1 Basic F.A.Q.
1.1 What is encryption?
1.2 Is there a big difference between storage and communication encryption?
1.3 Should I use encryption?
1.4 What is plausible deniability?
1.5 Do I need plausible deniability?
1.6 Of course the police can break encryption, right?!
1.7 What about the NSA?
1.8 But anything can be hacked, right? Why not encryption?
1.9 Using encryption programs myself is difficult, but Hushmail, Safe-Mail or (Insert name here) will manage it for me!
1.10 What exactly is anonymity?
1.11 Why do I need anonymity?
1.12 I already use encryption so there is no need for me to be anonymous!
1.13 Tor exit nodes can spy on my communication streams so I should not use it!
1.14 If I use Tor can I be traced by the feds?
1.15 If I use Tor can I be traced by the NSA?
1.16 If I use hacked cable modems am I untraceable?
1.17 If I use hacked or open WiFi am I untraceable?
1.18 If I send a package domestic to the USA with USPS do they need a warrant to open the package?
1.19 Should I use masking scents, such as perfumes etc?
2 Applied Security Guide
2.1 Step Zero: Encrypt your hosts HDD
2.2 Step One: Configure the base system, harden OS
2.3 Step Two: Configure Tor and GPG, harden Firefox
2.4 Step Three: Conceal your membership (VERY IMPORTANT FOR VENDORS)
2.5 Step Four: Know how to do safe product transfer, handle finances safe