http://uwb25d43nnzerbozmtviwn7unn7ku226tpsjyhy5n4st5cf3d4mtflqd.onion/posts/tails/index.html
What would be the consequences if they had access to that data? And then, based on the particular situation, assess how you can protect yourself. It makes no sense to say "this tool is secure". Security always depends on the threat model and it takes place on multiple levels (network, hardware, software, etc.).