Privacy Concerns: 3 Ways To Avoid NSA Detection On The Internet

3 Ways To Avoid NSA Detection On The Internet

Internet privacy

Image source: LiveScience.com

We unfortunately live in the age of surveillance, when agencies like the  NSA and FBI push and cross the boundaries of unconstitutional actions.

This means that everybody needs to take steps to protect their data and. Obviously, there is no such thing as total protection, and a determined individual or organization with a lot of time and money on their hands can break any security if they want.

But you can make your data and communications so hard to access on the Internet that it will deter the bad guys. The harder it is to access your information, the more likely hackers, spies and other cyber pests will go elsewhere.

Protect Your Data

The best way to deter these interlopers is by putting up several layers of protection, the cyber equivalent of a multi-layered defense. Here are some Internet defenses that work:

1. Encryption. Here’s a quote from somebody who knows a lot about cyber security and how to get around it: ex-NSA hacker Edward Snowden: “Encryption works. Properly implemented, crypto systems are on one of the few things you can rely upon.” Encryption simply means scrambling information so it’s hard to decode. Governments have been doing it for well over a century and the good news is that there are encryption software programs anybody can take advantage of. They include:

  • Tor Browsers which let users send encrypted data on PCs and laptops, Android devices or iPhones.
  • Red Phone which lets you send encrypted voice communications between two Android phones. Both users have to deploy the app to get the protection.
  • Text Secure which lets you send encrypted text communications over Android phones.
  • PGP or Pretty Good Privacy — a commercial product available from a company called Symantec. It isn’t perfect but it will protect you from amateur hackers and most criminals. There are also some free open-sourced variations of this product available including one for Windows.

Revisit the counsel of great men and learn how to reclaim the quality of government we once enjoyed.

 

  • There are also encrypted mail services such as Hushmail.com and Silent Circle. The problem is that these organizations can be forced to divulge data to the FBI or NSA through court orders. A similar service called Lavabit was forced to shut down because it refused to give the FBI access to Edward Snowden’s email account.
  • Experts believe that the best method is to use two or three encrypted services. A system called STARTLS is hard to track. All the information on services that use these is encrypted.
  • Some more alternatives are coming. The governments of nations like Germany and Brazil are talking about setting up encrypted email services for their citizens, and in the future it might be possible for Americans to take advantage of those. There are also foreign email systems such as NEOMAILBOX which is based in neutral Switzerland. The Swiss have a long history of protecting privacy including that of American citizens.

2. Use HTTPS as much as possible. While many websites you surf use “HTTP,” the alternative HTTPS – used by such websites as banks and financial institutions – encrypts the data, making it much harder to hack. Use a browser plug-in called HTTPS Everywhere to help.

3. Avoid services from companies known to cooperate with the NSA and FBI. This includes Google Gmail, Hotmail, Twitter, AOL, Yahoo, Skype, Apple and other large American technology companies.

This White Paper from the Press Freedom Foundation provides more advanced information. It mentions some of the techniques that journalists like Glenn Greenwald use to protect their data. In today’s world everybody is going to have to follow some of these steps to protect their privacy.

Meanwhile, computer programmer John McAfee says he plans on releasing a $100 anti-NSA device called “D-Central” that will protect citizens from detection. Off The Grid News will monitor its release date.


Views: 121

Reply to This

Replies to This Discussion

Some people think they have nothing to hide.  I refer to the "post Boston bombing" when a couple was hassled bu police after online window shopping for a ‘Pressure Cooker’!!! You might avoid incarceration now by spending everything on a defense attorney – but in future you could spend years in a FEMA CAMP waiting for justice, for something you stated yesterday.

Redphone is not secure.  NOTHING can be secured on a cellphone. EVERY publicly available baseband is insecure, and no protection from within the OS can help you. No crypto matters on a cellphone because once they own the baseband they can listen to audio going into the mic and out of the speaker, effectively tapping the phone at a lower level and completely bypassing the crypto.

Please go watch youtube/watch?v=c5GDUvTfhtU
It is a talk about the baseband apocalypse. They only talk about gsm, but this literally extends to all basebands. This attack is actively used by the FEDS, and they have used it as evidence in court.

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea replied to cheeki kea's discussion Tartaria
"This screenshot is from a book found by a blogger in his research and gives an eye witnessed…"
10 hours ago
cheeki kea commented on Doc Vega's blog post To Each and every One of you here Happy Thanksgiving
14 hours ago
Doc Vega posted blog posts
yesterday
Doc Vega commented on tjdavis's video
Thumbnail

The Hunt - Official Trailer [HD]

"A former ANTIFA member was interviewed here recently and this would not be far from actual reality…"
Monday
Doc Vega posted blog posts
Monday
tjdavis posted videos
Monday
tjdavis posted a blog post
Monday
tjdavis posted a photo
Monday
Doc Vega posted a blog post

Legacy of Supposedly Inferior Aircraft Outmatching Their Enemies

 We think of the Korean War aerial combat as the classic dogfights between the American F-86 Sabre…See More
Saturday
Doc Vega commented on tjdavis's blog post Cities,States Without Limits
"This is just another form of a feudal globalism dictated by corporate technocrats bragging about…"
Saturday
Doc Vega favorited tjdavis's blog post Cities,States Without Limits
Saturday
Doc Vega posted a blog post

What is Area 2 and What Goes on There?

 We have all heard of Area 51 and S-4, along with such terms as Water Town, Papoose Lake,…See More
Nov 21
Doc Vega posted a blog post

STRANGE THINGS HAPPENING IN YELLOWSTONE

It’s not the fact that Yellowstone National Park sits atop a super volcano that hasn’t erupted in…See More
Nov 20
tjdavis posted a video

Austrian police raid house of man who leaked Israeli ambassador video making genocidal comments

In a new ITV documentary, Breaking Ranks: Inside Israel’s War, former Israeli soldiers describe how Gaza civilians were killed, often without warning, in an ...
Nov 20
Burbia posted a video

WARHAMMER 40,000 | 1980's GRIMDARK MOVIE

WARHAMMER 40,000 | 1980's GRIMDARK MOVIEThis is a Concept Movie Trailer made with the help of AI. This video is created purely for fun and out of curiosity a...
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19
tjdavis commented on tjdavis's blog post THE ORIGINS OF THE WORLD ASSOCIATION OF SOCIAL PSYCHIATRY IN LONDON, UK IN 1964
"Tavistock Timing"
Nov 19
tjdavis posted a blog post
Nov 19
Doc Vega posted a blog post

The Ringside View

Down in the streets where the animals meetWhere tear gas flies and people get beatWhere…See More
Nov 19

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted