This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
mission:log:2014:02:03:post-snowden-age [2014/02/03 20:43] – chrono | mission:log:2014:02:03:post-snowden-age [2014/02/04 10:26] – [What can I do?] chrono | ||
---|---|---|---|
Line 36: | Line 36: | ||
Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/ | Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/ | ||
- | Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/ | + | Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/ |
Join a [[http:// | Join a [[http:// |