User Tools

Site Tools


Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
mission:log:2014:02:03:post-snowden-age [2014/02/03 20:43] chronomission:log:2014:02:03:post-snowden-age [2014/02/04 10:36] (current) – [What can I do?] chrono
Line 30: Line 30:
 Well, a lot actually. Consume less, don't buy shit you don't need. Try to avoid products produced/designed in countries like the UK/USA, at least those which are [[http://www.spiegel.de/netzwelt/netzpolitik/interaktive-grafik-hier-sitzen-die-spaeh-werkzeuge-der-nsa-a-941030.html|known to be compromsied]]. Of course there are more players, it would be naive to assume that for example Russia or China will not also run similar programs and will not also force producers like Huawei to put backdoors into their routing/firewall/gsm appliances. But they at least have a little decency left and don't put it into our face like: //"Yeah, we're watching everything you do because we can and we don't care if you don't like it because we need to protect our nations security."// Well, a lot actually. Consume less, don't buy shit you don't need. Try to avoid products produced/designed in countries like the UK/USA, at least those which are [[http://www.spiegel.de/netzwelt/netzpolitik/interaktive-grafik-hier-sitzen-die-spaeh-werkzeuge-der-nsa-a-941030.html|known to be compromsied]]. Of course there are more players, it would be naive to assume that for example Russia or China will not also run similar programs and will not also force producers like Huawei to put backdoors into their routing/firewall/gsm appliances. But they at least have a little decency left and don't put it into our face like: //"Yeah, we're watching everything you do because we can and we don't care if you don't like it because we need to protect our nations security."//
  
-<blockquote>"A matter of internal security" – the age-old cry of the oppressor.<cite>Jean-Luc Picard</cite></blockquote>+<blockquote>"A matter of internal security" – the age-old cry of the oppressor.<cite>Jean-Luc Picard (TNG|S3|E11|The Hunted)</cite></blockquote>
  
 Just 70 years ago the same shit was going on in Germany, so we still kinda know how Nazis behave and how they like to operate. But the USA learned their lesson well: Industrialized mass killing in concentration camps is a logistics hassle, still very inefficient and a PR nightmare, but hey, now they just get a couple of thousand drones to do the job on a global scale, that will be much more fun and you can do that remotely. Just 70 years ago the same shit was going on in Germany, so we still kinda know how Nazis behave and how they like to operate. But the USA learned their lesson well: Industrialized mass killing in concentration camps is a logistics hassle, still very inefficient and a PR nightmare, but hey, now they just get a couple of thousand drones to do the job on a global scale, that will be much more fun and you can do that remotely.
Line 36: Line 36:
 Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/healthcare system) so they hopefully wake-up one day and start to clean out their own mess at home. Participate or organize a [[http://www.cryptoparty.in/|Cryptoparty]]. Don't buy products or use services from companies which are known to supply data to the NSA/GCHQ. The agencies will never stop out of their own accord. Why should they? Only if the money supply chain is dried up from above there might be a change. Encrypt everything. Even if it's just your shopping list. The more encrypted data the agencies have to process, the more expensive their operation will become which will drain their national budgets even more, making the people of these countries suffer more (because of a starved social/healthcare system) so they hopefully wake-up one day and start to clean out their own mess at home. Participate or organize a [[http://www.cryptoparty.in/|Cryptoparty]].
  
-Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/Juniper routers are also compromised. Basically, the NSA can force any US company to "help out" with tailored access and then force the company to never to reveal that fact. Since the company has an "instinct" to survive, its managers will have to lie to the public, if they want to or not, in order to protect the company.+Try to use open-source operating systems and software, of course there is a chance that there might be something slipped into the code but it is a fact that the NSA can simply attack and take over any Microsoft based operating system. Cisco/Juniper routers/firewalls (PIX/ASA) are also compromised. Basically, the NSA can force any US company to "help out" with tailored access and then force the company to never to reveal that fact. Since the company has an "instinct" to survive, its managers will have to lie to the public, if they want to or not, in order to protect the company.
  
 Join a [[http://hackerspaces.org|hackerspace]] in your area, inform yourself, educate yourself.  Join a [[http://hackerspaces.org|hackerspace]] in your area, inform yourself, educate yourself. 
Line 42: Line 42:
 Try to support the development of open-source, decentralized, communication and collaboration services and infrastructures so that we don't even need to bother thinking about security, since our systems already provide ample security/anonymity to begin with. Try to support the development of open-source, decentralized, communication and collaboration services and infrastructures so that we don't even need to bother thinking about security, since our systems already provide ample security/anonymity to begin with.
  
-Use VPN services like [[https://airvpn.org/|AirVPN]], it won't help you against NSA/GCHQ collection/analysis, since they still will be able to identify you based on your online profile, which services you often use etc. But at least you can protect the contents of your communication. It will also protect you against the other evil that has increased over the last couple of years: Greedy bastard lawyers who try to conspire to defraud people they accuse of copyright infringements. The last incarnation was priceless: Over 10.000 people in Germany were alleged to have streamed some internet porn (two videos on redtube in particular) and were supposed to pay a fine for the infringement. Although on the surface sex is supposed to be a bit less of a taboo these days, it seems to me that we still have a lot of ground to cover to be able to be really free in that regard. So it comes to no surprise that these lawyers deliberately chose the time shortly before Christmas to send these letters with the hope that many people just pay quickly and silently in order to avoid lengthy discussions with their partners at home as to why they were looking at internet porn. In the end evidence was overwhelming, that traffic was actually bought and redirected to redtube.net which in turn forwarded the unaware visitors to one of the videos. This would also explain how they got the IP addresses in the first place.+Use VPN services like [[https://airvpn.org/|AirVPN]], it won't help you against NSA/GCHQ collection/analysis, since they still will be able to identify you based on your online profile, which services you often use etc. But at least you can protect the contents of your communication. It will also protect you against the other evil that has increased over the last couple of years: Greedy bastard lawyers who try to conspire to defraud people they accuse of copyright infringements. The last incarnation was priceless: Over 10.000 people in Germany were alleged to have streamed some internet porn (two videos on redtube in particular) and were supposed to pay a fine for the "infringement". From current legal perspective, the reception of a video stream is actually not considered to be illegal. Although on the surface sex is supposed to be a bit less of a taboo these days, it seems to me that we still have a lot of ground to cover to be able to be really free in that regard. So it comes to no surprise that these lawyers deliberately chose the time shortly before Christmas to send these letters with the hope that many people just pay quickly and silently in order to avoid lengthy discussions with their partners at home as to why they were looking at internet porn. In the end evidence was overwhelming, that traffic was actually bought and redirected to redtube.net which in turn forwarded the unaware visitors to one of the videos. This would also explain how they got the IP addresses in the first place.