The NSA runs a massive, full-time hacking operation targeting foreign systems. More than in local machines, the five eye spooks have their eyes in internet routers and switches that form the basic infrastructure of the net. A fascist internet in the making.
Our best defense is to make surveillance of us as expensive as possible.
- (Concealed) Interests
- Safer browsing
- Private conversations
- Social media
- Ditching online presence
Whatever service or tool you choose, Terms and Conditions May Apply.
(Concealed) Interests[linkview show_cat_name=”0″ cat_name=”Masters of the Internet”]
Money is a symbol of energy, and the erection of the mass surveillance grid is not for the purpose of security or preventing “terrorism”.
It is clear that browsing has the most low cost attack vectors for data theft by hackers, tracking by corporations and governmental spying. Safer browsing is a good investment all around.
Does whatever it is that you wish to send require communication in real time, or is it okay if it is received later? How will the receivers of your message know it is really you that sent it? And how can we make it as hard as possible for spying corporations and governments to read it? More on that in private conversations.
Facebook can be useful for organising campaigns because it is free, allows for high levels of engagement, and people are used to it. BUT, it is involved in supporting the surveillance state, your campaign may be suspended at any time, your data is no longer your data (it is owned by facebook) and you are supporting a centralised networking system. Alternatives are crabgrass (riseup[dot]net runs on it), diaspora, friendica, foxglove, jappix, movin, lorea, etc. More on social media.
(Self)doxing and ditching online presence(s)
You can use the same (or similar) spies online techniques to see yourself through the eyes of the adversaries that might d0x you. That information can then be used to protect yourself from your adversaries as best as you can. And when setting up other, anonymous or pseudonymous identities, these resources can be used for test-driven-development of the identity.
IP addresses can be personally identifiable. While unfortunately, government organizations around the world have a variety of backdoors into a variety of operating systems, bridges, routers and firmwares, one can still attempt to be (more) anonymous through a variety of methods. GNU free software alternatives to Windows or Mac OS appear to be more secure than their counterparts, since their code is transparent, and almost always individually reviewed (which is no guarantee that possibly existing backdoors will actually be found, but at least we *can*).
We can stay connected in a local net (and increasingly, as local nets evolve and meet, also further away), depending as little as possible on commercially and governmentally run infrastructures. We can build our own community owned, individually controlled, communication infrastructure.
Darknets deliberately hide from the prying eyes of clearnet search engines. They cloak themselves in obscurity with specialized software that attempts to guarantee encryption and anonymity between users, as well as protocols or domains that average netizens will never stumble across. For more on those subjects see the shaping of autonomous infrastructures.