Computer security & censorship.
I am a traditional Catholic but I am also an American, and per the latter (and, also, the former -- "Truth can defend itself!") am absolutely opposed to censorship on the Internet. This is why I support things such as:
1) The Tor browser (surf the Internet in complete anonymity):
2) TrueCrypt (some of the strongest encryption available):
Be sure to use one or more "key files" with a passphrase that "is easy for you to remember but impossible for others to guess." (Make sure that your passphrase is at least 30 characters and consists of Upper & lowercase letters, numbers, "special" characters which are shared with the numbers on your keyboard at the top and at least one "accented" character -- hold the 'Alt' key and type any 4-digit number on your numeric keypad.) Also, use general system encryption along with triple-cascading encryption for your individual file containers. Create a few "bogus" TrueCrypt containers. Give everything innocuous names with obscure extensions (except for "temp" extensions) and locate your containers, real and bogus, in obscure subdirectories; make sure that your file containers have a hidden partition.
3) Technitium MAC Address Changer ("spoof" your MAC address when connecting to W-Fi hotspots -- you'll appear to be a completely different computer every time you connect!):
4) Vuze -- anonymous downloads via Tor or I2P:
5) QuickSilver Lite (for completely anonymous email via the Mixmaster network):
6) CCleaner (keep your private files, well, "private"):
Use CCleaner "religiously"!
7) Claws-Mail (open-source email client):
8 ) Gpg4win (send email securely):
Use 3072-bit RSA keys. Be sure to digitally sign your messages before encrypting with your recipient's public key; after that, use QuickSilver Lite to send your message!
9) PeerBlock (helps keep "snoopers" out):
10) Lingoes (translator software which can help protect your privacy even more):
Use the above with Tor; before sending an email, first translate it into another language (say, German), and then translate that back into English -- you'll get something different!
11) Oracle VM (install under Windows):
Run a Linux VM (such as Ubuntu) -- adds more security! Surf the Internet with Firefox.
12) Process Hacker (see what's really running on your machine!):
13) Use the VLC media player (open source, so no "back doors"):
14) Use Tor "hidden services," as the Truth is now slowly becoming a "hate crime."
You should also only use a tablet (much easier to maintain the physical security of your device), disable all USB ports, Firewire ports (it's "IEEE 1394" in your Device Manager; disable in BIOS, also), and especially, Windows auto-play options (see Windows Control Panel in the "Autoplay" section -- set to "Take no action" for each one); if possible, disable all swap files, hibernation, standby, etc.; test regularly using JonDonym (just Google); make sure that your Virus scanners are up-to-date (use Microsoft's free one), use Windows Firewall, open port scanners, verify process hash values (Google "Prio"), etc; only use anonymous Wi-Fi hotspots ("anonymously," of course -- don't park in front of a stranger's house!!); use SSDs for reliability, and only do full-image backups when the SSDs have been dismounted if possible, stick with open-source programs, beware of key-loggers, and above all else, maintain the physical security of your tablet at all times!
Note that I have made this post, so that "the Roman pontiff who holds the primacy over the whole world..." (Council of Florence) and churchmen may keep their communications with each other and the business of the Church private. Also, as I indicated on the "Welcome" page, I want seminarians (and everyone else, for that matter) to be able to read the immemorial teachings of the Catholic Church without fear of censorship, reprisal, and/or having their ordinations unlawfully withheld from them.
Tips for using Tails.
1) It's come a long, long way over the years, so download it from here:
2) Verify the downloaded image with GPG4WIN:
3) Use persistent storage with at least two keyring files:
4) Run off a micro-SD card (easy to hide and/or destroy, if necessary):
(Buy directly at Walmart and not through the Internet. And, create four or five "spoofs", which goes without saying!)
5) When starting tails, use the TrueCrypt option:
Create and store your TrueCrypt container within persistent storage with a MINIMUM length passphrase of 30 characters (Upper & lower case letters, numbers, punctuation & special characters -- easy for you to remember but impossible for others to guess, and, of course, do NOT write this down anywhere, which means "Practice, practice, practice"!!!) and use two or three keyfiles!
6) Use bridges:
7) And, anonymous Wi-Fi hotspots:
("Never the same place twice for maximum security!")
8) Use anonymous email and only access via the Tor network:
(That's an '.onion' address.)
9) Use a tablet:
(Once again, buy off-the-shelf.)
ENCRYPT EVERYTHING (especially, email)!!!