How to avoid tracking by the deep state - ideas an suggestions

Approved resources and devices:

OS: Qubes OS qubes-os.org/

Email host: Your own - buy a domain/vps

You can get a free domain and buy a cheap vps from ovh for something like 3 bucks a month. Set up an SMTP server like so: askubuntu.com/questions/410330/how-can-i-install-and-configure-an-smtp-server

This way you're able to destroy your email securely.

Methods of internet usage:
1. while qubes provides a tor layer to every connection you WILL NEED to cover up the fact that you are using tor.
1. A. Covering up tor usage can be accomplished by buying a vpn. It doesn't matter if it is paid or free, most people try to say paid. However you can't confirm either way if the vpn is secure and working in your favor. The next step is not to configure the vpn on your computer but to set up your router to connect to the vpn.

You *could* set up a vpn service to go to a private vps server. If you are worried about tracking ownership of the vpn then purchase it via bitcoin. Or exchange cash to bitcoin and then back to your choice of currency and then to a sock paypal account.

Other urls found in this thread:

youtu.be/spof8R9Vwpw
wikileaks.org/ciav7p1/cms/page_15728775.html
askubuntu.com/questions/410330/how-can-i-install-and-configure-an-smtp-server
twitter.com/NSFWRedditGif

How about you just post with you're real name and not be a pussy?

/ourguy/ is in the white house you coward. If there ever was a time to come out, it's now.

Kys

>yfw I'm a black man and that's hate speech and the Austrian police are on their way to your house

Bumping this thread because it's a worthwhile discussion to have and it requires more intellect than the average Sup Forums users display.

I've said it before, and I'll say it again; even though iOS is (for the most part) closed source, finding exploits is a pain in the ass. Even worse is a KPP bypass, so an infected device would most likely be find after a reboot. I guess security researcher AMA?

bump

>avoiding detection
>using the internet
pick one

>b..but muh VPN, muh 7 proxies!
do you really think they couldn't get through those too?

electronics will NEVER be secure

>include malware attacks to Windows, Mac OS X and Linux

so whats safe

ATTENTION DUMBASSES

THE BEST WAY TO AVOID BEING TARGETED BY INTELLIGENCE AGENCIES, IF YOU'RE JUST A REGULAR PRIVATE CITIZEN, IS TO NOT TRY TO AVOID BEING TARGETED BY INTELLIGENCE AGENCIES

YOU START RESEARCHING ONLINE PRIVACY AND THEY ARE ALL UP IN YOUR SHIT IMMEDIATELY WITH ROOTKITS BECAUSE THEY THINK YOU'RE UP TO NO GOOD