Today three major news agencies, the New York Times, the Guardian, and ProPublic released details of the most intrusive NSA activity to-date. The NSA and the GCHQ, the British version of the NSA, have “been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Hotmail.” Microsoft apparently handed over pre-encryption access to Outlook e-mail, Skype and SkyDrive. Companies have also put back doors into hardware and software products at the request of the NSA.
The NSA and the companies who allowed the back doors have broken the public’s trust. It’s time we take back the Internet. As usual, the Electronic Frontier Foundation has an excellent summary on this issue and a list of actions you can take. This is a two-pronged attack. First, we should petition our elected officials, which is very easy to do from the EFF’s take action site. Second, if the companies don’t stand up for their users, you can vote with your feet and leave their feudal system. I don’t use Microsoft, Yahoo, or Facebook, but I do use Google and Apple. While Google has claimed there are no back doors, Google is also asking permission from the Government to tell the public about what it does provide. That sounds like a Kafka novel to me and I think I’m going looking for a new email provider. Apple lost me when I had to ask permission to install applications. In the writing of this post, I discovered something new about myself; I don’t like asking permission for things 🙂 .
But also we should step-up your defense. Bruce Schneier published a list of recommendations to maintain (some) control over privacy and security online. Read the article for the details, but the short list is:
- Hide in the network. (i.e. use Tor)
- Encrypt your communications. (use HTTPS Everywhere)
- Assume that while your computer can be compromised, it would take work and risk on the part of the NSA so it probably isn’t.
- Be suspicious of commercial encryption software, especially from large vendors.
- Try to use public-domain encryption that has to be compatible with other implementations.
For those looking for a more complete software list, check out PRISM Break.
Lastly, Bruce Schneier closed with this call-to-arms:
To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it.
A simple and inexpensive way to do accomplish this is to go buy a $45 Beaglebone Black and set it up as a Tor relay and help grow the Tor network. You can follow my instructions to set this up and have a low-power, freedom protecting, Tor relay.