>not using technology to get little naked girls without feds throwing you to jail
why you even learn computers if you don't use them for good purposes
why wont you just watch those girl out of curiosity? you dont need to go do that in real life, just watch on computer to see it, how it looks
also share what tools do you use when being pedo on the internet and computer
-file encryption
-anonymity
Do you think that technology and open source helps pedos? They use open source tools like Tor and TrueCrypt. It allows them to do more pedo stuff.
>file encryption
open source software only. Full disk encryption is recommended. Some people only have encrypted containers with hot files, but this is dangerous.
>anonymity
Tor is a must. but additional measures are recommended. do not ever enable javascript on cp sites. all pedo deanonymizations happened through javascript exploits.
Whonix is also highly recommened. It can protect you against javascript or web browser exploits
>not using technology to get little naked girls without feds throwing you to jail
why you even learn computers if you don't use them for good purposes
why wont you just watch those girl out of curiosity? you dont need to go do that in real life, just watch on computer to see it, how it looks
also share what tools do you use when being pedo on the internet and computer
-file encryption
-anonymity
Do you think that technology and open source helps pedos? They use open source tools like Tor and TrueCrypt. It allows them to do more pedo stuff.
inb4 I glow