
The right to privacy is not negotiable. EVERYONE has a right to privacy, and the political rhetoric that only criminals or terrorists want or need privacy is bunk! This is a line meant to make YOU feel guilty for exercising a basic human and legal right.
"The FCC’s ‘Protecting the Privacy of Customers of Broadband and Other Telecommunications Services’ regulation through the Congressional Review Act is under attack, and will likely always be under attack. The FCC rules limit broadband providers from accessing and collecting personal customer information, including web browsing data and app usage history. The privacy rules were a result of the FCC's contentious net neutrality rules, which reclassified broadband providers as common carriers." - Quote from The Hill
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
5. Selling your data to marketers
4. Hijacking your searches
3. Snooping through your traffic and inserting ads2. Pre-installing software on your phone and recording every URL you visit
1. Injecting undetectable, undeletable tracking cookies in all of your HTTP traffic
The above is courtesy of the EFF (Electronic Frontier Foundation), an organization that protects the rights of every person who uses electronic devices.
HOW TO PROTECT YOURSELF IN THE DIGITAL AGE
1. Visit the EFF Surveillance Self-Defense site. Everything is there to help even the person who isn't tech savvy. You don't need a computer science degree to protect yourself.
2. Purchase and set-up and VIRTUAL PRIVATE NETWORK (VPN) that DOES NOT keep user records of any kind! Your choice of VPN service should also not have access to encryption keys. PIA is recommended.
3. STOP using Windows! Use LINUX instead! With Linux, you don't need antivirus software, and you gain more privacy by being able to use other linux based operating systems. This can be done on a windows machine, but is better if the entire machine runs linux instead of being partitioned off.
4. Download and use one of these Linux operating systems:
The TAILS and WHONIX systems run through TOR. and provide you the ability to be completely anonymous on the web (internet) if you follow their very simple directions. In conjunction with a good VPN, you'll be totally off-the-grid as far as your ISP and other people are concerned. TAILS is a system that leaves NO TRACE of anything on your computer system.
VeraCrypt - Important note about this:
In order to boot a system encrypted by VeraCrypt, an unencrypted copy of the
VeraCrypt Boot Loader has to be stored on the system drive or on a
VeraCrypt Rescue Disk. Hence, the mere presence of the VeraCrypt
Boot Loader can indicate that there is a system encrypted by VeraCrypt
on the computer. Therefore, to provide a plausible explanation for the
presence of the VeraCrypt Boot Loader, the VeraCrypt
wizard helps you create a second encrypted operating system, so-called
decoy operating system, during the process of creation of a
hidden operating system. A decoy operating system must not contain any
sensitive files. Its existence is not secret (it is
not installed in a
hidden volume). The password for the decoy operating system can be
safely revealed to anyone forcing you to disclose your pre-boot
authentication password.*
You should use the decoy operating system as frequently as you use your
computer. Ideally, you should use it for all activities that do not
involve sensitive data. Otherwise, plausible deniability of the hidden
operating system might be adversely affected (if
you revealed the password for the decoy operating system to an
adversary, he could find out that the system is not used very often,
which might indicate the existence of a hidden operating system on your
computer). Note that you can save data to the decoy
system partition anytime without any risk that the hidden volume will
get damaged (because the decoy system is
not installed in the outer volume
5. Learn about encryption and how to use it. Lifehacker has a resource on it.
Encrypting Your Computers, Phones, and Communications
The Electronic Frontier Foundation has a new secure messaging guide coming. Check this link often!
ENCRYPT YOUR ENTIRE DISC DRIVE!!! ENCRYPT your thumb drives, ENCRYPT your Android device!! ENCRYPT everything on your I-Phone!! I-Phone disc drives are encrypted by default, but always make sure!
PASSWORD PROTECT EVERYTHING! Your computer files, your android files, your android apps, your I-Phone apps & files....never leave yourself open!
Don't ever use the default messaging app that your phone comes with! Download Signal by Whisper Systems. If you have Chrome or Chromium for a browser, go to the Chrome Store and download Signal for desktop if you want to use it when you're not near your phone.
There are other end to end encrypted messaging and calling apps, but Signal is by far, the best. What'sApp is good for those who are not state targets, but it may possibly leave metadata behind. You don't want that!
According to the EFF, these are the best communications apps to use if you want total privacy:
Signal - Open Whisper Systems
Silent Phone
Silent Text
Telegram
Always make sure your devices and communications apps use end-to-end encryption with perfect forward secrecy
(PFS). This means the keys used to scramble communication can’t be
captured through a server and no single key gives access to past
messages.
PGP 7.0.3
Pretty Good Privacy
Downloading, Installing, Setting Up, and Using this Encryption Software
A Tutorial for Beginners to PGP
Pretty Good Privacy
Downloading, Installing, Setting Up, and Using this Encryption Software
A Tutorial for Beginners to PGP
prepared
by
by
Bernard
John Poole, MSIS, University
of Pittsburgh at Johnstown, Johnstown, PA, USA
with
Pranav
Lal, International Management Institute, New
Delhi, India
Robert A. Rosenberg
, RAR Programming Systems Ltd., Suffern, NY, USA
Table
of Contents:
Safe Browsing
The TOR Project
TOR is available for all operating systems, including Android and IOS
Check out Privacy Badger by EFF
Transparency Project
Some say HTTPS, RSA, PGP, SSL, TLS are compromised. Always stay ahead of threats to encryption, and what has been done to assess, and act on those threats.
Password Tips (University of Chicago)
Norse Corp Cyberwar Console
Find Your IP Address
HTTPS Spoofing by Employers
Some say HTTPS, RSA, PGP, SSL, TLS are compromised. Always stay ahead of threats to encryption, and what has been done to assess, and act on those threats.
Passwords, DNS Leaks, ETC
Password Tips (University of Chicago)
Norse Corp Cyberwar Console
Find Your IP Address
HTTPS Spoofing by Employers
EXIF Viewers
Protecting Your Right To Privacy While Crossing Borders
Blogger's (Journalist's) Rights

The EFF holds the following to be self-evident:
Bloggers can be journalists (and journalists can be bloggers)
Bloggers are entitled to free speech
Bloggers have the right to political speech
Bloggers have the right to stay anonymous
Bloggers have freedom from liability for hosting speech the same way other web hosts do
Chicago-One Supports Open-Source Technology. Dump Microsoft Windows, go Linux.
Major Trusted Linux Distributions
Debian
Ubuntu
Linux Mint (offers a system based on Ubuntu and one based on Debian (LMDE),
Fedora
CentOS
OpenSuse
Gentoo
Slackware
Qubes OS (HIGHLY SECURE, and will not always work well for all computer makes and models) only the most advanced computer / Linux users should use this
Chicago-One Supports Open-Source Technology. Dump Microsoft Windows, go Linux.
Major Trusted Linux Distributions
Debian
Ubuntu
Linux Mint (offers a system based on Ubuntu and one based on Debian (LMDE),
Fedora
CentOS
OpenSuse
Gentoo
Slackware
Qubes OS (HIGHLY SECURE, and will not always work well for all computer makes and models) only the most advanced computer / Linux users should use this
No comments:
Post a Comment
Chicago One News welcomes reader comments on all stories. Chicago One News asks that comments remain civil. Disorderly, disruptive, aggressive, threatening, or other commonly unacceptable behavior will not be tolerated.