35
submitted 2 years ago by [email protected] to c/[email protected]
you are viewing a single comment's thread
view the rest of the comments
[-] [email protected] 17 points 2 years ago

you use briar and an elaborate system of dead drops, Bluetooth, and sneakernet. possibly one time pads and encrypted transmission by radio once things pick up. of course radio transmissions can be triangulated, so...

in any case you can expect infiltration in your organization so cryptography has some limitations in what it can accomplish. in any case you shouldn't post anything incriminating online, ever

this post was submitted on 25 Sep 2023
35 points (84.3% liked)

Ask Lemmygrad

979 readers
13 users here now

A place to ask questions of Lemmygrad's best and brightest

founded 2 years ago
MODERATORS