You've always knew it, I've always speculated on it, now I can finally provide a decent screenshot of cyber jihadist's howto recommending and taking the average reader step by step through the process of obtaining and using TOR.
This blog has a large number of posts on Jihadist internet security tools and tactics. Apparently they wrote their own encryption tool, which is universally stupid... |