{"id":7779,"date":"2014-03-01T10:53:03","date_gmt":"2014-03-01T15:53:03","guid":{"rendered":"http:\/\/www.opensource.im\/?p=7779"},"modified":"2014-03-01T10:53:03","modified_gmt":"2014-03-01T15:53:03","slug":"wiliest-ways-to-keep-the-nsa-at-bay","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/wiliest-ways-to-keep-the-nsa-at-bay.php","title":{"rendered":"Wiliest Ways to Keep the NSA at Bay"},"content":{"rendered":"<p><p>  \"Whatever the level of cryptography you're using, the NSA can  probably break into your home network, install keyloggers and  grab whatever they want -- passwords, private PGP keys,  screenshots, etc.,\" said Cyril Soler, a developer on the  RetroShare project. \"This is always easier than breaking the  encryption.\" Their ability to do that is probably facilitated by  backdoors.<\/p>\n<p>    The death of online privacy had already been proclaimed long before Edward Snowden landed in    the international spotlight, but if it wasn't confirmed back    then, Snowden's NSA revelations surely must have extinguished    the last vestiges of hope in even the most die-hard optimists.  <\/p>\n<p>    \"We're in a predicament,\" Phil Zimmermann, Pretty Good Privacy    creator and cofounder and president of Silent    Circle, told LinuxInsider. \"Everything we do on the    Internet is being captured in a vast database -- it's a kind of    Panopticon.  <\/p>\n<p>    \"We have to do something about this,\" added Zimmermann, an    Internet Hall of Fame inductee. \"We have to push back in policy    space as well as use countermeasures like encryption.\"  <\/p>\n<p>    Public policy changes rarely happen quickly, of course. In the    meantime, those countermeasures are looking more and more like    users' best bet.  <\/p>\n<p>    \"I'd recommend making phone calls with Silent Phone,\"    Zimmermann suggested, and \"for email, PGP,    GnuPG or something like it.\"  <\/p>\n<p>    As for other online activities, \"there's a lot of things you do    on the Internet that leak information,\" he added. \"They're    capturing your Web browsing.\"  <\/p>\n<p>        SSL and TLS are both protocols Zimmermann recommended    using.  <\/p>\n<p>    In addition, the Tor Web browser is \"a good idea,\" he said. \"I    would recommend using Tor for visiting any website you would    prefer to not have recorded.\"  <\/p>\n<p>    On the road, if you're in a place where there may be a lot of    interception, Tor or a VPN can help protect privacy, though not    all VPNs are equally secure, noted Zimmermann.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.linuxinsider.com\/story\/80067.html?rss=1\/RK=0\/RS=FK.NSH52n8U_DQzggVsYXH_e1lc-\" title=\"Wiliest Ways to Keep the NSA at Bay\">Wiliest Ways to Keep the NSA at Bay<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> \"Whatever the level of cryptography you're using, the NSA can probably break into your home network, install keyloggers and grab whatever they want -- passwords, private PGP keys, screenshots, etc.,\" said Cyril Soler, a developer on the RetroShare project. \"This is always easier than breaking the encryption.\" Their ability to do that is probably facilitated by backdoors. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-7779","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7779"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=7779"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7779\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=7779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=7779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=7779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}