[dba-Tech] protecting our privacy

Jim Lawrence accessd at shaw.ca
Thu Sep 5 19:55:02 CDT 2013


Hi Peter:

The truth is that there is no way protect against a concerted effort by the NSA to search your personal information.

I agree that it is a total betrayal of our system and the frontier of the internet, which gave everyone in the world, at least the perception of privacy, is gone. It is not just the NSA but the hundreds of other governments and companies who now know restrictions have been removed and will now feel no obligation to protect or guard anyone's privacy. If there was a community understanding of limits and rights and freedoms, they have been removed. As individuals, it is up you to protect or at least obscure your personal data as much as possible so that the harvesting will be difficult and expensive.

Tor is a good start but the owner is now up on charges, I understand. BitMessage (https://bitmessage.org/wiki/Main_Page) client and a new BitMessage gateway (https://bitmessage.ch)as addons to your other email clients might be worth investigating. Good encryption, is always recommended especially if you are using the internet to transport people's personal information. 

Of course an individual's or company's best defenses is to use OSS software as most major proprietary software companies have been forced to participate in this backdoor scheme.          

Jim

----- Original Message -----
From: "Peter Brawley" <peter.brawley at earthlink.net>
To: "Discussion of Hardware and Software issues" <dba-tech at databaseadvisors.com>
Sent: Thursday, September 5, 2013 3:44:56 PM
Subject: [dba-Tech] protecting our privacy

US and UK spy agencies defeat privacy and security on the internet
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

"...the National Security Agency and its UK counterpart GCHQ have 
broadly compromised the guarantees that internet companies have given 
consumers to reassure them that their communications, online banking and 
medical records would be indecipherable to criminals or governments.

Those methods include covert measures to ensure NSA control over setting 
of international encryption standards, the use of supercomputers to 
break encryption with "brute force", and – the most closely guarded 
secret of all – collaboration with technology companies and internet 
service providers themselves.

Through these covert partnerships, the agencies have inserted secret 
vulnerabilities – known as backdoors or trapdoors – into commercial 
encryption software."

Sigint – how the NSA collaborates with technology companies
http://www.theguardian.com/world/interactive/2013/sep/05/sigint-nsa-collaborates-technology-companies

The US government has betrayed the internet. We need to take it back
http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying
1) Hide in the network eg with Tor, 2) Encrypt communication with TLS or 
IPsec, 3) isolate sensitive documents with sneakernet, 4) for encryption 
use ony open source software,

PB


_______________________________________________
dba-Tech mailing list
dba-Tech at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/dba-tech
Website: http://www.databaseadvisors.com



More information about the dba-Tech mailing list