Welcome login | signup
Language en es fr
OccupyForum

Forum Post: Privacy Tools: Encrypt What You Can

Posted 5 months ago on May 7, 2014, 3:06 p.m. EST by LeoYo (5850)
This content is user submitted and not an official statement

Privacy Tools: Encrypt What You Can

Wednesday, 07 May 2014 10:03
By Julia Angwin, ProPublica | Book Excerpt

http://truth-out.org/news/item/23541-privacy-tools-encrypt-what-you-can

In the course of writing my book, Dragnet Nation, I tried various strategies to protect my privacy. In this series of book excerpts and adaptations, I distill the lessons from my privacy experiments into tips for readers.

Ever since Edward Snowden revealed the inner secrets of the NSA, he has been urging Americans to use encryption to protect themselves from rampant spying.

"Encryption does work," Snowden said, via a remote connection at the SXSW tech conference. "It is a defense against the dark arts for the digital realm."

ProPublica has written about the NSA's attempts to break encryption, but we don't know for sure how successful the spy agency has been, and security experts still recommend using these techniques.

And besides, who doesn't want to defend against the dark arts? But getting started with encryption can be daunting. Here are a few techniques that most people can use.

Encrypt the data you store. This protects your data from being read by people with access to your computer. Encrypt your hard drive so that if you lose your computer or you get hacked, your information will be safe. Most recent Apple Macintosh computers contain a built-in encryption system called FileVault that is simple to use. Some versions of Microsoft's Windows 7 also contain a built-in encryption system called BitLocker. Another popular solution is the free, open-source program TrueCrypt, which can either encrypt individual files or entire partitions of your computer or an external hard drive. Encrypt your smartphone's hard drive. Yes — your smartphone has a hard drive much like your computer has. In fact, your phone probably contains as much — or more — sensitive information about you as your computer does. Apple doesn't let you encrypt your smart phone's hard drive or the files on it, though it allows encryption of your phone's backup files on iTunes or iCloud. You can also use Find my iPhone to remotely "wipe," or delete the data on your iPhone or iPad if it is lost or stolen. Google's Android operating system lets you encrypt your phone hard drive. Encrypt the data you store in the cloud. I use the SpiderOak encrypted cloud service. If an encrypted cloud service were somehow forced to hand over their servers, your data would still be safe, because it's encrypted using a key stored only on your computer. However, this also means that if you lose your password, they can't help you. The encrypted data would be unrecoverable.

Encrypt the data you transmit. The Snowden revelations have revealed that U.S. and British spy agencies are grabbing as much unencrypted data as they can find as it passes over the Internet. Encrypting your data in transit can protect it against spy agencies, as well as commercial data gatherers. Install HTTPS Everywhere on your Web browser. This encrypts your Web browsing sessions, protecting you from hackers and spy agencies that scoop up unencrypted traffic across the Internet. Not every site works properly with HTTPS Everywhere, though an increasing number do. Use encrypted texting apps with friends who install the same apps on their phones. On the iPhone, Silent Circle and Wickr offer apps for encrypted texting. On Android, the TextSecure app encrypts texts in transit and when they are stored on your device. Use the Off-the-Record Messaging protocol to encrypt your instant messaging conversations. You can still use your favorite instant-messaging service, such as Gchat or AIM, though you'll need to use a software client that supports the Off-the-Record protocol. On Macs, free software called Adium can enable OTR chats, and on Windows, you can use Pidgin. Once you've set up OTR and gone through a simple verification step, you can IM as you usually do. Both parties have to use OTR for the encryption to work. Use Gnu Privacy Guard to encrypt your email conversations. Like OTR, if you're using GPG you'll need the people you email with to use it as well in order to encrypt your conversations. I use free software called GPG Tools with Enigmail and Postbox. GPG Tools also works directly with Apple's built-in Mail program.

GPG has some shortcomings — it's difficult-to-impossible to use it with the mail program built into most smartphones, and you can't use it easily with webmail like Gmail. (Although there are some new web-based mail programs that use GPG called Mailvelope and StartMail that I haven't had a chance to try yet.)

The most difficult part of GPG is that, unlike the encrypted texting and instant messaging programs, you have to generate a secret key and keep it somewhere secure (usually on your computer or on a USB stick). This often means you can only send GPG mail when you have your key with you. Even so, it is incredibly satisfying once you send your first message and watch it transform into a block of numbers and letters when you click "encrypt."

This piece was reprinted by Truthout with permission or license.

5 Comments

5 Comments


Read the Rules
[-] 6 points by LeoYo (5850) 5 months ago

US Government's New Plan for Internet IDs Has Scary Implications

Monday, 12 May 2014 10:48
By Kevin Mathews, Care2 | Op-Ed

http://www.truth-out.org/opinion/item/23643-us-governments-new-plan-for-internet-ids-has-scary-implications

While internet activists are distracted with recent attacks on net neutrality, the government is quietly introducing an internet ID program in Pennsylvania and Michigan that — if eventually broadened as intended — would strip internet users of their privacy and rights.

The program, named the “National Strategy for Trusted Identities in Cyberspace,” is starting small, consolidating accounts for public programs like welfare and health services. If the program were to stop at linking government accounts, it probably wouldn’t be such a big deal. The problem, however, is that United States officials are hoping that it’s the first step in a plan to make IDs that would be used uniformly throughout the entire internet.

The government is championing the program as one that promotes “convenience.” Certainly, it would be “convenient” for internet users to have a single log-in and password for every activity on the internet, but it’s far more “convenient” for the government to be able to keep tabs on everything you do, type, search for, view, and purchase with a single account to monitor.

Tech experts fret that a single ID would eliminate the rights of internet users. For example, anonymous commenting, an act protected by the Supreme Court as free speech, would disappear if web surfers were unable to comment anywhere without being logged in to their official, government-issued accounts. Furthermore, any semblance of internet privacy would be obliterated considering how easily people’s activity could be tracked. The decision to initially target people in poverty for this type of system is hardly surprising since they are less likely to take issue with privacy concerns with more pressing matters taking priority in their lives.

The other notion that a single ID would somehow add to cybersecurity seems similarly ludicrous. Anytime large amounts of people’s essential information is stored in a single place, it attracts hackers. Considering the number of major credit card breaches in the past year, it’s not hard to imagine that datacenters housing passwords for all aspects of people’s lives would become prime targets for hackers looking to commit fraud.

The timing of this implementation is even more questionable. Given the public backlash against the NSA, it’s especially strange that the U.S. government is already rolling out a new invasive form of internet surveillance. However, officials insist that Americans will be protected from government intrusion, by giving control of the IDs to corporations outside of the government.

Unfortunately, it doesn’t seem that much more comforting to know that a private tech company like Google or Comcast would have that access to all that information instead. Besides, given the obvious unholy alliance between government and corporations, what’s the difference there anyway? Precedent has shown us that judges are willing to blindly grant government agencies access to this type of information 99.9% of the time.

This piece was reprinted by Truthout with permission or license.

[-] 1 points by MattLHolck (16833) from San Diego, CA 5 months ago

congress needs to be online

[-] 2 points by LeoYo (5850) 5 months ago

The FCC's Net Neutrality Proposal Is Out: It's Time to Make Our Voices Heard

Thursday, 15 May 2014 14:28
By Truthout Staff, Truthout | Op-Ed

http://truth-out.org/opinion/item/23738-the-fccs-net-neutrality-proposal-is-out-its-time-to-make-our-voices-heard

The Federal Communications Commission (FCC) today voted to propose open internet rules, in its latest attempt to establish net neutrality regulations. Since February, tens of thousands of people have submitted comments to the FCC on how to best keep the internet open and free, and an Occupy-style protest demanding that the agency "save the internet" has been held outside the agency's office in Washington, DC for the past week. The activism has helped shape the proposal released today, and the FCC says that it will continue to listen to the public.

The proposal asks the public as many questions as it answers, centering on how to prevent internet service providers from interfering with the way web users and content creators experience the internet. In other words, how do we keep the internet "neutral" so big broadband companies can't discriminate against competing content? How do we prevent such companies from levying fees for access - and, potentially, priority delivery speeds? There are currently no regulations keeping big companies like AT&T, Verizon and Comcast from harming the internet in these ways, and the FCC has already determined that they have "the incentive and ability" to do so.

Given the recent court ruling that threw out the agency's 2010 Open Internet rules, FCC Chairman Tom Wheeler has "tentatively" proposed to regulate the internet under Section 706 of the Telecommunications Act of 1996. After details of Wheeler's original proposal went public last month, consumer advocates worried the proposal would allow internet service providers to strike deals with wealthy content providers like Netflix for high speed, priority "fast lanes" for delivering content to consumers, while leaving startups, nonprofits and small businesses in "slow lanes."

Wheeler said the FCC would have the power to intervene on a case-by-case basis to block deals that could be commercially unfair and, in response to public outcry, he recently revised his proposal to ensure that no one would end up in "slow lanes." But that was not enough to silence his critics.

Today's proposal now asks the public if such "paid prioritization" deals can be banned outright. It also asks the public if the FCC should scrap Wheeler's proposal to classify the internet under Section 706 and instead reclassify it as a Title II "common carrier" service that could be regulated more like a public utility, a move that internet freedom advocates say is the only way that the FCC can establish net neutrality rules with teeth.

At Truthout, we believe that a free and open internet is a crucial tool for sharing information that empowers the public to hold the powerful accountable and to take the action necessary to build a better world. Corporate control of the web would stifle the voices of our movements, so we must act now to ensure the internet stays free and open. The FCC has opened an extended four-month comment period on its open internet proposal and related questions. In a statement, the commission said it "wants to continue to hear from Americans across the country throughout this process."

The future of the internet hangs in the balance, so Truthout staffers are already speaking out about what internet freedom means to us. You can send your own comments to OpenInternet@FCC.gov.

--Mike Ludwig

[-] 4 points by LeoYo (5850) 5 months ago

William’s View: Protect Access to the Sum of Human Knowledge

Every once in a while, I'll pull my phone out of my pocket for no real purpose. I won't make a call or send a text. I'll just hold it in my hand - this little black thing, a thoroughly unremarkable Smartphone - and stare at it with a kind of wonder. These things - smartphones, tablets, the internet itself - are so ubiquitous now that we take them utterly for granted, but every once in a while, I like to look at my phone and revel in the astonishing fact that I am holding the sum of human knowledge in the palm of my hand.

Every book, every newspaper, every recorded moment of history, every dictionary and encyclopedia, every language, every recipe, every how-to manual: it's all right there with the click of a couple of buttons. For sure and certain, "the sum of human knowledge" also contains a fair budget of gibberish, nonsense and outright lies, but the same is true in any library or newsstand in the world. It is the sheer volume of information combined with the easy accessibility that staggers me when I think about it ... and we are still in the infancy of this thing. It seems like it's been around forever, but in point of fact it is brand new, and still growing. As far as I am concerned, the information available on the internet to all people everywhere represents the next step in human evolution, if it is handled correctly.

We face a dangerous crossroads regarding the fate of the internet. Federal Communications Commission Chairman Tom Wheeler is on the cusp of issuing new rules that could redefine what has been known as "Net Neutrality." To wit: everything on the internet is treated equally; the most meager of bloggers enjoys the same rights and privileges as the largest media megacorporation. Net Neutrality is the only way the internet will work as the wide-open free-flowing information base we have come to expect and demand, and if those rules change to favor the powerful over the rest of us, it will be the beginning of the end of one of the most important innovations the world has ever seen. Don't let it happen.

--William Rivers Pitt

Candice’s View: If We Lose Neutrality, Youth Will Bear the Brunt

The prospect of the internet becoming "cable-ized" has specific implications from a generational perspective. As youth have become the driving force behind many emergent forms of social media, many young people have come to rely on the internet as their only source of information. For example, I haven't owned a TV since I moved out of my parents' house when I was 18. This is no exaggeration. I don't watch TV. Of course, I still watch movies with friends, but that’s about it.

So the threat of a loss of net neutrality is really scary for someone who relies on the internet as their sole access to any information whatsoever. As young people are rapidly experiencing more and more barriers to the middle class, they are relying on the internet more and more to save money. Some young people I know don't even pay for a phone bill - but will pay an internet bill and just rely on social media to communicate with friends and family. A loss of net neutrality will be felt disproportionately by young people.

--Candice Bernd

Dahr’s View: Corporate Powers Are Redrawing the Landscape

The FCC’s machinations should be viewed in the context of corporate powers playing the "long game" in redrawing the information landscape of the internet, creating a dramatically imbalanced playing field. If you think the FCC is working to treat individual internet users the same as large companies, think again.

What is under threat is independent media’s ability to use the internet as a tool to disseminate information. As an independent journalist writing for what I believe is the most independent news outlet on the internet, if corporate power gets its way online, our platform is at grave risk of being taken from us.

--Dahr Jamail

Mark’s View: Commercialization Will Accelerate

When BuzzFlash started publishing in May of 2000, the internet was just emerging as a robust bulletin board for democracy and activism. The stock market had gone wild over net tech stocks, but it had overreached because few companies could figure out how to monetize the relatively new interactive public communications medium.

Around the middle of the last decade, however, technology and software had advanced to allow for targeted advertising that was even able to follow the consumer interests of net users from site to site. In addition, new forms of ads developed, as did pay walls and other monetizing options. Facebook may have activist uses, but its business model is to deliver as many details about consumer preferences to advertisers as possible in order to make a profit to justify its stock value. Twitter will not be far behind, perhaps with an ad accompanying every tweet. Moreover, there are increasing dangers that the ability to use social media for activism could be compromised by a variety of corporate and governmental tactics. This for-profit commercialization of internet sites will continue to accelerate, no matter what the FCC decides in its forthcoming action.

At Truthout and BuzzFlash, it is our obligation to continue to offer a strong beacon of light amidst the net's evolution from a check and balance on the mainstream media to an increasingly corporate-owned cable TV model of business.

--Mark Karlin

Maya’s View: The Internet Has Never Been Neutral

I’ve always been a little skeptical of the term net neutrality. Of course, it’s crucial to fight as hard as we can to resist the whole-scale corporatization of the internet. But it’s also important to bear in mind that the internet has never been neutral when it comes to one towering issue: access to the products necessary to use it.

Eighty-seven percent of US adults use the internet these days, but the highest concentrations, by far, are among folks with relatively high household incomes and college degrees. Whole swaths of the population - including prisoners and people confined within other facets of the prison-industrial complex - are forcibly barred from access. And many people who identify as internet "users" do not own a computer or smartphone, and are able to access the net only on public, school or work computers - certainly not a "neutral" degree of access.

So, as we’re debating "fast lanes" and "slow lanes," let’s remember that for many, many people, the road to internet access has always been slow. And lots of folks are still stuck in traffic. Access and internet freedom aren’t only about FCC proposals and court decisions. If we view the internet as a right that must be accorded to everyone, we must imagine and prioritize the kind of services that would open the door to this vital public sphere for all people.

--Maya Schenwar

Copyright, Truthout.

[-] 1 points by MattLHolck (16833) from San Diego, CA 5 months ago

i have no secrets to protect