Quote from: BruceCampbell on April 20, 2013, 11:46 pmIf you like in a major city and can wardrive that's awesome. But if you live in a suburb or a rural area I really doubt there are a lot of TOR users on your ISP.I keep telling people this, but sometimes I feel it's falling on deaf ears. If you're from a tiny hamlet in the Alps, or from a place in Appalachia, you could have a problem. If you're the only one using Tor within 100km...! I mean let's not make it too easy for the government! You really ought to start investigating more extensive methods of anonymizing yourself than merely using TBB and assuming you have the same protections as an inner city dweller.PolyFront has it aright: QuoteThe literal definition of anonymity is a state of namelessness. A more technical definition of anonymity is the state of being indistinguishable from a given set size. As an example, imagine a closed communication interface with several hundred members. If all of the members use the name 'anonymous' to make their posts, they are indistinguishable from each other based on naming information (however, they may not be anonymous based off IP information). However, they are not indistinguishable from those who are not a part of the system. If two people have access to an anonymous suggestion box, any suggestion in the box may be anonymous but the set size is two. The higher your set size is, the more anonymous you are.-- Project PolyFrontPossible protections includes using public bridges, using private bridges, using VPN with Tor, wardriving for wifi, borrowing from insecure machines and wiping the logs, using obfuscation pluggable transports (steged Tor), acting a relay, using anonymous connections and lots more. There are all kinds of goodies that can improve anonymity if you think about it. Don't look at Tor as a magic bullet. It's the best there is, but that doesn't mean it'll always be the case. We rely on cryptographic trust in our world, not on assumptions or arguments from authority. We should have an acronym for this: BYOR - bring your own research. Too many people depend on the words of a few as gospel. That's the kind of attitude that can lead to successful social engineering attacks by adept LE hackers.Read this: http://pz65gyca5nrafhrf.onion/PolyFront_2/polyfront.htmlAnd search out similar types of information. LE hackers are likely to be well trained. But they are few, and we are the many. By leveraging Darknet know-how and scaling up, we can become unstoppable. Our strengths are adaptability and scale. But this is not predestined and won't happen if we're lazy. If ten thousand people suddenly learn just 1 piece of new tradecraft, however simple, we quickly gain an assailable advantage that knocks LE back months or years. Look at the impact of using something as simple as LOIC. Learning something like PGP is infinitely more powerful than that, and there is at least 10,000 people on this network that use it. It's like using the phone. If 1 person does it, who cares. But if 10,000 people do it, the power of the network expands exponentially rather than additively.Education! Education! Education! Maybe not what your careers adviser had in mind in high school, but that guy's model of the world is broken.