Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
It's all clutter
Message
From
09/04/2013 03:44:41
 
 
To
08/04/2013 12:16:07
General information
Forum:
Level Extreme
Category:
Other
Miscellaneous
Thread ID:
01569748
Message ID:
01570462
Views:
42
>No, we are actually 100% agreed. I was just pointing out Tor as part of a toolset that users who are concerned about privacy and anonymity will have researched. I would not be surprised if government agencies are logging traffic into and out of known Tor edge routers and/or have set up honeypots on the Tor network. So any use, not just habitual, is probably waving a red flag in front of the bull. I imagine that just regularly encrypting your e-mail is probably raising your profile to DefCon4 at some government agency.
>
>Yes, people are creatures of habit, and big data is great at recognizing them.
>
>I don't think it's paranoia. The difference between say, the Great Firewall of China and the governments of Germany and Canada is not one of capability, it's just the degree of how those capabilities are used.

couple of years ago I HAD to encrypt (back then old PGP with keyrings) every one of my mails if I wanted to mail with some banks and insurance companies. Same procedure, different level of people in there, wanted by the company per their own rules if going to their server and compliance spot-checked. Need was dropped within one year for several of them, nowadays encryption as base pattern even with higher ups is not the norm anymore. I wonder about the synchronicity... I do wonder about some companies in the route of mails either having or being Trojans as well. Capabilties: actual Trojans in Germany are not that great - I think the ones analyzed were bona fide and not leaked on purpose. Not necessarily all are/operate at that low level or stay that way.
Previous
Reply
Map
View

Click here to load this message in the networking platform