Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people.
Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy.
The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.]
You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.]
Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
Group items matching
in title, tags, annotations or url
2More
How to Convert Video to MP3 - Icecream Tech Digest - 0 views
3More
Apple Caters to Open Source by Switching Swift to Apache 2.0 License | Open Source Appl... - 0 views
1More
Apple's iBackDoor: Dodgy ad network code menaces iOS apps * The Register - 0 views
4More
The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions | Just S... - 0 views
2More
Command Line Tool to Monitor Linux Containers Performance - 0 views
3More
How to Record Your Windows, Mac, Linux, Android, or iOS Screen [# ! Via Note] [# ! + 1 ... - 0 views
2More
(# ! Another) 5 best Linux distros for beginners and newbies - Computer Business Review - 0 views
3More
Mobile security: iOS 8 vs. Android 5 vs. BlackBerry vs. Windows Phone [# ! x BoS...]] - 0 views
3More
Copyright Reform: The European Parliament Must Follow the Reda Report! | La Quadrature ... - 0 views
‹ Previous
21 - 40 of 63
Next ›
Last »
Showing 20▼ items per page