Thank you very much for the replies.
Informative and accessible. It was especially interesting to learn about the box, which puts the FSB.
\r
\r"Quite simply, neither the FSB nor the interior Ministry does not monitor all traffic, they would have died snift it all..."
The question is not if you can snift, can mean. And here is you can't count on that "and hardly at the moment snimaut — it's a hemorrhoid". The same applies to sanctions. I don't think in some cases friends will bother getting sanctions, and if sanctions can do what you need.
\r
And no one has seen the form in which information is displayed, so to say, is the end user's SORM? :) What you see comrades on the monitors of their computers?
\r
I understand if the traffic goes over https or ssl, then the url is visible, but not visible soderjanie form, which transmits the encoded traffic, but if http and you can see the url and content?
\r
In fact, after studying this whole topic, not to say, but TOR seemed to me the most appropriate way. Tried to pick it up — without any problems even from under Windows, though under Linux. Of course the speed dropped 10 times, but if it so requires, and to hell with her.
\r
It's nice that tor and DNS queries is sent through their servers, and that regularly changing the encryption and peers. In General, while clear disadvantages are not noticed.
\r
Wrote that the feast may be the car of the attacker, but the machine (if it is first in the chain) does not see what site the client is requesting, and if the machine of the attacker is the latter, then she sees who is requesting the website. Also a chain of three peers regularly changing encryption keys too.