>>24719
>> How does /hebe/ go about staying anonymous and how often do you worry about being caught or having feds kicking in your door?
VPNs, full harddisk encryption, TOR / freenet / i2p, using your head.
>> So I come to you guys, have you taken the plunge and if you have, do you ever worry about being caught? Or are you completely confident in your l337 computer knowledge and know you're rock solid?
Yeah, I'm good.
Three ways I can be caught, DMA-attack on a running computer, physical keylogger, weaponized trojan / rootkit.
All of which requiers me to be defined as a target, in which case, the coppers have way too much free time.
>> If so, can you help out a tech illiterate dummy or point me towards guides or information so I can also be sure I'm secure. I know I can google this, but I'll trust you all more since we're all in the same boat and the information will be more relevant.
/baphomet/ has some info, you should start there and define your threat model.
Depends on how paranoid you want to be, but a decent VPN is good (non-us one, cryptostørm / trilightzone have servers in the right places), next veracrypt is good for strengthening truecrypt, and if you want to go full retard you chain VPNs in a virtual machine, but then we are talking producer-level security, non-windows setups, and deadman-switches like USBKill, and that's going abit over the top.
I'd say take it easy, the coppers are never going to have capacity to even bother catching everybody, just don't be obvious about it.
And stay away from sharing things on the open net.