Worried about NSA "spying"? Well, you shouldn't be (if
, you follow the instructions below)!! It's all "defense in depth"!! Here we go!!!
2) Using your new (and free!) Tor Browser, visit the following Onion address from one of the many open Wi-Fi connections which are publicly available all around you:http://bitmailendavkbec.onion/
Create a new account with a strong password (see below.)
3) Run Gentle GPG (new, of course, and recently updated) from a triple-cascading TrueCrypt hidden volume with several keyfiles:http://sourceforge.net/projects/gentlegpg/http://www.truecrypt.org/
Keep at least one of your keyring files on a different
(hence, networked) computer.
4) Use QuickSilver Lite via Tor to send email to the Bitmessage E- mail Gateway using the smtp snorky.mixmin.net, port 2525 using TLS:https://www.quicksilvermail.net/qslite/
5) Only READ encrypted email at the Bitmessage E-mail Gateway. Use Mixmaster to SEND encrypted email to the Bitmessage E-mail Gateway (or, to an alternative email service if the Bitmessage E-mail Gateway is down, taken-over, etc.)
6) Verify all digital signatures using GPG.
7) Disable everything that you don't need (Firewire, autoplay, USB ports, etc.) and spoof everything which you can (MAC address, Wi-Fi access points, etc.) Use all security options available to you (such as PGP encryption in QuickSilver Lite.)
8) Maintain the physical security of your hardware at all times. (Use a tablet.)
9) Beware of keyloggers, so use Debian Linux and OpenBIOS with full system encryption. Inspect your system regularly. (Should not be a problem if you are keeping your tablet with you!)
10) Use long passphrases greater than 30 characters whenever possible, easy for you to remember, impossible for others to guess -- Upper & lower case letters, numbers, symbols, punctuation characters, and at least one ALT control character ('Alt' + any 4-digit number).
11) Run Tails whenever possible:https://tails.boum.org/
12) Stick with open-source programs.
Remember those 3 'Rs' in real estate -- "location, location, location!"; here are the 3 'Rs' in privacy -- "spoof, encrypt, and open source!". It is, of course, one thing to ENCRYPT data, it's also a very important to HIDE that data, as well! The NSA cannot decrypt that which they cannot find!!