How to prevent NSA from spying on you. . 1. Browse anonymously - TopicsExpress



          

How to prevent NSA from spying on you. . 1. Browse anonymously with Tor NSA whistleblower Edward Snowden has been photographed with a Tor sticker on his laptop. Tor lets you use the Internet without revealing your IP address or other identifying information. The distributed network works by bouncing your traffic among several randomly selected proxy computers before sending it on to its real destination. Web sites will think youre coming from whichever node your traffic happens to bounce off of last, which might be on the other side of the world. Tor is easy to use. You can download the Tor Browser Bundle, a version of the Firefox browser that automatically connects to the Tor network for anonymous web browsing. 2. Keep your chats private with OTR If you use a conventional instant messaging service like those offered by Google, AOL, Yahoo or Microsoft, logs of your chats may be accessible to the NSA through the PRISM program. But a chat extension called OTR (for off the record) offers end-to-end encryption. The server only sees the encrypted version of your conversations, thwarting eavesdropping. To use OTR, both you and the person youre chatting with need to use instant messaging software that supports it. I use a Mac OS X client called Adium, which works with Google, AOL, Microsoft and Yahoos chat networks, among others. Windows and Linux users can use Pidgin. OTR works as an extension to conventional instant messaging networks, seamlessly adding privacy to the IM networks you already use. You can configure Adium or Pidgin so that if a person youre chatting with is also running an OTR-capable client, it will automatically encrypt the conversation. 3. Make secure calls with Silent Circle The conventional telephone network is vulnerable to government wiretapping. And many Internet-based telephony applications, including Skype, are thought to be vulnerable to interception as well. But an Internet telephony application called Silent Circle is believed to be impervious to wiretapping, even by the NSA. Like OTR, it offers end-to-end encryption, meaning that the company running the service never has access to your unencrypted calls and cant turn them over to the feds. The client software is open source, and Chris Soghoian, the chief technologist of the American Civil Liberties Union, says it has been independently audited to ensure that it doesnt contain any back doors. 4. Make secure calls with Redphone Redphone is another application that makes phone calls with end-to-end encryption. Interestingly, it was developed with financial support from U.S. taxpayers courtesy of the Open Technology Fund. The government hopes to support dissidents in repressive regimes overseas. But the only way to build a communications application that people will trust is to make it impervious to snooping by any government, including ours. So like Silent Circle, the Redphone client software is open source and has been independently audited to make sure there are no back doors. Uwe Hermann 5. Remove your cellphone battery to thwart tracking The NSA phone records program revealed by the Guardian last week not only collects information about what phone numbers we call, it also collects data about the location of the nearest cellphone tower when we make calls. That gives the NSA the ability to determine your location every time you make a phone call — and maybe in between calls too. Unfortunately, Soghoian says theres no technical fix for this kind of surveillance. The laws of physics will not let you hide your location from the phone company, he says. The phone company needs to know where you are in order to reach you when you receive a phone call. So if you dont want the NSA to know where youve been, you only have one option: You need to turn off your cell phone. Or if youre feeling extra paranoid, take out the battery or leave your phone at home. You probably cant hide metadata Soghoian says that a similar point applies to your phone calling records. Encryption technology can prevent the government from intercepting the contents of voice communications. But its mu
Posted on: Fri, 08 Nov 2013 03:43:56 +0000

Trending Topics



Recently Viewed Topics




© 2015