Forums >
Off-Topic Discussion >
Ideas for keeping your data safe from spying
Jun 14 13 10:12 am Link Jun 14 13 10:57 am Link If there was a time machine, I'd get in it immediately where these issues would never be a problem. Jun 14 13 12:24 pm Link Jules NYC wrote: Good plan Jules Jun 14 13 01:36 pm Link I've admitted that I'm an Internet pioneer. As a graduate computer science student in the early 1970s, we students used to play semi-harmless pranks on each other. Because of that activity (and others that were going on at the time), we kinda created the first... ... Computer security, ... Network security, ... Redundancy planning, ... Backup & Restore planning, and ... The electronic bulletin board (which was the predecessor to these forums). In any case, I have always been overly protective of my privacy & on-line security. Yes, I know I could do better, but some things I've done... ... I don't have a cell phone. ... I back up to four different places. ... I don't use my real name when signing up for stuff. ... I have a special credit card (with a low limit) for online purchases. ... My web site's WHOIS refers to my web host, not me. ... I don't use social networking -- it scares me, ... I use call screening, ... And other things. I'm not as protected as I'd like to be, but I think I'm more protected than most. Jun 14 13 02:52 pm Link Looknsee Photography wrote: >>>... I don't use social networking -- it scares me, Jun 14 13 02:56 pm Link Simple..do not use a computer or telephone. Or at least use a computer not connected to anything other than a power outlet for any data you do not want to share. Jun 14 13 03:48 pm Link Lohkee wrote: Did you go to OP's link? None of it has to do with Skype or M$. Jun 14 13 04:21 pm Link matt-h2 wrote: From the article - LONDON (AP) — Phone call logs, credit card records, emails, Skype chats, Facebook message, and more: The precise nature of the NSA's sweeping surveillance apparatus has yet to be confirmed. Jun 14 13 07:12 pm Link Nothing you can do, unless you go completely off grid. George Bush, and most delusional Americans, think we are too strong to be affected by terrorist -- we've swallowed the fear hook, line, and sinker -- or we wouldn't accept the government intrusion. Jun 14 13 07:20 pm Link 255 West wrote: The intrusion started long before Bush or 9/11. I have personal first-hand knowledge of how some of the internet snooping started because I worked for one of the major internet equipment manufacturers in 2000 when it was in the works and the tap was developed. Jun 14 13 10:01 pm Link Jun 14 13 10:15 pm Link There are ways to keep your data safe. If you have files on your computer you want to keep private, you can encrypt them and it is extremely difficult for anyone else without the password to access. In fact, to date, there is not one single case of it being cracked or hacked by any law enforcement agency in the world. They have had to testify in court that they were unable to crack the encryption. It is TrueCrypt. I'm not spamming them because it's free. You download the program and you can encrypt an entire external drive or files on your main drive and it has not been cracked or hacked yet. I've used TrueCrypt for years and love it. For online activity, you can use a virtual privacy network or VPN, a good list of them are here: http://torrentfreak.com/vpn-services-th … on-130302/ (TOR is too slow, I never use it) The VPN isn't foolproof but then again, you're not Osama bin Laden. What I mean by that is that your security should match the level of whoever is looking for you. If you're just some guy downloading pirated movies or hiding your porn collection from your wife, retail proxies and encryption services are fine for that level. But if you're some terrorist or whatever, you have to watch every single thing: throw away cell phones, disguises, facial recognition, total drive encryption, etc. A good snoop will probably find you. Example: a guy had total security on his computer, had the best proxies, VPN's, encrypted his entire hard drive, thought he was safe. The snoop waited until he left, picked the guy's front door lock, installed a wireless mini camera and pointed it at the guy's computer and keyboard, parked across the street, and recorded everything the guy did. (that was me back in the days I was a private investigator for Pinkerton in Chicago) There's always a way. Jun 15 13 07:46 am Link Salater Photography wrote: Chuckles. There sure is (25 years IT investigator for IRS). Jun 15 13 07:57 am Link Jules NYC wrote: Like 1988? Jun 15 13 08:42 am Link Jules NYC wrote: Did such a time ever exist? Jun 15 13 08:43 am Link Rumor has it that the NSA guys have been spending their time in a darkened room with plenty of Vaseline reviewing my Internet traffic Jun 15 13 08:45 am Link Looknsee Photography wrote: Yes, but at the cost of giving up some modern innovations. Jun 15 13 08:50 am Link rp_photo wrote: Not to mention sanity. Products like TrueCrypt are very very good when it comes to protecting data against your average burglar (and highly recommended). Against a state actor with resources? Worthless. Jun 15 13 10:57 am Link rp_photo wrote: No wonder I've got so many "views" on certain images! Jun 15 13 11:00 am Link Lohkee wrote: Oh my gosh, I can only imagine what you know and what you did. Love to sit down and have a few beers with you. Jun 15 13 10:31 pm Link Windows NSA key --- google it Not a surprise to anyone who did IT support. How NSA access was built into Windows http://www.heise.de/tp/artikel/5/5263/1.html "04.09.1999 Careless mistake reveals subversion of Windows by NSA." Crypto expert: Microsoft products leave door open to NSA http://www.cnn.com/TECH/computing/9909/03/windows.nsa/ September 3, 1999 Microsoft Stonewalls NSA_key Questions - Cryptome http://cryptome.org/nsakey-ms-dc.htm Facebook got 10,000 requests for data from NSA in just six months (and Microsoft received 7,000 orders) http://www.dailymail.co.uk/news/article … rders.html Revealed: Yahoo FOUGHT against NSA's warrantless spying program but lost and was forced by secret court to join PRISM http://www.dailymail.co.uk/news/article … PRISM.html Jailed Qwest CEO claimed that NSA retaliated because he wouldn’t participate in spy program http://dailycaller.com/2013/06/13/jaile … y-program/ Google versus the NSA, choice versus trust http://www.zdnet.com/google-versus-the- … 000016835/ G20 surveillance: why was Turkey targeted? http://www.guardian.co.uk/world/2013/ju … geted-gchq "Being a Nato ally seems to offer little protection against covert monitoring. The only boundary GCHQ appears to recognise is membership of Five Eyes, the tight coalition of western English-speaking states that share their signals intelligence: the US, UK, Canada, Australia and New Zealand. When it comes to eavesdropping on a national of a "second party", as Five Eyes members are called, that government has to be informed. Anyone outside that select group is potentially fair game. In fact, the question the Turkish G20 document leaves unanswered is: if GCHQ was actively contemplating wiretaps on mid-level treasury officials in the hope of capturing their thoughts on the regulatory architecture of global finance, who would it not spy on?" Jun 16 13 03:45 pm Link |