{"id":31295,"date":"2017-02-10T18:40:56","date_gmt":"2017-02-10T23:40:56","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/how-to-encrypt-all-your-data-the-daily-dot.php"},"modified":"2017-02-10T18:40:56","modified_gmt":"2017-02-10T23:40:56","slug":"how-to-encrypt-all-your-data-the-daily-dot","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/how-to-encrypt-all-your-data-the-daily-dot.php","title":{"rendered":"How to encrypt all your data &#8211; The Daily Dot"},"content":{"rendered":"<p><p>    Whether youre an activist living under an autocratic regime,    or a law-abiding citizen in the worlds biggest democracy, you    have many reasons to fear for the safety of your data.    State-sponsored cybercriminals, fraudsters, three-letter    agencies and data-hungry corporations will go to great lengths    to lay their hands on your files and data and use them for    their own ends.  <\/p>\n<p>    If theres one thing eavesdroppers and data thieves hate, its    encryption. It keeps them away from your private    and sensitive dataor at the very least gives them enough    headaches to go seek prey elsewhere.  <\/p>\n<p>    Here are seven tips that will beef up your defenses against    hackers by encrypting the data you store and share across your    devices and the internet.  <\/p>\n<p>    We use messaging apps for a lot of our work and personal    communications, ignoring the fact that some of them will not    protect us against hackers. Server hacks and man-in-the-middle    attacks are two popular methods that can give unwanted parties    access to your sensitive messages.  <\/p>\n<p>    Secure messaging apps such as Signal, which    feature end-to-end encryption, scramble your messages in a way    that allow on the recipient of the message to read them. While    there are several end-to-end encrypted messaging apps out    there, Signal is by far the most secure because it stores the    least amount of information about its users. A more detailed    discussion of messaging app security can be found here.  <\/p>\n<p>    A hacker with your login credentials or a government agency with a search warrant can    scan your emails stored on a server. Just ask John Podesta. In order to protect    your mailbox from potential hacks, you can use PGP, a technique that encrypts your    messages with a key that only you possess.  <\/p>\n<p>    PGP might not be very intuitive and user-friendly, but its    worth the added security. Alternatively, you can sign up for a    secure email service such as ProtonMail, which encrypts your emails    end-to-end.  <\/p>\n<p>    A more detailed discussion of email security can be found    here.  <\/p>\n<p>    You might want to prepare in advance for the day your phone or    laptop becomes lost or stolen (or gets confiscated by security    forces if youre ruled by a tyrannical regime). And no, a good    login-screen password will not protect the files on your    computer. Anyone with the most basic IT skills can plug your    hard disk into another computer and extract your files.  <\/p>\n<p>    Full-disk encryption (FDE) automatically    encrypts everything that is stored on your drive with a key    that is only accessible to you, preventing someone with    physical access to your device from accessing your files.  <\/p>\n<p>    Software such as Symantec Endpoint Encryption offer    full-disk encryption, but the latest version of most operating    systems already have built-in FDE features. In Windows its    called BitLocker, in MacOS its FileVault. Apples    iOS 8 and later as well as Android Lollipop (5.x) and higher    have full-disk encryption enabled by default.  <\/p>\n<p>    Encrypting the files you store on the cloud can protect you    from unwanted access to your account. A simple option is to    store your files in password-protected zip archives before    uploading them to your cloud storage. However, the extra manual    effort required to zip and unzip your files might be too    frustrating.  <\/p>\n<p>    An alternative is to use third-party tools such as Boxcryptor,    which adds client-side encryption to most famous cloud storage    services such as Google Drive and Dropbox. You can also opt for    secure storage services such as SpiderOak One, which have built-in encryption.  <\/p>\n<p>    Thumb drives and memory cards easily get lost, so you if youre    carrying your data on removable media, you should always plan    for the worst.  <\/p>\n<p>    Your best option would probably be to choose a secure memory    stick such as datAshur. These USB drives come with built-in    hardware encryption protected by a 7-15 PIN code and are    compatible with all major operating systems.  <\/p>\n<p>    If you want to stick to your old memory drive, there are some    decent software alternatives. Windows users can encrypt    removable drives with BitLocker to Go, and Mac users can use    FileVault. Most third-party full-disk encryption software    supports removable drive encryption as well.  <\/p>\n<p>    While browsing the internet, make sure you only fill in forms    on websites that have addresses starting with https (the s    stands for secure). Sites with plain HTTP dont encrypt your    data and are vulnerable to eavesdropping.  <\/p>\n<p>    The Electronic Frontier Foundations HTTPS    Everywhere extension for FireFox, Chrome, and Opera adds a    layer of security by encrypting your traffic when you visit    major websites.  <\/p>\n<p>    However, HTTPS does not conceal everything, and an eavesdropper    will still be able to monitor the sites and URLs youre    visiting (which sometimes contain sensitive information). A    more secure alternative would be to use TOR, a    browser that encrypts your entire traffic and forwards it    through other computers (called TOR nodes). A malicious actor    would no longer be able to extract any information by    monitoring your traffic.  <\/p>\n<p>    If you want to go the extra mile to encrypt everything that    comes in and goes out of your device, consider using a virtual    private network (VPN). VPNs encrypt and forward all your    traffic through a server in another geographical location,    which makes it difficult to monitor your activities.  <\/p>\n<p>    A software VPN that offers decent performance is Psiphon, a free-to-use tool that was designed to    help people living under the censorship of repressive regimes.    Psiphon can be installed on all major desktop and mobile    operating systems.  <\/p>\n<p>    A hardware alternative is Anonabox, a TOR\/VPN router that can secure    your traffic while also saving you the processing power    required to theextra encryption and decryption.  <\/p>\n<p>    These tips will help you put up a tougher fight against    hackers. However, take note that theres no such thing as    absolute security, and encryption per se is not a silver bullet    that will fix all your security problems. You still have to    adhere to basic cybersecurity principles, such as    keeping your operating system and antivirus updated and    choosing strong passwords for your account.  <\/p>\n<p>    Ben Dickson is a software engineer and the founder of    TechTalks. Follow his tweets at    @bendee983 and his updates on    Facebook.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.dailydot.com\/layer8\/encrypted-email-messaging-apps\/\" title=\"How to encrypt all your data - The Daily Dot\">How to encrypt all your data - The Daily Dot<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Whether youre an activist living under an autocratic regime, or a law-abiding citizen in the worlds biggest democracy, you have many reasons to fear for the safety of your data. State-sponsored cybercriminals, fraudsters, three-letter agencies and data-hungry corporations will go to great lengths to lay their hands on your files and data and use them for their own ends. If theres one thing eavesdroppers and data thieves hate, its encryption<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31295","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31295"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31295"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31295\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}