@bonifartius They are correct in a sense that all of these don't constitute typical human behavior. Most people I know don't bother hiding what they do online and are apathetic to sane security practices, like using secure E2E messaging apps.

However, while there is some overlap with privacy & security minded folks and terrorists (as weird as that is) I doubt you'll see them using burner phones or frequently changing their SIM cards, or developing cover stories, etc.

@bonifartius And you conveniently left out the note on that page that says these practices don't constitute terrorism on their own.

@dusnm i conveniently added the link to the pdf source.

they can add disclaimers but that using pseudonyms etc. is even included as suspect behavior now speaks volumes.

@dusnm

It is a matter of conditioning people to become more obedient. Paint "them" (people who oppose the oppression) in the most negative light possible to ensure that such groups don't grow because what they say and do is rational, moral and legitimate. Unlike the jackboot gang we call the authorities.

@bonifartius

@niclas @dusnm
to expand on the burner phones & SIMs: there is no easy way to get an anonymous phone in germany(/ the EU?), all while _every fucking major online service_ wants a phone verification. makes it easier to apply the jackboots on the correct necks, even if they already know anything anyway as per snowden. if people give that away willingly, it's good plausible deniability.

@bonifartius nice

I always said the best cover is none. Buy some old laptops and dont use vpn. Just use quakenet. Oh wait it is 2022. Use discord. Nobody knows.

If you become a target it is game over.

Otoh this is a list when somebody plans already. NOT an indication!

@CapitalB quakenet :blobaww: those were good times. pretty great moment when we had enough people to get Q xD

some eight years ago, someone asked me, at a Q&A session at free software meeting, what I expected to be in ten years. I said I'd probably be a terrorist. not because my privacy- and freedom-defending practices would change, but because they'd likely be mislabeled as terrorism. looks like I was two years off :-(
that said, of all the "suspicious behaviors" in the picture, the only one that vaguely resembles mine is the last one: I use Tor for nearly all of my web browsing. I've used the same Neo Freerunner with the same simcard for some 13 years, and counting, but I don't really use it much. I mostly just ssh into it and run emacs with tunneled display to see SMSes on a larger screen.
Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.