"Whether this step is sufficient for an organization such as the NSA remains unclear. ???Just using Tor might make one appear suspicious,??? says Volker Roth." . . . .