Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to keep things private

Slate/ AFR | June 14, 2013
Even when faced with the most ubiquitous of modern surveillance, there are ways to keep your communications away from prying eyes.

How to keep things private
Security officer inside a data centre servicing internet users. Photo: The New York Times

If you have followed the startling ­revelations about the scope of the US government's surveillance efforts, you may have thought you were reading about the end of privacy. But even when faced with the most ubiquitous of modern surveillance, there are ways to keep your communications away from prying eyes.

First, instead of browsing the internet in a way that reveals your IP address, you can mask your identity by using an anonymising tool like Tor or by connecting to the web using a Virtual Private Network. Additionally, you can avoid Google search by using an alternative like Ixquick, which has solid ­privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

When it comes to sending emails, if you use a commercial provider that has been linked to the PRISM surveillance ­initiative, you can throw a spanner in the US National Security Agency's works by learning how to send and receive encrypted emails. Pretty Good Privacy (PGP) or its free cousin GNU Privacy Guard (GPG) are considered the standard for email security, and these can be used to both encrypt and decrypt messages - meaning you can thwart surveillance unless you are unlucky enough to have Trojan spyware installed on your computer.

Novice computer users learning how to use PGP or GPG may find it daunting at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process.

A NEW FRONTIER
For journalists working with confidential sources, attorneys seeking to ensure attorney-client privilege or others whose work requires secure communications, learning how to use PGP or GPG is an absolute necessity. Organisations seeking to protect themselves from email grabs could go one step further: They could take more control of their messages by setting up their own email server instead of relying on a third-party service, helping ensure no secret court orders can be filed to gain covert access to confidential files. And if you need to store private documents online, you can use Cloudfogger in conjunction with Dropbox.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives.

Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac. Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain.

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.