Browser:
At the current moment in time I only recommend using the TOR browser for online activities that you which to remain anonymous. The mapping algorithm that TOR uses makes it extremely difficult to trace the true identity of the end user.


Online Chat:


For discussing anything sensitive in nature – DO NOT USE any live chat such as Skype or WhatsApp. They can be tapped just like any phone line. The big-name chat apps boast a big game with their encryption; but it doesn’t really matter since the data centers are hosted within the United States. Big brother can seize and tap with nothing more than probable cause.


Email and Electronic Drop boxes:


There is no nice way to put this….if you are conducting sensitive business via yahoo mail or Gmail, you are an idiot. Big brother is pretty much in bed with those email platforms and the social media giants. All sensitive communications should ONLY be done via an offshore/encrypted platform outside of U.S. and European jurisdiction. Me personally, prefer offshore encrypted drop box type platforms. The advantages to these are there are no actual transmissions of a message, so nothing can be intercepted. The sensitive note is created, and the other party is given a code created by you that will decrypt the note. The note should be destroyed after it is read. I have created such an offshore communication system, but I am not going to mention it yet, since I am still waiting for PAIN to approve me to advertise it.

Posting Pictures:
Post away, but keep in mind a lot of meta data can be gleaned by a photo that someone posts online. I never understood why folks here posts the famous TOUCH DOWN pictures. Just because you are not in the picture, heaps of source data and geographical origin data can be found by a halfway descent analyst.



Sanitize Your PC:
Use a secure deletion technology to wipe your computer after each sensitive communication session. Each time you use your computer you leave digital footprints and finger prints. Programs such as Cyberscrub do a descent job of erasing your tracks.

Keep a Hammer Handy:
Hey, if Hillary Clinton can destroy evidence without consequences so should all of us. If you think your electronic devices are at risk for being seized, destroy them until they look like saw dust. That is the only way there is no chance for data recovery, even with the most sophisticated government technology.

Anyways, that’s my 2 cents for what it is worth.
MarineX