[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Michael Knowles: Trump & Israel, Candace Owens, and Why Christianity Is Booming Despite the Attacks

Save Canada's Ostrich Farms! Protests Erupt Over Government Tyranny in Canada

Holy SH*T! Poland just admitted the TRUTH about Zelensky and it's not good

Very Alarming Earthquakes Strike As We Enter The Month Of September

Billionaire Airbnb Co-Founder Reveals Why He Abandoned Democrat Party For Trump

Monsoon floods devastate Punjab’s crops, (1.7 billion people) at risk of food crisis

List Of 18 Things That Are Going To Happen Within The Next 40 Days

Pentagon Taps 600 Military Lawyers To Serve As Temporary Immigration Judges For DOJ

81 Actors Who Have Passed Away So Far in 2025

High school is different now

Banks REMOVING CASH and nearing major DISASTER. Prof St Onge.

Did America Pick the Wrong Side in WWII?

Chicago in CHAOS – Mayor Tells Police to Stand Down as Trump Says ENOUGH Murder

Graham Linehan ARRESTED in UK for gender critical tweets - UK COLLAPSE IS IMMINENT

Cash Jordan: 400,000 Illegals ‘Forcibly Returned’ To Mexico… as NYC COLLAPSES

The ChatGPT CEO's Web Of Lies by Vanessa Wingardh

The Fall of the Israel Lobby Has Begun — And This Is Just the Start | Denzel Washington speech

'Statistically Almost Impossible' – 4 AfD Candidates Have Died 'Suddenly And Unexpectedly' Before Key State Election

Israel And The West Set The Stage For Next Round Of Warfare On Iran

Last night in Milan, an 18-year-old girl was beaten and raped while trying to catch a train home

Russia has developed a truly modern system of warfare.

Alberta's Independence and Finances

Daniela Cambone: 100% Loan Losses Loom as Fed Shrinks Balance Sheet-

Tucker Carlson

Cash Jordan: ICE HALTS 'Invasion Convoy'... ESCORTS 'Armada' of Illegals BACK to MEXICO

Cash Jordan: “We’re Coming In"... Migrant Mob ENTERS ICE HQ, Get ERASED By 'Deportation Unit'

Opioids More Likely To Kill Than Car Crashes Or Suicide

The association between COVID-19 “vaccines” and cognitive decline

Democrats Sink to Near Zero in New Gallup Poll, Theyre Just Not Satisfied

She Couldn't Read Her Own Diploma: Why Public Schools Pass Students but Fail Society


Science/Tech
See other Science/Tech Articles

Title: Tips to Avoid Government Surveillance
Source: Epoch Times
URL Source: [None]
Published: Jun 16, 2013
Author: AP
Post Date: 2013-06-16 02:30:27 by Tatarewicz
Keywords: None
Views: 186
Comments: 2

Reduce the risk of snoops thumbing through your data

LONDON—Phone call logs, credit card records, emails, Skype chats, Facebook message, and more: The precise nature of the NSA’s sweeping surveillance apparatus has yet to be confirmed.

But given the revelations spilling out into the media recently, there hardly seems a single aspect of daily life that isn’t somehow subject to spying or surveillance by someone.

Experts say there are steps anyone can take to improve privacy, but they only go so far.

Using anonymity services and encryption “simply make it harder, but not impossible,” said Ashkan Soltani, an independent privacy and security researcher. “Someone can always find you—it just depends on how motivated they are.”

With that caveat, here are some basic tips to enhance your privacy:

Encrypt your emails

Emails sent across the Web are like postcards. In some cases, they’re readable by anyone standing between you and its recipient. That can include your webmail company, your Internet service provider and whoever is tapped into the fiber optic cable passing your message around the globe — not to mention a parallel set of observers on the recipient’s side of the world.

Experts recommend encryption, which scrambles messages in transit, so they’re unreadable to anyone trying to intercept them. Techniques vary, but a popular one is called PGP, short for “Pretty Good Privacy.” PGP is effective enough that the U.S. government tried to block its export in the mid-1990s, arguing that it was so powerful it should be classed as a weapon.

Disadvantages: Encryption can be clunky. And to work, both parties have to be using it.

Use TOR

Like emails, your travels around the Internet can easily be tracked by anyone standing between you and the site you’re trying to reach. TOR, short for “The Onion Router,” helps make your traffic anonymous by bouncing it through a network of routers before spitting it back out on the other side. Each trip through a router provides another layer of protection, thus the onion reference.

Originally developed by the U.S. military, TOR is believed to work pretty well if you want to hide your traffic from, let’s say, eavesdropping by your local Internet service provider. And criminals’ use of TOR has so frustrated Japanese police that experts there recently recommended restricting its use. But it’s worth noting that TOR may be ineffective against governments equipped with the powers of global surveillance.

Disadvantages: Browsing the web with TOR can be painfully slow. And some services—like file swapping protocols used by many Internet users to share videos and music—aren’t compatible.

Ditch the phone

Your everyday cellphone has all kinds of privacy problems. In Britain, cellphone safety was so poor that crooked journalists made a cottage industry out of eavesdropping on their victims’ voicemails. In general, proprietary software, lousy encryption, hard-to-delete data and other security issues make a cellphone a bad bet for storing information you’d rather not share.

An even bigger issue is that cellphones almost always follow their owners around, carefully logging the location of every call, something which could effectively give governments a daily digest of your everyday life. Security researcher Jacob Appelbaum has described cellphones as tracking devices that also happen to make phone calls. If you’re not happy with the idea of an intelligence agency following your footsteps across town, leave the phone at home.

Disadvantages: Not having a cellphone handy when you really need it. Other alternatives, like using “burner” phones paid for anonymously and discarded after use, rapidly become expensive.

Cut up your credit cards

The Wall Street Journal says the NSA is monitoring American credit card records in addition to phone calls. Some cybercriminals can use the same methods. So stick to cash, or, if you’re more adventurous, use electronic currencies to move your money around if you want total privacy.

Disadvantages: Credit cards are a mainstay of the world payment system, so washing your hands of plastic money is among the most difficult moves you can make. In any case, some cybercurrency systems offer only limited protection from government snooping and many carry significant risks. The value of Bitcoin, one of the better-known forms of electronic cash, has oscillated wildly, while users of another popular online currency, Liberty Reserve, were left out of pocket after the company behind it was busted by international law enforcement.

Don’t keep your data in America or with American companies

U.S. companies are subject to U.S. law, including the Patriot Act, whose interpretations are classified. Although the exact parameters of the PRISM data mining program revealed by the Guardian and The Washington Post remain up for debate, what we do know is that a variety of law enforcement officials—not just at the NSA—can secretly demand your electronic records without a warrant through an instrument known as a National Security Letter. Such silent requests are made by the thousands every year.

If you don’t like the sound of that, your best bet is to park your data in a European country, where privacy protections tend to be stronger.

Disadvantages: Silicon Valley’s Internet service providers tend to be better and cheaper than their foreign counterparts. What’s more, there’s no guarantee that European spy agencies don’t have NSA-like surveillance arrangements with their own companies. When hunting for a safe place to stash your data, look for smaller countries with robust human rights records. Iceland, long a hangout for WikiLeaks activists, might be a good bet.

Steer clear of malicious software

If they can’t track it, record it, or intercept it, an increasing number of spies aren’t shy about hacking their way in to steal your data outright. Edward Snowden, the NSA leaker, warned the Guardian that his agency had been on a worldwide binge of cyberattacks.

“We hack everyone everywhere,” he said.

Former officials don’t appear to contradict him. Ex-NSA chief Michael Hayden described it as “commuting to where the information is stored and extracting the information from the adversaries’ network.” In a recent interview with Bloomberg Businessweek, he boasted that “we are the best at doing it. Period.”

Malicious software used by hackers can be extremely hard to spot. But installing an antivirus program, avoiding attachments, frequently changing passwords, dodging suspicious websites, creating a firewall, and always making sure your software is up to date is a good start.

Disadvantages: Keeping abreast of all the latest updates and warily scanning emails for viruses can be exhausting.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Tatarewicz (#0)

Tips to Avoid Government Surveillance

Die. I've got nothing else, those bastards are all over us and they've got unlimited resources.

“With the exception of Whites, the rule among the peoples of the world, whether residing in their homelands or settled in Western democracies, is ethnocentrism and moral particularism: they stick together and good means what is good for their ethnic group."
-Alex Kurtagic

X-15  posted on  2013-06-16   13:43:27 ET  Reply   Trace   Private Reply  


#2. To: X-15, Tatz, 4 (#1)

Startpage.com and StartMail(whenever it's rolled out) are all I know to use...that and having zero data stored on this machine.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2013-06-16   14:09:54 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]