yeah, however few points:
a) Im glad that they will waste resources on someone as (almost) useless as me. Maybe that will teach them to target actual bad guys
b) their motto is - sniff it all, collect it all, analyze it all - so wait just few more decades when they will start storing everything like GHCQ was doing from time to time

. memory is getting cheaper and cheaper....
c) I recommend to anyone use most advanced crypto keys as possible...
d) anyone is target that is not total sheep - so be it guys interested in linux, journalists, vpn users, NGOs, etc. etc. it doesnt really make a difference if you use tor or not

if you are not obedient sheep - you are suspect. for every power greedy motherfuckers on this planet
Quote:
Originally Posted by crockett
The problem with using something like THOR or other encryption as example is when NSA for example catches encrypted data, they don't delete it. It's stored until some-point they can decrypt it.
That was something that came out in the Snowden leaks.. They were required to delete normal unencrypted data after a certain time period but encrypted data they can hold onto until it can be decrypted. So really you are fucked either way because eventually they will get your data.
Obviously I'm talking NSA level guys but obviously not ISP or advertisers.
|