Read

User menu

Search form

Reset The Net: We’re Not Asking For Online Privacy – We’re Taking It Back

Reset The Net: We’re Not Asking For Online Privacy – We’re Taking It Back
Thu, 5/22/2014 - by Jon Queally
This article originally appeared on Common Dreams

Led by online freedom organizations, internet firms, and other advocacy groups, a broad-based coalition is coming together with a singular call to "Reset the Net" as a way to beat back government and corporate surveillance on the web.

With a national online day of action scheduled for June 5, supporters of the campaign—including Common Dreams, Free Press, Fight for the Future, Credo Action, RootsAction.org. Demand Progress, Greenpeace, Reddit, CodePink, and dozens of others—say they will use the anniversary of the first reporting about NSA spying based on documents leaked by whistleblower Edward Snowden as an opportunity to reclaim the internet from the spying eyes of the National Security Agency and gross abuse of privacy protections.

The cornerstone of the campaign calls on web users and site managers to increase cyber-protections by using encryption and other technologies that would curtail government access to otherwise private information. In addition to posting web banners (or splash banners) on June 5, participants are asked to incorporate proven security measures to their online habits or add such features to the sites they manage. "The NSA is exploiting weak links in Internet security to spy on the entire world," states the coalition on their website, "twisting the Internet we love into something it was never meant to be."

Reset The Net urges people to "help stop mass surveillance" by building proven security into the everyday Internet and by participating in the online protest on June 5. Go to resetthenet.org and #ResetTheNet—and get ready to take the web back.

Additionally, Julia Angwin reports for ProPublica in Privacy Tools: Encrypt What You Can:

Ever since Edward Snowden revealed the inner secrets of the NSA, he has been urging Americans to use encryption to protect themselves from rampant spying.

"Encryption does work," Snowden said, via a remote connection at the SXSW tech conference. "It is a defense against the dark arts for the digital realm."

ProPublica has written about the NSA's attempts to break encryption, but we don't know for sure how successful the spy agency has been, and security experts still recommend using these techniques.

And besides, who doesn't want to defend against the dark arts? But getting started with encryption can be daunting. Here are a few techniques that most people can use.

Encrypt the data you store. 
This protects your data from being read by people with access to your computer.

  • Encrypt your hard drive so that if you lose your computer or you get hacked, your information will be safe. Most recent Apple Macintosh computers contain a built-in encryption system called FileVault that is simple to use. Some versions of Microsoft's Windows 7 also contain a built-in encryption system called BitLocker. Another popular solution is the free, open-source program TrueCrypt, which can either encrypt individual files or entire partitions of your computer or an external hard drive.

  • Encrypt your smartphone's hard drive. Yes -- your smartphone has a hard drive much like your computer does. In fact, your phone probably contains as much --or more -- sensitive information about you as your computer does. Apple doesn't let you encrypt your smart phone's hard drive or the files on it, though the operating system will encrypt passwords and some other files if you use a passcode on your device. Apple will also let you encrypt your phone's backup files on iTunes or iCloud. You can also use Find my iPhone to remotely "wipe," or delete the data on your iPhone or iPad if it is lost or stolen. Google's Android operating system lets youencrypt your phone's hard drive.

  • Encrypt the data you store in the cloud. I use the SpiderOak encrypted cloud service. If an encrypted cloud service were somehow forced to hand over their servers, your data would still be safe, because it's encrypted using a key stored only on your computer. However, this also means that if you lose your password, they can't help you. The encrypted data would be unrecoverable.

Encrypt the data you transmit. 
The Snowden revelations have revealed that U.S. and British spy agencies are grabbing as much unencrypted data as they can find as it passes over the Internet. Encrypting your data in transit can protect it against spy agencies, as well as commercial data gatherers.

  • Install HTTPS Everywhere on your Web browser. This encrypts your Web browsing sessions, protecting you from hackers and spy agencies that scoop up unencrypted traffic across the Internet. Not every site works properly with HTTPS Everywhere, though an increasing number do.

  • Use encrypted texting apps with friends who install the same apps on their phones. On the iPhone, Silent Circle and Wickr offer apps for encrypted texting. On Android, the TextSecure app encrypts texts in transit and when they are stored on your device.

  • Use the Off-the-Record Messaging protocol to encrypt your instant messaging conversations. You can still use your favorite instant-messaging service, such as Gchat or AIM, though you'll need to use a software client that supports the Off-the-Record protocol. On Macs, free software called Adium can enable OTR chats, and on Windows, you can use Pidgin. Once you've set up OTR and gone through a simple verification step, you can IM as you usually do. Both parties have to use OTR for the encryption to work.

*Use Gnu Privacy Guard to encrypt your email conversations. Like OTR, if you're using GPG you'll need the people you email with to use it as well in order to encrypt your conversations. I use free software called GPG Tools with Enigmail and Postbox. GPG Tools also works directly with Apple's built-in Mail program.

GPG has some shortcomings — it's difficult-to-impossible to use it with the mail program built into most smartphones, and you can't use it easily with webmail like Gmail. (Although there are some new web-based mail programs that use GPG called Mailvelope and StartMail that I haven't had a chance to try yet.)

The most difficult part of GPG is that, unlike the encrypted texting and instant messaging programs, you have to generate a secret key and keep it somewhere secure (usually on your computer or on a USB stick). This often means you can only send GPG mail when you have your key with you. Even so, it is incredibly satisfying once you send your first message and watch it transform into a block of numbers and letters when you click "encrypt."

Originally pubished by Common Dreams

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Posted 3 weeks 3 days ago

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

Posted 1 month 2 weeks ago
Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Posted 1 month 1 week ago

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Posted 1 week 2 days ago

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.