>when the vpn/tor connection drops
This provides a small metadata leak, keep this in mind.
>use a PC not a laptop
Why? Laptops are a nomads and dissidents only friend. It is mobile and easily disposable. You can make copies of encrypted drives incase of data loss, ensuring you are confident of your hardware before encryption.
Theft and surveillance is most effectively countered by encryption or anticipation of theft, not by how inaccessible your hard-drive is. If it is not feasible or recommended to rely mostly on encryption, it is still easier to relocate, conceal, or destroy a laptop and it components than a desktop. I however can't vouch for the security of hardware between the choices for which I am not a hardware engineer. I've read you can render a reliable thinkpad if you find an untampered BIOs and wipe the drive with a fresh OS. Write the boot sector to a USB or something if you can't trust your machine around others.
I would add that in the instances of physical theft, social engineering, or torture, there should be a method of preventing this. I wonder if this would work, hear me out:
Passphrase from memory + Key from disk --> Decryption
You could carry a SDcard or some sure destructible medium with part or most of the passphrase on it, destroying it when necessary. This combo prevents someone from stealing a full storage key OR torturing you for a full working passphrase, but not both at once. Now considering you're sure about randomness, secure passphrase, hardware, all that jazz.. it may be more likely to convince your enemy that is would be impossible to recover the full passphrase as the medium was destroyed. This does seem like a pain but it would help securing very sensitive data when it could be fatal. It also gives you more bargaining chips, more routes for setup and negotiation after capture because you know a passphrase and the location of one or more keys, otherwise intact or destroyed. It is up to you what to reveal, explain, or manipulate to the interrogator. I think this key feature already exists and is possible on linux LUKs but I haven't tried it personally. I don't think it's a popular approach, it's too
>no WiFi cards or blue tooth or other crap
Agreed but you have to know what you're looking for. I think discounting the immutable benefits of a laptop because of this is a bit shortsighted.
Other then that, yours is security by isolation. Good basics.
>rocks and sharp sticks at tanks and drone
FMJ, IEDs, and EMP.. or you know, realize we don't fight on battlefields in rows anymore. Most warfare is now insurgent warfare with very high risk of causalities and crossfire that is very costly to Blue Team defenders (i.e.) the system.
>like robots who will hunt the land
Resources aren't unlimited retard. Not to mention with the acquisition of all these robots poses major liabilities and disasters waiting to happen, a-la a-hackin'ing or manipulation.
>Facebook uses publicly available geological data
The establishment, rebels, and most of the general public have access to this data. The point isn't to stand out from the average population in the wild, it's to blend in, wait and look for an opening using this publicly available data.
>Linux is trashy
It is becoming trashy. BSD looks promising but I'm not sure how to make it similar to my new Qubes/Whonix setup. We need specialized members that know this so everyone can be secure. Not everyone can invest weeks to months of their life in OSINT and nerdy things. All members that care should protect the whole of the group.
>do everything yourself
>Ultimate red pill
It takes a village. I don't care if you are triggered by this.
> Tails is better than Qubes & Whonix
Tails is amnesic, but so is Q and W but by user intervention.
Tails has a lower barrier to entry than Q/W.
Q/W is installed on disk, Tails is recommended on a bootable medium
They are both debian/linux based but Tails requires that you trust not only the hardware but the additional software installed on the base OS.
All humans struggle with anonymity, we have predictive behaviors. Q/W can be the biggest pitfall for this if you don't know what you're doing like on all systems, but most apparent here were it is your responsible to dispose of VM containers and not engage in predictive behaviors along with this metadata.
Q/W encourages you to study intensively and act accordingly. This is why it has a wiki. Tails is advertised to plebs like journalists and activists. It is recommended for them in dire conditions and under timely conditions where time to study the details of technology isn't feasible.
This isn't a bad thing in concept.