|
November 22, 2019, 10:51:24 PM |
|
quick tips to ensure your own security on the Internet: 1) Hide in the net. Use the hidden services. Use tor for anonymity. Yes, Thor users are targeted by the NSA, but it works for them. The less visible you are, the safer you are. 2) Encrypt your communications. Use TLS. Use IPsec. Once again, even though the NSA keeps an eye on encrypted connections, and it has exploits against those protocols, you're protected more than without encryption. 3) Suppose your computer can be hacked, then it will require the NSA to work and risk-they may not want to do it. If you have something really important, use the "air barrier". When you are at risk, it is advisable to buy a new computer that has never connected to the Internet. Thus, you will not initially give the opportunity to link your secret data with your network history, which will complicate the task of investigation. Next, if you need to transfer a file, it is advisable to encrypt it on this protected computer, and then transfer it to your network computer using a USB flash drive. To decipher something-it is necessary to do everything in the opposite order. 4) Be suspicious of commercial encryption products, especially from large manufacturers. Most crypto products from major us vendors have backdoors for the NSA, and many foreign ones probably do too. It is reasonable to assume that foreign crypto programs also have backdoors for foreign intelligence agencies. Systems running with the original keys are vulnerable to the NSA. 5) Try to use widespread cryptography that is compatible with other implementations. For example, it is more difficult for the NSA to install a backdoor in TLS than in BitLocker, because a TLS implementation from any vendor must be compatible with other TLS implementations from other vendors, while BitLocker must be compatible only with itself, giving the NSA more scope for change. And, since Bitlocker is proprietary, there is much less chance that anyone will become aware of these changes. Use symmetric algorithms on top of public key algorithms. It is advisable to know and use gpg, Silent Circle, Tails, OTR, TrueCrypt, BleachBit technologies. Yes, most of these things are complicated for the typical Internet user. The NSA has turned the Internet into a huge controlled platform, but they're not magicians. They are constrained by the same economic realities as we are, and our best defense is to make their control as expensive as possible. Believe in math and network encryption algorithms. Encryption is your friend. Use it, do everything to make sure nothing is compromised.
|