“I am regularly impressed with the thought and care put into both the security and the usability of this app. It’s my first choice for an encrypted conversation.”
Signal offers private messaging and calling in one simple app. It is both free and open source. Development is supported by community donations and grants. This means that there are no hidden strings attached. Use Signal as an alternative to WhatsApp or, better still, its replacement.
“Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web.” The Electronic Frontier Foundation has released Privacy Badger 1.0 for Firefox and Chrome.
“Mass surveillance creates a prison in the mind.”
“Die elektronische Post kam mit kostenlosen Diensten in Mode. Für sie zahlen Kunden nicht in harter Währung, sondern akzeptieren Werbung und meist auch die Verwertung der aus ihren Daten gespeisten Kundenprofile.” Mittlerweile bekannt gewordene Abhörpraktiken der NSA rücken immer mehr auch Fragen nach der Sicherheit von E-Mails in den Vordergrund. Die Stiftung Warentest hat 14 Provider unter die Lupe genommen: Als Testsieger gehen Mailbox.org und Posteo hervor.
“Hackers can’t steal your stuff and annoying advertisers can’t track you. Connect to any hotspot, public or private without exposing your traffic. Access geo-restricted content by changing your virtual location. Control your privacy and security at the push of a button.”
“The question for us is not what new story will come out next. The question is, what are we going to do about it?” James Bamford interviews Edward Snowden, who regards the use of strong encryption in your everyday communication as a viable means to end mass surveillance.
Also watch United States of Secrets, a two-part series detailing how the US government came to monitor and collect the communications of millions around the world.
“OpenKeychain helps you communicate more privately and securely. It uses high-quality modern encryption to ensure that your messages can be read only by the people you send them to, others can send you messages that only you can read, and these messages can be digitally signed so the people getting them are sure who sent them.”
“What Amazon and many other companies began to do in the late 1990s was build up a giant world of the past on their computer servers. A historical universe that is constantly mined to find new ways of giving back to you today what you liked yesterday—with variations.” Adam Curtis highlights the mechanisms that help to narrow and simplify our experiences to the point that we are in danger of getting stuck in a static, ever-narrowing version of ourselves, locked into place, “perpetually repeating the past and terrified of change and the future”.
“This combination—a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist—opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources—and might go unnoticed.” Jeremy Scahill and Ryan Devereaux report on the Obama administration’s expansion of the terrorist watchlist system.
“WhatsApp notoriously rifles through your address book, scoops up your phone numbers, and uploads them to its servers. This is something Facebook has wanted for some time since its own phone records are incomplete.” Andrew Orlowski is convinced that what Facebook actually bought are your contact’s phone numbers.
“Basically, iCloud is appallingly insecure, and Apple has just dramatically increased the volume of information that’s about to start flowing through it—names, email addresses, home addresses, and phone numbers in droves, not to mention your doctor’s visits.” Molly Wood does not regard Apple’s iCloud a safe place for her data.
“And whoever tells you that they have nothing to hide simply haven’t thought about this long enough. ‘Cause we have this thing called privacy. And if you really think that you have nothing to hide, please make sure that’s the first thing you tell me because then I know, that I should not trust you with any secrets because obviously, you can’t keep a secret [sic]”
“I would suggest that it is more useful to take a holistic democratic accounting of lawful access laws and their implications. Where such laws are prospectively damaging to the fabric of the democracy, perhaps by threatening rights of free speech, association, and limitations of governmental search powers, then those are the areas that we as citizens, journalists, and commentators must focus our attention. Such democratic narrative can be supported by technological and legal facts and opinions, but critically the basic narrative is not on corporate products, whiz-bang technologies, nor legal minutia, but the very principles of a democracy.” Christopher Parsons in 2012, more than one year before Edward Snowden, is right on the money pinpointing the implications of unrestrained government surveillance.
“I think there is an equally diffuse malaise today—waiting for a new kind of journalism to bring it into focus. Like with McClure’s it won’t be just a catalogue of shocking facts—it will be an imaginative leap that pulls all the scandals together and shows how they are part of some new system of power that we don’t fully comprehend.” Adam Curtis attempts to define the point at which journalism fails and modern power begins.
“Our choice isn’t between a digital world where the agency can eavesdrop and one where it cannot; our choice is between a digital world that is vulnerable to any attacker and one that is secure for all users.” Bruce Schneier regards ubiquitous surveillance as a quixotic undertaking that does nothing to keep us safe and does everything to undermine the very societies we seek to protect.
“Threema is a mobile messaging app that puts security first. With true end-to-end encryption, you can rest assured that only you and the intended recipient can read your messages.” Threema is my favourite instant messaging application and has been described as “a much flasher version of WhatsApp”. Its source code has recently undergone an external security audit and was found to provide a ”security level which compares favourably with the state of the art in similar messaging services“.
“We now face the greatest threat to our liberties since the second world war. We are sleepwalking into despotism. Because of the amount of material that is being collected, because these databases, which are not about tiny items of information, will be used and not just by governments. Snowden was working for a corporation. They will be accessed by others in government and because, that’s most important of all, people will start to self-censor. We will find that the very fact of the total surveillance of our activities means that we are going to sort of … it’s not a question, as the foreign minister said, of ‘if you haven’t done anything wrong you have nothing to fear’. [sic] This structure of surveillance will stop us doing things which are right, that we know we should be doing.” Anthony Barnett appearing on yesterday’s Newsnight programme.
“The RockYou dump was a watershed moment, but it turned out to be only the start of what’s become a much larger cracking phenomenon. By putting 14 million of the most common passwords into the public domain, it allowed people attacking cryptographically protected password leaks to almost instantaneously crack the weakest passwords. That made it possible to devote more resources to cracking the stronger ones.” Dan Goodin details the many reasons you should choose your passwords even more carefully.
“The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They’re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.” Bruce Schneier works on the assumption that the NSA is able to decrypt most of the Internet.
On the same subject, David Meyer felt moved to pen an open letter titled ‘Dear stupid, stupid NSA’.
“Practicing effective counterintelligence on the internet is an extremely difficult process and requires planning, evaluating options, capital investment in hardware, and a clear goal in mind.” The advice of the grugq is to choose your adversaries carefully, should you wish to maintain anonymity.