Actually that would be a good question to ask him.
Him intimately knowing about how NSA does stuff, what would be his suggestion of ensuring anonymity. What steps should one take, what tools should one use, etc. His answers on this would be very telling. Someone please ask him that!
My question: How secure is I2P and why did you choose Tor over it?
If not Tor or I2P, what steps would you have taken?
What other measures can you publicly reveal you are using/have used in the process of securing yourself?
How do you recommend those technologically able protect themselves, along with the general public?