{"id":9737,"date":"2014-03-11T18:41:54","date_gmt":"2014-03-11T22:41:54","guid":{"rendered":"http:\/\/www.opensource.im\/?p=9737"},"modified":"2014-03-11T18:41:54","modified_gmt":"2014-03-11T22:41:54","slug":"snowden-how-to-protect-yourself-from-mass-surveillance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/snowden-how-to-protect-yourself-from-mass-surveillance.php","title":{"rendered":"Snowden: How to protect yourself from mass surveillance"},"content":{"rendered":"<p><p>    Austin, Texas (dpa)  Encryption is still effective at    thwarting surveillance, and internet users can protect their    privacy with a variety of easy-to-use tools, fugitive US    intelligence contractor Edward Snowden said Monday.  <\/p>\n<p>    The bottom line  and I repeated this again and again  is    that encryption does work, said Snowden, speaking to the South    by Southwest Interactive conference by live videolink from    Russia. We need to think about encryption not as this sort of    arcane black art but sort of a basic protection. Its the    defence against the dark arts in the digital realm.  <\/p>\n<p>    Snowden advised users to take two major steps to safeguard    their digital privacy: encrypt their physical devices to    protect them in case theyre seized, and use network encryption    to cover their online tracks.  <\/p>\n<p>    Disk encryption can be achieved using multiple commercially    available tools, both software and hardware-based. They encrypt    all the data on a device and prevent unauthorized access.  <\/p>\n<p>    Network encryption involves a number of technologies such as    the SSL cryptographic protocols, which are designed to provide    secure communications via the use of session keys to encrypt    data flowing between the parties.  <\/p>\n<p>    Snowden recommended the browser plug-ins NoScript    (<a href=\"http:\/\/dpaq.de\/22gas\" rel=\"nofollow\">http:\/\/dpaq.de\/22gas<\/a>) to block active exploitation attempts in    the browser, and Ghostery (<a href=\"http:\/\/dpaq.de\/zOoR4\" rel=\"nofollow\">http:\/\/dpaq.de\/zOoR4<\/a>) to block ads    and tracking cookies.  <\/p>\n<p>    Another essential privacy tool is the use of the so-called    mixed routing network TOR (<a href=\"http:\/\/dpaq.de\/ZcKOI\" rel=\"nofollow\">http:\/\/dpaq.de\/ZcKOI<\/a>), an anonymity    network that routes traffic through a vast system of relays to    hide a users location and usage from anyone conducting network    surveillance or traffic analysis.  <\/p>\n<p>    If you take those basic steps, you encrypt your hardware and    you encrypt your network communications, youre far, far more    hardened than the average user, and it becomes very difficult    for any sort of a mass surveillance to be applied to you,    Snowden said.  <\/p>\n<p>    Youll still be vulnerable to targeted surveillance, he    added. If theres a warrant against you, if the NSAs after    you, theyre still going to get you. But mass surveillance,    this untargeted, collect-it-all approach, youll be much    safer.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.mb.com.ph\/snowden-how-to-protect-yourself-from-mass-surveillance\" title=\"Snowden: How to protect yourself from mass surveillance\">Snowden: How to protect yourself from mass surveillance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Austin, Texas (dpa) Encryption is still effective at thwarting surveillance, and internet users can protect their privacy with a variety of easy-to-use tools, fugitive US intelligence contractor Edward Snowden said Monday. The bottom line and I repeated this again and again is that encryption does work, said Snowden, speaking to the South by Southwest Interactive conference by live videolink from Russia. We need to think about encryption not as this sort of arcane black art but sort of a basic protection<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-9737","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/9737"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=9737"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/9737\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=9737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=9737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=9737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}