Skip to comments.
How to remain secure against NSA surveillance
The Guardian ^
| 9/5/13
| Bruce Schneier
Posted on 09/06/2013 4:15:48 AM PDT by shego
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-42 next last
To: shego
How ‘bout just have nothing to do with Facebook. I mean, just a few years ago wasn’t it possible to have a life without social media & tweets & whatnot?
Of course, FReepers are already on some gubmint s***list. We know that, don’t we?
21
posted on
09/06/2013 5:27:16 AM PDT
by
elcid1970
("The Second Amendment is more important than Islam.")
To: bert
Or, lead a normal life and dont fret about a breach of you privacy that is not going to happen. So, what happens with the government decides that your normal life is no longer normal?
22
posted on
09/06/2013 5:30:30 AM PDT
by
justlurking
(tagline removed, as demanded by Admin Moderator)
To: shego
To: bert
You don’t feel the collar because the leash isn’t being pulled at the moment, so everything is alright?
24
posted on
09/06/2013 5:35:35 AM PDT
by
Jack of all Trades
(Hold your face to the light, even though for the moment you do not see.)
To: shego
The article describes how to be more secure. The only way to be secure is to destroy you cell phone and not use any form of electronic communication. In which case your basically isolated, so they win anyway. Catch 22.
25
posted on
09/06/2013 5:40:32 AM PDT
by
Jack of all Trades
(Hold your face to the light, even though for the moment you do not see.)
To: bert; shego
Bert,
The Baghdad Bob of FreeRepublic:
26
posted on
09/06/2013 5:42:13 AM PDT
by
SoConPubbie
(Mitt and Obama: They're the same poison, just a different potency)
To: Hardraade
27
posted on
09/06/2013 5:57:36 AM PDT
by
Captain7seas
(Fire Jane Lubchenco and John Pistole.)
To: shego
I’m trying to figure out how the NSA can spy on hand-written ciphered/coded notes or coded ham radio comms.
When technology gets too complicated to get the upper hand, baffle it with ancient methods.
28
posted on
09/06/2013 5:58:42 AM PDT
by
EricT.
(Freedom is slavery. Ignorance is strength. Big brother is watching you.)
To: shego
If you’re not coding your PC and software from the ground up (think BIOS, chipset, etc) anything you do is just an annoyance, and doesn’t protect your communications. If you’re communicating digitally, assume it is compromised, or could be with minimal effort.
29
posted on
09/06/2013 6:23:41 AM PDT
by
TexasGunLover
("Either you're with us or you're with the terrorists."-- President George W. Bush)
To: Captain7seas
Wind from the East, fish bite the least.
The Sheep are grazing in the grassy meadow.
Over
To: 762X51
31
posted on
09/06/2013 6:57:16 AM PDT
by
SUSSA
To: SUSSA
The Sparrow took the bus. No direct flight.
32
posted on
09/06/2013 7:37:52 AM PDT
by
A_Tradition_Continues
(formerly known as Politicalwit ...05/28/98 Class of '98)
To: A_Tradition_Continues
Jerry got a new puppy. Billy’s birthday party is next week.
33
posted on
09/06/2013 7:44:54 AM PDT
by
SUSSA
To: from occupied ga
GPG (and PGP in general) doesn't help with protecting metadata in email. The email header (which includes to, from, date, and subject line information) is still sent unencrypted, so it does not make it impossible for NSA analysts to look at metadata reports on activity or build a network of contacts!
To: shego
This bit is important as well:
Since I started working with Snowden's documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I'm not going to write about. There's an undocumented encryption feature in my Password Safe program from the command line); I've been using that as well.
I understand that most of this is impossible for the typical internet user. Even I don't use all these tools for most everything I am working on. And I'm still primarily on Windows, unfortunately. Linux would be safer.
The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They're limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.
Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That's how you can remain secure even in the face of the NSA.
I think it's largely the government's fault that solid crypto isn't already deployed routinely in the majority of your internet activity.
35
posted on
09/06/2013 8:06:15 AM PDT
by
zeugma
(Is it evil of me to teach my bird to say "here kitty, kitty"?)
To: BigBankTheory
GPG (and PGP in general) doesn't help with protecting metadata in emailtrue, but I was only thinking of protecting the content. You can go to onion routing if that helps, but it's still traceable.
36
posted on
09/06/2013 8:07:06 AM PDT
by
from occupied ga
(Your government is your most dangerous enemy)
To: SUSSA
Aunt Mary has the flu.
Proceed with Operation Night Stalker. Repeat, Operation Night Stalker. Monitor this channel for further instructions.
37
posted on
09/06/2013 8:16:16 AM PDT
by
762X51
To: BigBankTheory
GPG (and PGP in general) doesn't help with protecting metadata in email. The email header (which includes to, from, date, and subject line information) is still sent unencrypted, so it does not make it impossible for NSA analysts to look at metadata reports on activity or build a network of contacts! Combine GPG with Anonymous Remailers, and you're much better off.
38
posted on
09/06/2013 8:19:34 AM PDT
by
zeugma
(Is it evil of me to teach my bird to say "here kitty, kitty"?)
To: Jack of all Trades
It takes money to become invisible. The more that you are willing to spend the smaller footprint you will leave for them to track.
39
posted on
09/06/2013 8:30:25 AM PDT
by
B4Ranch
(AGENDA: Grinding America Down ----- http://vimeo.com/63749370)
To: zeugma
Someone needs to come up with Anonymous Remailers with distributed nyms through alt.messages.anonymous scraping built in. This would be my project if I had time.
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-42 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson