Saturday, June 1, 2013

TIRED OF THE GOVERNMENT


TIRED OF THE GOVERNMENT STICKING THEIR NOSES UP YOUR YOU KNOW WHAT??   TRY THESE IDEAS....

Passing this on, On the third posting below, it is a post that I sent out long ago that has tools for privacy, review it and implement those you like in addition to reacting towards this dilemma specified in the two previous emails below. This problem is only going to get worse!

C

Third email posting:

It never hurts to hide your conversations and browser actions from snoops, government and otherwise.  A security conscious IT friend sent me the below info. 

Since Skype sold out to Microsoft and government eavesdropping, we've been looking for a tool or tools to help us maintain our privacy. And perhaps this is the best set of tools I've seen so far. They're in an article by Sovereign Man and can be read by clicking 
HERE. The five tools are:
  1. Tor Browser - Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit.The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux.
  2. Duck Duck Go - If you want privacy, don’t search with Google. Google store all of your searches to customize ads for you, but even worse, they can hand over the whole list of searches to any government agency that are curious about what you’ve been looking at for the last couple years. A better alternative is Duck Duck Go, a completely anonymous search engine that does not store any information about you or your searches. The search results are essentially identical to Google’s, so there’s no loss of quality.
  3. HTTPS Everywhere - HTTPS Everywhere is a plug-in for Firefox and Google Chrome that tries to force a website to connect in secure mode, thus encrypting your traffic with the website you are visiting. This makes your browsing more secure because it prevents eavesdropping thieves or state-mafia from intercepting your unencrypted Internet traffic.
  4. Cryptocat - Cryptocat is an encrypted chat that beats Facebook and Skype when it comes to security and privacy. If you want to chat in private then this is one simple solution. It’s also open source, which means you can see the full code and be sure there are no government “backdoors” built in.
  5. Silent Circle - Silent Circle is a new player on the market, but it is founded by “old” players in the security and encryption industry. One of the founders, Phil Zimmerman, is also the creator of PGP, one of the most-used encryption platforms in the world. Silent Circle is the only service on this list that is not free. But having the gold standard of encryption may be worth it for you. It is for me.


The most promising tool listed is Silent Circle, a peer-based end-to-end encryption suite including Silent Phone, Silent Text, Silent Eyes, and Silent Mail (coming soon). Each of these tools includes a complete end-to-end peer-based encryption making penetration and eavesdropping impossible. Phil Zimmerman, the creator of Pretty Good Privacy (PGP) and ZPhone is part of the team of developers for this effort. Silent Circle is actually a suite of tools which include the following:

Silent Phone is your answer to Secure Mobile Video & Voice. It is an easy to download app that will provide you with HD quality calling over 3G, 4G and WiFi Networks that utilizes ZRTP encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.  Worldwide Secure Voice & Video Calling on Silent Phone allows you to make secure encrypted phone calls all over the world over any Network. Silent Phone connects directly into our custom-built Secure Network for amazing clarity and sound quality. Make Secure Encrypted Cell Phone Calls Over 3G, 4G and WiFi Networks. Silent Phone utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide for premium security.

Our new revolutionary technology allows you to send encrypted business documents (Word, Excel, Powerpoint, Pages, Keynote, PDF's, CAD drawings, etc.) any file, any movie, any picture – map locations, URL’s, calendar invites completely peer-to-peer encrypted and delete them with our “Burn Notice” feature. You have the ability to control your text communications securely with Silent Text. You decide how long your text can be seen with BURN NOTICE. Silent Text gives you the ability to transmit secure encrypted text messages between Silent Circle members, anywhere. The messages are encrypted on your device and the keys are negotiated for each conversation, and never leave your device. Each message is encrypted to a new key that is only used once and then destroyed, so if your device is examined, there are no keys to be had after the conversation is complete. Send your Mobile Device Map Location (Google, Apple Maps) encrypted and controlled.

Silent Eyes is your answer to secure video and voice communication on your desktop. It is an easy download desktop icon that will provide you with HD quality calling over WiFi Networks that utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP Protocol software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.

Silent Mail (coming soon)
Silent Mail is encrypted email with PGP Universal , the world’s most used encryption designed by two of Silent Circles founders Phil Zimmermann and Jon Callas. Silent Mail offers easy and automatic operation protecting sensitive email without changing or interfering with the users email environment.Silent Mail is a very easy, user-friendly encrypted email solution, providing secure, encrypted email without burdening users. Silent Mail integrates seamlessly with all existing email clients, enabling automatic encryption and decryption of sensitive communications without changing the users email interface. Silent Circle’s own Phil Zimmermann invented PGP encryption and our CTO Jon Callas invented the PGP Universal Server system-the world’s most used email encryption solution. Since Silent Mail utilizes a server-side key management system – we recommend this be utilized for day-to-day email communications for normal threat models. We want you to know what Silent Mail can and cannot do.

Silent Mail can help protect you against eavesdropping, government surveillance, unauthorized content analysis, identity theft and email forgery. Silent Mail utilizes cutting edge RSA and AES asymmetric and symmetric encryption algorithms to deliver total security inside the Silent Circle Network.


Why Do I Want Silent Circle?
Since Skype was purchased by Microsoft and is currently participating in full eavesdropping by the our government, this set of tools is incredibly promising. The big difference between Silent Circle and Skype, Google Chat, FaceTime, and all the other Instant Messaging (IM) clients is that they are FREE… for a price: the government records everything. Whereas Silent Circle has a modest cost of $20/mo and you keep your communications private.

Subscribe now and get 3 thirty-day passes by clicking HERE.

Last year, we experimented with securing our communications using a VPN out of Sweden, called VPNTunnel hosted by a company out of Sweden. You can use three of the most common ways to secure all your communications as it travels safely and encrypted outside the United States. Once your communication leaves the VPN tunnel, it's open to be viewed by anyone once again. However, the key here is that if you combine VPN Tunnel with TOR browser, keep your e-mail on JumpMail, and work to look at sites outside the US, you can dramatically increase your privacy and security. VPNTunnel supports the following three encryption methods:
  1. Point-to-Point Tunneling Protocol (PPTP), 3€ per month
  2. OpenVPN, 4€ per month
  3. Premium (includes both PPTP and OpenVPN), 6€ per month

Does a VPN secure all my internet communications including Skype?
Yes and no. If you imagine a VPN tunnel like an underwater tunnel between England and France, then while your data travels securely from your PC, it's completely hidden from eavesdropping (the tunnel under the English Channel). BUT, as soon as the data reaches "France" (in the example of our underwater tunnel), the data is now publicly visibly and traceable. That's why additional measures are needed such as Tor browser, Silent Circle, Crypto Chat, moving your e-mail to a multi-flag system (Jumpmail), erasing all cookies when you close your browser, etc. are also recommended to keep your information secure.



3 comments:

Anonymous said...

I would add "Whonix". All connections are sent through a "tor-ified" gateway. No security leaks. http://sourceforge.net/projects/whonix/

Fullsail said...

Also add smartmail.com they will have total privacy. They are looking for testers of their new beta system to be released soon. Please check out startpage.com
I have been using them for a long time and love it.

Anonymous said...

Also Ixquick and StartPage browsers.