You may have heard of the “Countering Violent Extremism” program under DHS.

They’ve deployed the tactics used to fight terrorists against domestic citizens. For example, incels. When I posted on the web forum incels dot is, I didn’t know it was Department of Homeland Security operation against men who say they are romantically deprived. I didn’t know I was interacting with larping feds who encourage extremist rhetoric. Consequently I was put on a watchlist and am subject to intrusive monitoring.

I share a lot of my experience here.

https://twitter.com/WrongedIncel

My question is, my computer is hacked by them and they are privy to my computer activity – as in, right now, they’re seeing me type this post. How can I get these rats out of my computer? I just run Windows 11.

  • jetA
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    4
    ·
    1 year ago

    Given your scenario your computer is totally compromised, you can’t trust it.

    The eff has a guide to help you:

    https://ssd.eff.org/

    • MrHand@lemmy.worldOP
      link
      fedilink
      arrow-up
      2
      arrow-down
      20
      ·
      1 year ago

      What defense is there against NSA tools like Pegasus? I’m not kidding when I say they use my phone as a recorder to capture my interactions in the wild (in addition to having people from fusion centers follow me around.)

      • jetA
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        1 year ago

        if you know your computer and phone are compromised, i would think the solution is obvious, stop using them.

        • MrHand@lemmy.worldOP
          link
          fedilink
          arrow-up
          1
          arrow-down
          19
          ·
          1 year ago

          If I get a different device they just compromise that too. What defense is their against the NSA?

          • jetA
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            1
            ·
            1 year ago

            In your scenario any device you get is compromised when its linked to you… don’t get a device, and don’t link it to yourself