Endwall 04/17/2016 (Sun) 22:15:55 No. 7 del
>>6

My Idea is : "Be Random, Blend In, Attack from Behind"

Tor gets you around the ISP and their surveillence and monitoring. Random user agent and user agent spoofing to the most common user agents blends you in. Randomize your download timing, so that it looks like a one off. Randomize your attack vector to come from behind or from the side where they aren't focusing.

Tor beats the ISP and local surveillance, proxies (hopefully) beat NSA and intertwined advanced surveillance.

Tor alone won't beat the NSA or millitary agencies with sufficient resources. I really don't care what Jacob Appelbaum says about this, or what that 1 slide from the Snowden leaks says about TOR being hard, that they keep bringing out to show people.

They have the best Computer Science PhD minds and $20 billion/year of resources to put devices anywhere and everywhere.

Its a hard problem, and a ridiculously strong advesary. I just want to watch the news on youtube unmolested...i'm not a criminal, but these people certainly are.