{"id":23824,"date":"2014-06-08T19:40:59","date_gmt":"2014-06-08T23:40:59","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23824"},"modified":"2014-06-08T19:40:59","modified_gmt":"2014-06-08T23:40:59","slug":"how-to-encrypt-everything","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/how-to-encrypt-everything.php","title":{"rendered":"How to encrypt everything"},"content":{"rendered":"<p><p>      Reuters    <\/p>\n<p>        LOCK IT DOWN: It's time to get serious with your online        security.      <\/p>\n<p>    A year ago, heavy duty encryption technology was something    cybersecurity professionals, privacy nuts, and the odd    investigative journalist cared about. Then the Snowden leaks    happened. Suddenly, we were all acutely aware of how exposed    our data is to the prying eyes of spies and hackers alike. But    it doesn't have to be that way.<\/p>\n<p>    Thanks in part to Snowden, encryption has never been as easy as    it is now. And to mark the anniversary of the leaks, a    consortium of companies have banded together to make it even    easier. Reset the Net - a day of action for privacy and    freedom, backed by the likes of Google and Mozilla, as well the    Electronic Frontier Foundation (EFF) and Fight for the Future -    offers instructions on how we can all avoid mass surveillance.    But it also offers a Privacy Pack for the average user. It's    simply a bundle of free software to help you encrypt your data    and communications.     You should download it right now.  <\/p>\n<p>    Encryption doesn't require coding knowledge or maths skills,    but it does demand some attention and care. The Privacy Pack is    a great starting point, but if you want to cover all of your    bases, there are few more things you need to do. We've put    together a little guide that includes details on the software    in the Privacy Pack and a little bit extra. In case you're not    quite sure what encryption is or how it works, EFF's    Surveillance Self-Defence site is a great place to    start.  <\/p>\n<p>    ENCRYPT YOUR PHONE  <\/p>\n<p>    The best place to start, of course, is with your phone. After    all, this is what the NSA is probably most interested in. It's    also probably the device you use most, so it's in your best    interest to take extra good care of it.  <\/p>\n<p>    Before going all trigger-happy on encryption apps, the first    thing you should do is secure your lockscreen. Duh.  <\/p>\n<p>    There are     a whole host of fancy security options for Android,    but if you've got an iPhone, the standard four-number passcode    option isn't quite enough. All you need to do to make it more    secure, though, is turn off Simple Passcode in Settings which    will allow you to assign a longer, alphanumeric passcode. Pro    tip: Just use a string of numbers so you don't have to flip    back and forth between keyboards when unlocking your phone.  <\/p>\n<p>    Now about those apps. The main thing you want to encrypt is    your communication data, and the Privacy Pack makes that very    easy for Android users. Including in the bundle are     TextSecure and     RedPhone, two free apps made by Whisper    Systems that let you send texts that are encrypted over    the air and make phone calls with end-to-end encryption.    Suitable free iPhone equivalents are     TigerText for texting and     CoverMe for phone calls. If you're willing to shell    out some money for more options, check out Silent    Circle's suite of mobile encryption software for both    platforms for US$10 a month.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.stuff.co.nz\/technology\/digital-living\/60092666\/How-to-encrypt-everything\/RK=0\/RS=g7d.RbjUyIaUskW.oH44fNJG8oQ-\" title=\"How to encrypt everything\">How to encrypt everything<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Reuters LOCK IT DOWN: It's time to get serious with your online security. A year ago, heavy duty encryption technology was something cybersecurity professionals, privacy nuts, and the odd investigative journalist cared about. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-23824","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23824"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23824"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23824\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}