Ok, I did. Being silenced and being hidden are two different concepts though. It is easier to be 'rooted out' when you can be found easier. I would rather be MAC spoofing, proxychained, etc & communicating on throwaway/destroyable Tails USB drives because that makes their job of censorship harder. Steganography is another good approach while using their platforms. I can agree with your 'stay and fight' remark - but to do so, you have to be smart about how you fight.
Ok, I did. Being silenced and being hidden are two different concepts though. It is easier to be 'rooted out' when you can be found easier. I would rather be MAC spoofing, proxychained, etc & communicating on throwaway/destroyable Tails USB drives because that makes their job of censorship harder. Steganography is another good approach while using their platforms. I can agree with your 'stay and fight' remark - but to do so, you have to be smart about how you fight.