CureZone   Log On   Join
quotidian activities/ Online privacy
 

Free Clark DVD!
Bestselling author Dr. Hulda Clark claims to have cured cancer



Makeing High PPM Silver
Making Hundreds of Bottles of Lower PPM in a few hours of Coll...



Dr. Clark Shop
Hulda Clark Cleanses



Beautiful Skin From Powerful Oils and Roses
Remove signs of aging by renewing skin cel...


More
More
BioDude Views: 325
Published: 7 years ago
 

quotidian activities/ Online privacy


How to disappear, It’s hard, and getting harder

http://www.economist.com/news/briefing/21579474-its-hard-and-getting-harder-h...



AS DETAILS of American snooping spread, sales of “1984”, George Orwell’s fable of an ever-watching state, rocketed. So did traffic to websites run by Tactical Technology Collective, a charity that teaches journalists and activists how to evade online spies. “It can be hard to persuade people surveillance matters to them,” admits Stephanie Hankey, a co- founder. Apparently not any more.

Dissenters have always taken laborious measures to cloak compromising communications. But computers now flag suspicious patterns in quotidian activities too. That requires greater vigilance from the most committed clandestines, who face three challenges.

The first is stopping the nosy sniffing communications in transit. Unencrypted e-mails are as open as postcards, warns Ben Wagner, an internet specialist at the European University Institute. Pretty Good Privacy (PGP), scrambling software that works with several web clients, can prevent such snooping.

Another task is to stop spooks sucking data from wherever it is stored. That means withdrawing from services, such as social networks and search engines, that must pass data to governments—or seeking out alternatives in untouchable territories. A battered desktop with free software makes a secure e-mail server. True coverts strip proprietary operating systems from their devices (a compromised one can access all your files).

It is trickier to elude systems that record whether communications have taken place. “Using a mobile is the worst thing you can do,” says Marek Tuszynski at Tactical Technology. The call logs kept by telecoms firms are difficult to dodge. Internet users have more security. Free software such as Tor can hide their identity by cleverly routing their requests.

But staying under the radar is tedious and hard to keep up. Clueless contacts can blow your cover. Even technophiles may compromise themselves by simpler means. Google’s Chrome browser, which offers a very basic private mode, wryly warns its users to beware of “people standing behind you”.



So the skynet can also give a red flag to you also if your patterns seem unusual....skynet is watching us , if you were thinking to drink your morning coffee as you allways do, but then decide to not
drink it.....well then your behaviour look suspicious.....welcome to the paranoid computer age! You are then a "possible threat" to them....But skynet did not fall down from the sky, some people made it, so that means the people who made it are totally paranoid,schizophrenic wacko`s, full of fear....


 

 
Printer-friendly version of this page Email this message to a friend
Alert Moderators
Report Spam or bad message  Alert Moderators on This GOOD Message

This Forum message belongs to a larger discussion thread. See the complete thread below. You can reply to this message!


 

Donate to CureZone


CureZone Newsletter is distributed in partnership with https://www.netatlantic.com


Contact Us - Advertise - Stats

Copyright 1999 - 2020  www.curezone.org

0.203 sec, (2)