According to the WikiLeaks Vault 7 dump the CIA deploys malware that includes the capability to hack, remotely view and/or clone devices running the Windows, macOS, and Linux operating systems.
This seems to suggest that the agency has no problem bypassing encryption, proxies, VPN and that Tor anonymity is a myth.
This does not mean that each of the point solutions offering a product under each of the above headings have been compromised. Rather it means that the OS level hack capability of the CIA – as seen on iOS and Android – means that they can gain full control of the device and render any point solution counter measures moot.
Therefore they subvert the platform which by extension means that anything that is running on the platform is subverted.
Tablet, laptop, smart-phone, AV device – it seems they are all fair game and in that case so is everything that you do on them.
You have been warned.
You are being watched.