Read

User menu

Search form

Learn to Safeguard Internet Privacy Like You're 007

Learn to Safeguard Internet Privacy Like You're 007
Wed, 10/24/2012 - by Conrad Jaeger

When a Manhattan court ruled last month that Twitter must hand over tweets from Occupy activist Malcolm Harris following a protest on Brooklyn Bridge, it set a precedent that on-line communications are no longer our own property and can easily be used against us by law enforcement.

Perhaps Malcolm and others should have taken some elementary precautions.

Obviously, you don’t have to sign up with Twitter using your real name or with an email address that links back to you. There are plenty of free email options out there from companies that won’t sell on your data. You can also muddy things further by conjuring up an entirely new persona for yourself with a fake identity generator.

If you do want to stand on a public landmark and tweet, you had best mask your smartphone first. Luckily, there are apps for both Android and Apple devices that divert all communications through a hidden network, masking both identity and location, and providing anonymous access to Twitter and Facebook as well as instant messaging and secure email.

If things turn nasty and local ISPs deny access, these apps still connect to social networks and websites blocked by the State even when law enforcement cannot.

But don’t stop there. When it comes to communicating with fellow activists, you might as well go all James Bond; and there are a lot of free spy tools on the Internet.

With PrivNote, you can send messages that self-destruct once read. Or you could hide a secret message inside something so fundamentally boring that no one will bother to look deeper.

At SpamMimic, you can enter a short message and have it regurgitated as mind-numbing spamtext that you send out to your friends. They just paste the spam back into a box on the site and out comes the message.

To be extra smart, send out your spam via a re-mailer such as AnonyMouse, where you can compose an email and have all the delivery codes stripped away and new ones added along the journey. When the email arrives at its destination, there is no way that it can traced back to you.

If you want to send a longer message, you will need to encrypt it and a PGP Key is the best way to do that. There are various ways of setting up a PGP Key for smartphones and other devices; some free, like iGolder.

Basically, you need to generate two keys – a public key which you give to anyone wanting to send you encrypted data and a private key that you keep to yourself. The sender uses your public key to encrypt the data and then sends it to you. When you receive the data, you unscramble it with your private key. Top mathematicians guarantee the system 100 percent secure; just don’t lose your key.

To really make things really difficult for even the most determined adversary, you can hide your encrypted message inside an innocuous-looking digital photo or music track. This is cryptography’s dark cousin, steganography from the Greek meaning secret writing. Think invisible ink.

These days you can hide almost any kind of digital file by embedding it inside another digital file, such as a .jpg, .bmp or mp3. You can use it for all manner of covert communication. WikiLeaks-type documents can be embedded inside a photo, short videos can be transmitted secretly inside a music file, and messages can be passed on by a digital ‘drop box’ held on a photo within a webpage.

Counter-technology isn’t very good and there is little to give the game away unless the file is unexpectedly large. Just looking at the image or trying to open it with a steganalysis program will not show that the image contains any hidden data.

But perhaps the simplest way to communicate secretly is to open a free email account and then give the address and log-in details to the other members of your group. Messages are then written but saved as drafts and never sent. The draft messages are then accessed by those with the password. This way the emails are never actually transmitted so cannot be intercepted. You can even use the account as a personal bulletin board with all members posting on different topics.

The case of Malcolm Harris shows us how we need to tighten security. There is no reason to play ball and allow our human rights to be infringed. We can easily slip from the grasp of those who would monitor and control us. We might even claim the liberty that the Internet originally promised.

But, if it seems that Internet freedom is at a low ebb right now, just wait until the Utah Data Center comes on-stream next year when absolutely everything you say or do on-line will be logged and analyzed and used to profile you the way they did in the movie "Minority Report."

Scary times ahead. You are going to need some serious security.

Conrad Jaeger is the author of "Deep Web Secrecy and Security" published by Deep Web Guides and available as an interactive e-book for $10.37 on Amazon.

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

History shows there are no “one-day” dictatorships. When democracies fall, they typically fall completely.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Posted 1 month 2 weeks ago

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Posted 1 month 7 hours ago

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

Posted 6 days 7 hours ago

History shows there are no “one-day” dictatorships. When democracies fall, they typically fall completely.

Posted 1 week 1 day ago