User Tools

Site Tools


Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
mission:log:2014:02:03:post-snowden-age [2014/02/03 20:43] chronomission:log:2014:02:03:post-snowden-age [2014/02/04 10:26] – [What can I do?] chrono
Line 36: Line 36:
 Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/healthcare system) so they hopefully wake-up one day and start to clean out their own mess at home. Participate or organize a [[http://www.cryptoparty.in/|Cryptoparty]]. Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/healthcare system) so they hopefully wake-up one day and start to clean out their own mess at home. Participate or organize a [[http://www.cryptoparty.in/|Cryptoparty]].
  
-Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/Juniper routers are also compromised. Basically, the NSA can force any US company to "help out" with tailored access and then force the company to never to reveal that fact. Since the company has an "instinct" to survive, its managers will have to lie to the public, if they want to or not, in order to protect the company.+Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/Juniper routers/firewalls (PIX/ASA) are also compromised. Basically, the NSA can force any US company to "help out" with tailored access and then force the company to never to reveal that fact. Since the company has an "instinct" to survive, its managers will have to lie to the public, if they want to or not, in order to protect the company.
  
 Join a [[http://hackerspaces.org|hackerspace]] in your area, inform yourself, educate yourself.  Join a [[http://hackerspaces.org|hackerspace]] in your area, inform yourself, educate yourself.