Thursday, June 13, 2013

7 Powerful Ways to Maintain Your Privacy and Integrity Online

Eliot Estep
Activist Post

The recent NSA leaks from whistleblower Ed Snowden have publicly confirmed that digital privacy does not exist. The federal government and intelligence agencies have direct server access to the world’s most popular sites and services including Facebook, Google, Microsoft, Apple, and more. This means that all of your data when using these services including Skype, YouTube, etc has been compromised and can be used against you whenever strategically necessary.

Always remember, you are being recorded and monitored regardless of whether you have done anything wrong or not. This includes your emails, Internet activity, searches, banking activity, passwords, etc. Basically everything to build a complete profile about who you are, how you think, how you live, etc. This is very powerful data gathering and the goal of the intelligence agencies is nothing less than Total Information Awareness to be used to control and manage populations.

For these reasons, I have compiled some helpful tips to help you maintain your privacy and integrity when using the Internet. These are by no means comprehensive, but they can be quite useful and give you some semblance of peace when browsing.



1. Use StartPage.com for all your searches. Known as “the world’s most private search engine”, StartPage will allow you to search anonymously and securely through Google. It is probably the only search engine that does not collect or share any personal information about you. You can even access pages through a proxy quickly and easily. StartPage functionality can be easily added to your browser for all searches made through the address bar. If you value your privacy, this is really a no-brainer.

If you use Google, Bing, Yahoo, etc. then everything you search is logged to your IP address and is used to build a comprehensive profile about all your online activity. This means that the government literally has the ability to know everything you’ve been interested in, how you type (thus, how you think), and much more. Protect your searches!

2. Consider using an Anonymizer such as Tor to protect your identity. Tor prevents anyone from learning your location, browsing habits, and is an extremely effective tool against network surveillance and traffic analysis. Tor is essentially a network of virtual tunnels run by volunteers that allows your real IP address to remain hidden and undetectable when browsing the Internet. It is used by whistleblowers, hackers, and all those who value anonymity. You can also use it to access sites that your ISP has blocked or banned. Keep in mind, if you use Tor to access personally-identifying sites like Facebook then you pretty much lose your ability to remain anonymous. Learn more about this powerful software and please use it responsibly! To get started quickly, please download the Tor Browser Bundle. Using this software wisely and effectively will likely require changing your browsing habits, so be aware of this.

3. Consider using a private and secure social network like Pidder. This is a private social network that uses encrypted communication and offers the ability to remain anonymous. If you are truly looking for ways to stay in touch with close ones in a uncompromised manner, this could be the site for you. While it will not have the userbase of Facebook, this is still an excellent alternative for secure social networking.

4. Use a firewall and a secure wireless connection. Protecting your inbound and outbound network traffic is essential. There are many free software options available for this. I cannot guarantee the integrity of these programs, but I personally recommend Little Snitch for Mac users. It appears that Outpost may be a good alternative for Windows. The key is to be able to see what services/sites are trying to send/receive data over your connection. The more stringent your firewall rules are, the better. Keep your computer clean by using some kind of anti-spam/spyware software and minimize your use of highly sketchy sites.

5. Delete your cookies regularly and log out of Facebook when you are not actively using it. Almost every time you visit a site, you download a cookie from that site, which is often used to track and collect data about you, the sites you visit, etc. Therefore, deleting cookies and temporary Internet files from your browser frequently is necessary. I recommend CCleaner as an effective way to do this. Most people leave a Facebook tab open and continue browsing, not realizing that every page that has a “Like” button actively logs and tracks their online activity. Facebook collects all your browsing data and then sells it to third parties, including passing it onto intelligence agencies. Therefore, when you are not actively using Facebook, be sure to log out! Why should they know everything you’re up to online?

6. Cover up or disconnect your webcam when you are not using it. Did you know that your webcam can be secretly activated without you being aware of it? Hackers and intelligence agencies have the ability to do this, so effective countermeasures must be taken here. This can be done WITHOUT the indicator light coming on, so you won’t even know that you are being watched or recorded. This is why I recommend taping over or covering up your webcam when you’re not using it. Why take the risk? Do you really want the government to have the ability to spy on you while you are in your bedroom? The same thing can be done on cellphone cameras/microphones, so be aware of that too. The only way your phone cannot be used to track/record you is if the battery is taken out, which is another reason why many new smartphones come with non-removable batteries these days.

7. Learn to use secure email services like HushMail or encrypted email. Communicating using email is vital and part of our everyday lives. If we use services like Gmail, Hotmail, or Yahoo, those services are not secure and are compromised. Therefore, switching over to a secure service such as Hushmail can be valuable. Or learn how to use Pretty Good Privacy (PGP), which is a way to send encrypted email and files that only a trusted third party can open and view. Essentially, PGP uses public-private key cryptography, where you will give out your public key to trusted recipients. Messages can only be decrypted by using your special private key file (that you keep safe) and the sender’s public key. You can even encrypt files so that only a specific person can open them. Learning to use PGP requires some technical knowledge but can be very useful for those who want to communicate securely and is well worth learning, in my opinion. Please see this tutorial or this video to get started. There are some excellent YouTube videos that can really help out with this.

***************************

Be smart about how you communicate online. If you take no precautionary measures, then you should assume that your communications are being recorded and monitored at all times. Do not discuss illegal or secret activities on Facebook or through Skype or Gmail. Ultimately, we should be greatly decreasing our use of these compromised services altogether! Be aware of what you type and consider their ramifications if ever made public. We must exercise great discretion and discernment when it comes to our online activities now. The methods listed above are by no means comprehensive and are just a small way to boost your privacy. If you have other privacy tips, please mention them here in the comments for all to see and benefit from. In the end, it is all up to the user to do their part in maintaining their online integrity. Safe browsing my friends!

Eliot Estep: We are all divine beings of love at our core! I AM a genuine truth-seeker dedicated to living a life of joy, peace, and abundance. I value integrity, freedom, and creative self-expression above all. It is a privilege to be here during this time of great change. Let us prepare. Main areas of research: conspiracies, global affairs, extraterrestrials, spiritual advancement + Sun: ♏ + Moon: ♎ + Ascendant: ♋ + This article first appeared at Collective Evolution.



BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW


BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW


If you enjoy our work, please donate to keep our website going.

31 comments:

Anonymous said...

Spot on! The implications with the companies identified, and the data centers going up all over are gargantuan (not just huge).

Anonymous said...

Good stuff, but never forget that the operating system most people are using is already compromised.

Switching to an open source operating system, while not perfect, is a step in the right direction.

Anonymous said...

Be advised that PGP was bought out by Symantec who is known for installing Root Kits on your computer when you install their antivirus. Also beware that Symantec and Norton are the same company.

Anonymous said...

"...you are being recorded and monitored regardless of whether you have done anything wrong."

Tragically, and be very aware, that in this growing Alinsky-Obama socialist tyranny, the old definition of "wrong" has now been greatly expanded to include actions by those expressing support of free speech, personal liberty, privacy, the protections of the 10 amendments, and opposition to the elected incumbents.

Anonymous said...

Anti-racists say there is a RACE problem that can only be solved when the third world pours into EVERY White country and "assimilates."

What if I said there was a RACE problem that could only be solved if hundreds of millions of non-Blacks were brought into EVERY Black country? How long before people realize I'm not talking about a RACE problem, but the conclusion to the BLACK problem?

They say they are anti-racist. What they are is anti-White.

Anti-racist is a codeword for anti-White.

Tom Burnett said...

None of that will work. I'll be happy to tell anyone why.

Anonymous said...

Put your cell phone in the microwave when not in use.

Anonymous said...

So why don't you please tell us why none of that will work, Mr. Burnett?

Anonymous said...

i'm listening, Tom...?

Anonymous said...

Me too! I want to hear from Tom why "none of that will work". Well, Tom?

Anonymous said...

"it won't work" sayz the Google+

Anonymous said...

Putting your cellphone in a anti-static metallized bag (like used for motherboards and video cards) will stop all I/O.

Be aware tho that today's smart phone is a full blown microcomputer and can still run code (take pictures and record sound to on-board memory) even if external I/O is cut off. The bad guys will simply retrieve the pics/recordings later......

Anonymous said...

Just an FYI about Hushmail. It may be encrypted, however, they seem to work with gov. to give their users up when needed.
http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/

Anonymous said...

AirVPN and Autistici.org are both run by activists who have promised not to cooperate with authorities.

Anonymous said...

But yet this very site is tracking our online activity

Google Adsense
ShareThis
MediaMath
AdNexus
Doubleclick
Media Innovation Group
Tynt Tracer
Google +1
Facebook Connect

Kind of the pot calling the kettle black. You really want to impress us with your journalism?

Quit tracking us! Until then, your site is just like everyone else. Tracking for cash - despicable.

Scott Zehrung said...

Fellow Citizen,

I am father, patriot, a small business owner, veteran and a very concerned citizen and you now are a "Nucleator" (Explanation follows;)

I was in the USAF during the 80's serving in the 83TCF in the capacity of Forward Air Control. I was de-tached and sent to Honduras as a "Westinghouse" employee and helped install/ operate the "Carrot Top and "Senior Knight" Facilities "NSA". (Thanks to Mother Jones News and Ted Koppel searchable on Google).

In " fighting" the Soviets during their expansion in Central America during the 80's, a primary thing we looked for were the "instigators" the idea guys in media and academia or business that had to be made quiet or invalidated.

While explaining the current NSA situation to my 15 year old son and 11 year old daughter what I believe is a good analogy was developed;

Nucleation sites for a carbonated beverage are areas that facilitate the gases joining together to form bubbles that are then able to develop and gather more gases to form a bubble capable of breaking the surface tension of the liquid. Some beer mugs / champagne glasses have laser etched sites in the bottom of the glass to provide for this action.

Internet web sites / blogs/ Twitter and Facebook and the people utilizing them are in that sense "nucleation sites" in that, people develop ideas that are presented more ideas are then added / evaluated until the "concept" bubble is large enough to begin moving up through the medium.

The disclosure that the NSA "can see ideas form" should give every citizen a pause. What this action on their part allows is the tracking back of ideas and concepts to the nucleation site. The most powerful intelligence tool, ever. Think about this for a minute...if you link to an article or "like it" give it a "thumbs up" what just occurred? The ability for the Government "NSA" to not only identify like minded people but to see all the way back to the point where idea developed and from whom .

After sending this, am I now a nucleation site against the NSA, someone this Government should deem a risk? By receiving the email are you? Someone who posits a concept that was allowed to have other ideas and concepts added that then facilitated numbers of fellow citizens agreeing to form a consensus? How many of you have made comments that were forwarded on to others? How many twitter followers do you have...Retweets? How many Facebook "likes" for "subversive" anti-progressive comments? Depending upon your activity level I believe you may be one of the individuals at the "root" of the NSA file tree. Nervous? Should be, if what the IRS has done is any indication just imagine what a covert agency is capable of doing.

I believe it is time to begin marching to D.C. before it's too late. Who will help get permits? Any other "Nucleators" have the guts? How much time do you think we have to evaluate these "scandals". Their strategy is clear but , it is the tactics that achieve the goals. The "enemies" have been identified and they are "US".

With sincere regards,


Scott A. Zehrung

Anonymous said...

American pussies, choke on your insouciance.

Fungus Exterminator said...

It is now Father's Day. He risked his life as a Merchant Marine during WWII sailing the North Sea with American ships being blown up all around him. I am so glad the Lord took him home before he could see what this once great nation has finally become today. May God have mercy on us all. We don't deserve His mercy. I don't mean to offend anyone with my Christian bent. No offense meant, but I am what I am, thanks to my late, God fearing and God loving Father (and Mother). "I am crucified with Christ: nevertheless I live; yet not I, but Christ liveth in me: and the life which I now live in the flesh I live by the faith of the Son of God, who loved me, and gave himself for me." (Galatians 2:20

Anonymous said...

Activist Post is Tracking YOU....
Pick up Ghostery and Collusion addons to see with your own eyes, who's watching you or selling you out. Like Activist Post is doing...as you read this.
Love the site but, step your game up.

Anonymous said...

The ruling elite and their rulers who control the world think they have won, and they appear to have won on the physical level but it's all an illusion. Ultimately the rulers and the ruling elite have lost on the spiritual level and and nothing will change that.

BPC said...

well, if we hv nothing to hide, why we should be afraid Don't be such a paranoid . No worries , be happy

Anonymous said...

Don't use HushMail, they have been known to compromise their own security on (US) police request.

Anonymous said...

I cannot agree more with you Anonymous!

Anonymous said...

what do you recommend Anonymous? for email that is...

Anonymous said...

If you own a laptop with an integrated microphone, consider removing the microphone module physically. Simply pry open the cover and cut the wires attached to the module. It took me 5min to do it.

JdL said...

Messages can only be decrypted by using your special private key file (that you keep safe) and the sender’s public key. You can even encrypt files so that only a specific person can open them.

There are a couple of errors here.

. The sender's public key has nothing to do with how messages are encrypted; only the receiver's public key is involved.

. It is ALWAYS the case that "only a specific person can open" what is encrypted: the person with the private key that corresponds to the public key used for encryption. It is possible with PGP to designate multiple recipients, but ONLY those you designate can decrypt what you have encrypted.

Anonymous said...

Hushmail is not a safe service they have said so themselves, they are like Yahoo, gmail etc

Anonymous said...

The NSA assholes who (allegedly) track us are paranoid individuals who project their paranoia outward into the world. Simply attempting to outsmart them just makes you paranoid as well and gives their dysfunctional mentality substance and meaning. Watch what you say quickly morphs into watch what you think, and then what really is the point of using the Internet at all? That's exactly what they want us to do, be afraid to speak, form groups, or communicate. Don't buy into it, the whole thing is a big psy-op to keep you off balance and subservient to their psychosis.

Anonymous said...

Hushmail is NOT safe. See here:

http://www.wired.com/threatlevel/2007/11/encrypted-e-mai

Delete Your Personal Information on the Internet said...

Another good thing to do is to remove your personal profiles from data aggregators and personal information builders. Companies like Axciom, Intelius, Data Logix and others have massive profiles on people. www.PrivacyBolt.com offers a free service that can help you remove some of these profiles and help you protect your online privacy. Its a very dirty industry and protecting your online privacy and personal data needs to be taken seriously.

Anonymous said...

Here's a good list of tools for online privacy
Web Privacy Tools

Post a Comment