All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.
Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.
Actually they would have a picture of your face and could go from there. A component serial number is discovered, which leads to the manufacturer, which leads to what store sold it; then their inventory systems can tell you what time it was sold, then you can match that up to security camera footage. This has been documented with burner phones, no reason it couldn't be done with computers.
Technically true. However you have to trust something, and as long as there has been know oppertunity to tamper with the computer you can assume your safe for most things.
It's like you missed the last year and still think this stuff is the fantasy of conspiracy nuts. Or work for the NSA and want to lull everyone into thinking they're safe.
That is why we have cryptographic signatures on repositories and iso images. If they can break a 4092 bit key in polynomial time we are f***ed anyway
Yes because that's the weak part. *sigh*