Digital Privacy and Freedom of Speech Resources


Bloggers' Rights at EFF

The right to privacy is not negotiable. EVERYONE has a right to privacy, and the political rhetoric that only criminals or terrorists want or need privacy is bunk! This is a line meant to make YOU feel guilty for exercising a basic human and legal right.

"The FCC’s ‘Protecting the Privacy of Customers of Broadband and Other Telecommunications Services’ regulation through the Congressional Review Act is under attack, and will likely always be under attack. The FCC rules limit broadband providers from accessing and collecting personal customer information, including web browsing data and app usage history. The privacy rules were a result of the FCC's contentious net neutrality rules, which reclassified broadband providers as common carriers." - Quote from The Hill

Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections

5. Selling your data to marketers

4. Hijacking your searches

3. Snooping through your traffic and inserting ads

2. Pre-installing software on your phone and recording every URL you visit

1. Injecting undetectable, undeletable tracking cookies in all of your HTTP traffic

The above is courtesy of the EFF (Electronic Frontier Foundation), an organization that protects the rights of every person who uses electronic devices.

HOW TO PROTECT YOURSELF IN THE DIGITAL AGE

 1. Visit the EFF Surveillance Self-Defense site. Everything is there to help even the person who isn't tech savvy. You don't need a computer science degree to protect yourself. 

2. Purchase and set-up and VIRTUAL PRIVATE NETWORK (VPN) that DOES NOT keep user records of any kind! Your choice of VPN service should also not have access to encryption keys. PIA is recommended.

3. STOP using Windows! Use LINUX instead! With Linux, you don't need antivirus software, and you gain more privacy by being able to use other linux based operating systems. This can be done on a windows machine, but is better if the entire machine runs linux instead of being partitioned off. 

4. Download and use one of these Linux operating systems:



The TAILS and WHONIX systems run through TOR. and provide you the ability to be completely anonymous on the web (internet) if you follow their very simple directions. In conjunction with a good VPN, you'll be totally off-the-grid as far as your ISP and other people are concerned. TAILS is a system that leaves NO TRACE of anything on your computer system.  

VeraCrypt - Important note about this: 

In order to boot a system encrypted by VeraCrypt, an unencrypted copy of the VeraCrypt Boot Loader has to be stored on the system drive or on a VeraCrypt Rescue Disk. Hence, the mere presence of the VeraCrypt Boot Loader can indicate that there is a system encrypted by VeraCrypt on the computer. Therefore, to provide a plausible explanation for the presence of the VeraCrypt Boot Loader, the VeraCrypt wizard helps you create a second encrypted operating system, so-called decoy operating system, during the process of creation of a hidden operating system. A decoy operating system must not contain any sensitive files. Its existence is not secret (it is not installed in a hidden volume). The password for the decoy operating system can be safely revealed to anyone forcing you to disclose your pre-boot authentication password.* You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, plausible deniability of the hidden operating system might be adversely affected (if you revealed the password for the decoy operating system to an adversary, he could find out that the system is not used very often, which might indicate the existence of a hidden operating system on your computer). Note that you can save data to the decoy system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is not installed in the outer volume

5. Learn about encryption and how to use it. Lifehacker has a resource on it

Encrypting Your Computers, Phones, and Communications

The Electronic Frontier Foundation has a new secure messaging guide coming. Check this link often!


ENCRYPT YOUR ENTIRE DISC DRIVE!!! ENCRYPT your thumb drives, ENCRYPT your Android device!! ENCRYPT everything on your I-Phone!! I-Phone disc drives are encrypted by default, but always make sure!

PASSWORD PROTECT EVERYTHING! Your computer files, your android files, your android apps, your I-Phone apps & files....never leave yourself open! 

Don't ever use the default messaging app that your phone comes with! Download Signal by Whisper Systems. If you have Chrome or Chromium for a browser, go to the Chrome Store and download Signal for desktop if you want to use it when you're not near your phone. 

There are other end to end encrypted messaging and calling apps, but Signal is by far, the best. What'sApp is good for those who are not state targets, but it may possibly leave metadata behind. You don't want that! 

According to the EFF, these are the best communications apps to use if you want total privacy: 



Silent Phone

Silent Text

Telegram


Always make sure your devices and communications apps use end-to-end encryption with perfect forward secrecy (PFS). This means the keys used to scramble communication can’t be captured through a server and no single key gives access to past messages.

PGP 7.0.3
Pretty Good Privacy
Downloading, Installing, Setting Up, and Using this Encryption Software
A Tutorial for Beginners to PGP

prepared
by
Bernard John Poole, MSIS, University of Pittsburgh at Johnstown, Johnstown, PA, USA
with
Netiva Caftori, DA, Northeastern Illinois University, Chicago, IL, USA
Pranav Lal, International Management Institute, New Delhi, India
Robert A. Rosenberg , RAR Programming Systems Ltd., Suffern, NY, USA
Table of Contents:
Safe Browsing

The TOR Project

TOR is available for all operating systems, including Android and IOS

Check out Privacy Badger by EFF 



Transparency Project

Some say HTTPS, RSA, PGP, SSL, TLS are compromised. Always stay ahead of threats to encryption, and what has been done to assess, and act on those threats.


Passwords, DNS Leaks, ETC





Password Tips (University of Chicago)

Norse Corp Cyberwar Console

Find Your IP Address

HTTPS Spoofing by Employers

EXIF Viewers



Protecting Your Right To Privacy While Crossing Borders
Blogger's (Journalist's) Rights










Bloggers' Rights at EFF

The EFF holds the following to be self-evident:

Bloggers can be journalists (and journalists can be bloggers)

Bloggers are entitled to free speech

Bloggers have the right to political speech
 
Bloggers have the right to stay anonymous

Bloggers have freedom from liability for hosting speech the same way other web hosts do 

Chicago-One Supports Open-Source Technology. Dump Microsoft Windows, go Linux.

Major Trusted Linux Distributions


Debian

Ubuntu

Linux Mint (offers a system based on Ubuntu and one based on Debian (LMDE),

Fedora

CentOS

OpenSuse

Gentoo

Slackware

Qubes OS (HIGHLY SECURE, and will not always work well for all computer makes and models) only the most advanced computer / Linux users should use this   

No comments:

Post a Comment

Chicago One News welcomes reader comments on all stories. Chicago One News asks that comments remain civil. Disorderly, disruptive, aggressive, threatening, or other commonly unacceptable behavior will not be tolerated.