Skip to content Skip to navigation

Edward Snowden’s Three Simple Tips for Digital Privacy

April 18, 2014
Edward Snowden’s Three Simple Tips for Digital Privacy

Edward Snowden said he has been able to outfox U.S. officals using encryption. During a webcast on NSA leaks and data security in Austin, Texas, Snowden shared some privacy tips.

These tips range from simple to complicated depending on your computer savvy, so we’ve collected some basic info and guides to help you get started:

  1. Encrypt your hard drive

    Encryption is the “Defense Against the Dark Arts” for the digital world, said Snowden. Adding password protection to files on your computer is just the first step to personal file security. Encrypting the entire hard disk on your computer ensures personal information is secure, even if your device is stolen or seized.

    Latest versions of Windows and Mac operating systems come with built-in disk encryption tools. BitLocker, which encrypts your entire hard drive, comes as part of Windows 7 Ultimate and Enterprise versions, and Windows 8.1 Pro and Enterprise editions. Apple offer detailed tutorials online on how disk encryption services can be turned on. For those with older operating systems, TrueCrypt, there’s a free program for encrypting your drive. Here’s a guide on how to download and install it.

  2. Use browser plug-ins to avoid being tracked online

    A lot of companies are using digital tracking for online activities such as shopping, varying prices based on shopping patterns and location information. While that may seem harmless, it’s important to know that if retailers can see you, it’s likely that others can as well.

    Slowly, companies such as Google have agreed to support a do-not-track button to be embedded in most Web browsers. Google’s Chrome browser has a setting that most users can turn on to send a do-not-track request, and so does Microsoft’s Internet Explorer 10. They won’t work with all websites, but it’s a good place to begin.

    Plug-ins or small software extensions available for browsers are another way to go about it. Ghostery, a plug-in available for most popular browsers, when installed will show the number of trackers detected but not automatically block them. Users have the choice to individually or in bulk block these trackers.

    You can also choose sites, such as the search engine DuckDuckGo, which do not record or share your searches.

  3. Cover your tracks with Tor

    Over the last few months, Tor, a network that promises anonymity and privacy online has come under the spotlight. Tor hosts a network of websites, some of which have been under the scanner of law enforcement officials for illegal activities. Late last year, the Federal Bureau of Investigation shut down Silk Road, a marketplace available only through the Tor network, for the sale of illegal drugs.

    Tor may be useful for criminals, but its cloak of anonymity is increasingly a comfort to anyone looking for privacy. Tor offers its own browser that can be used to connect to news sites or instant messaging services and chat rooms that can’t be easily tracked online.

    To get started on the Tor network, take the advice of the ExtremeTech blog, and download the Tor Browser Bundle available for Windows, Mac and Linux. It’s similar to using the Firefox or Chrome browser but slower, because Internet traffic is routed through a series of proxies to mask its origin.

Article from WSJ.com

Taxonomy: