1) Hide in the network. […] 2) Encrypt your communications. […] 3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn’t. […] 4) Be suspicious of commercial encryption software, especially from large vendors. […] 5) Try to use public-domain encryption that has to be compatible with other implementations.
Hoffnung. Also doch Tor, GPG, TrueCrypt und Passwortmanager. Das sind die Inhalte einer CryptoParty!