Who is McCorden? Infiltrator? Let's hear from some other Graybeard computer experts.
I've a pretty long history on this board. Not in this particular sub-forum, but I've been around for a long time
. I've got 11 years professional experience in IT (many more from a hobbyist level), and a BS in Computer Science. I'm not steering you wrong or trolling.
As a matter of fact, if you really want some good privacy tools for communications, I'll cue you into some good options:
TOR - The Onion Router
http://www.torproject.org/Works as a layered proxy to the web. You send a request that is wrapped with multiple layers of encryption. It hops along a route, unwrapping 1 layer of the request at a time, yet adding another of encryption that contains the source of the request each time. The result is that the invidivdual hops along the way don't know what they're sending nor where it came from. Once it finally makes it to a final hop the last layer gets peeled off, and the request processed. It then bounces back to the source using the same method. The result is a web browsing history that is darned difficult to trace.
FreeNet
http://freenetproject.org/This works similar to TOR, except it doesn't go to the web. It goes to FreeNet - an underground group of thing similar to websites. Runs very slow for the most part due to the HEAVY encryption going on (and you have to tolerate a lot of shady stuff going on in this area - anonymity for you means the same to many other people), but it's virtually untraceable. There was a guy a few years back committed a murder and was posting about it on FreeNet - taunting the police to catch him. They never did. While the action is deplorable, the situation does speak to the security of the network.
Finally - OpenVPN.
http://openvpn.net/An open source implementation of a VPN (Virtual Private Network). In simple terms, this is a tool that allows you to access a LAN (and hence all of it's server) from across a public network as if you were on the LAN, but with all communications to the LAN encrypted so that no one can tell what you're doing. I use this tool when traveling for example. Rather than send my communications of a questionable hotel wireless network, I use their network to VPN back into my home network and access the net through a Squid proxy running at home. The foreign connection sees nothing I do - all they see is a constant stream of gibberish going to my home network - the real information exchange is happening there and being relayed back. Now, as a warning, this is one of the more difficult tools to configure, but when setup right, it's more than worth it.
There. I'm not personally big on conspiracy theories (most of my practices are more to protect against identity theft, which I see as a much more real possibility), but those tools will help you with secure communications regardless of your motives. We'll save SSH tunneling and audio stenography for another day
.