG is the biggest sponsor of Tor with more than $6 million in contracts from 2007 through 2015. Tor has been a military contractor with its own government contractor number: https://surveillancevalley.com/blog/fac ... nment-ties
(archived here: http://archive.is/SeyOx
Tor has pledged it would never put any backdoors into their software.
It’s known that Tor has informed the BBG on security vulnerabilities. This is formally not building a backdoor, but in a sense informing them on backdoors. And... all software is hackable!
Because much of Tor’s funding is under the umbrella of private government corporation Radio Free Asia's, that refuses to comply with journalists' FOIA requests, there is no information on most communication. There is also no public information on the correspondence between Tor, the State Department and the US Navy.
That’s not even counting what Roger Dingledine and other Tor managers have discussed in meetings with US intelligence and law enforcement agencies.
In October 2007, Tor developer Steven Murdoch sent a report on the vulnerabilities connected to Tor encryption. They intentionally made Tor stand out from the rest of the internet traffic, which makes it easier to single out (target) people who use Tor.
This is formally not a backdoor, but it shows that they privately tip off the federal government, which makes it highly improbable that Tor is “NSA-proof”.
After Tor cofounder Roger Dingledine informed his BBG handlers in 2007, it took until 2011 before this information was shared with the public: https://surveillancevalley.com/blog/cla ... government
(archived here: http://archive.is/GsyCy