Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How to Protect Your PC From PRISM Surveillance
CIO ^ | Fri, June 07, 2013 | Mark Hachman

Posted on 07/18/2013 10:01:16 AM PDT by null and void

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-54 next last
FYI
1 posted on 07/18/2013 10:01:16 AM PDT by null and void
[ Post Reply | Private Reply | View Replies]

To: COUNTrecount; Nowhere Man; FightThePower!; C. Edmund Wright; jacob allen; Travis McGee; opentalk; ..

Nut-job Conspiracy Theory Ping!

To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I don’t add you to the list...

2 posted on 07/18/2013 10:02:10 AM PDT by null and void (Republicans create the tools of oppression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

We all just need to increase our electronic information flow 1000 times the current volume. See if we can clog the drain.


3 posted on 07/18/2013 10:05:25 AM PDT by listenhillary (Courts, law enforcement, roads and national defense should be the extent of government)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void
"protect your email by encrypting it"

I read someplace that the encrypted emails were given special attention by the gov spies.

4 posted on 07/18/2013 10:07:47 AM PDT by 1_Rain_Drop
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

“but the PCWorld’s review of the Tor browser shows it to be a slow but anonymous way of browsing the Internet”

TOR was invented by the US Navy!

“As of 2012, 80% of the Tor Project’s $2M annual budget comes from the United States government.”
http://en.wikipedia.org/wiki/Tor_(anonymity_network)

“No Conspiracy Theory Needed: Tor Created for U.S. Gov’t Spying” “The TorFAQ clearly states that exit nodes can eavesdrop. “Yes, the guy running the exit node can read the bytes that come in and out there. Tor anonymizes the origin of your traffic, and it makes sure to encrypt everything inside the Tor network, but it does not magically encrypt all traffic throughout the internet.”

http://www.networkworld.com/community/blog/no-conspiracy-theory-needed-tor-created-us-go

So think about that: The government was heavily involved in TOR, it seems to be a spy network within the internet which is itself a giant spy network. As if the people with the most to hide are deliberately manipulated to use TOR where their activities can be monitored. I don’t know if TOR deserves trust either.


5 posted on 07/18/2013 10:10:32 AM PDT by dynoman (Objectivity is the essence of intelligence. - Marylin vos Savant)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

To protect your PC, unplug it, drag it to back of the garage and cover it with it with an old blanket your dog used to sleep on. No one will want to go near it.

Also get inside the thing and clip a few of those wires hackers use. Your PC is now safe from intrusion.


6 posted on 07/18/2013 10:10:41 AM PDT by count-your-change (you don't have to be brilliant, not being stupid is enough)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

I wonder if they’re able to identify individual freepers and store our posts and messages? I always assume they do. I was advised a long time ago (before PCs actually) to never say or write anything that I didn’t want shared with the entire world.


7 posted on 07/18/2013 10:12:20 AM PDT by RC one
[ Post Reply | Private Reply | To 2 | View Replies]

To: null and void

All things any hard-core terrorist has certainly known for a few years now.


8 posted on 07/18/2013 10:12:32 AM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

My experience has been that this normally results in a lot of lost data.


9 posted on 07/18/2013 10:12:59 AM PDT by AppyPappy (Obama: What did I not know and when did I not know it?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

Thanks!


10 posted on 07/18/2013 10:13:47 AM PDT by DBrow
[ Post Reply | Private Reply | To 1 | View Replies]

To: 1_Rain_Drop

If I was a spy that’s the first place I would look.


11 posted on 07/18/2013 10:14:21 AM PDT by ryan71 (The Partisans)
[ Post Reply | Private Reply | To 4 | View Replies]

To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...

It currently takes two separate passwords for my laptop to even boot up. Then it takes a third to log in. My data is on an encrypted partition, so even if they took the drives out, they couldn't read it.

12 posted on 07/18/2013 10:15:50 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

13 posted on 07/18/2013 10:19:28 AM PDT by smoothsailing
[ Post Reply | Private Reply | To 1 | View Replies]

To: Buckeye McFrog

We are thier terrorists


14 posted on 07/18/2013 10:26:47 AM PDT by ronnie raygun (Yesterdays conspiracies are todays truths)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Buckeye McFrog

We are thier terrorists


15 posted on 07/18/2013 10:27:00 AM PDT by ronnie raygun (Yesterdays conspiracies are todays truths)
[ Post Reply | Private Reply | To 8 | View Replies]

To: null and void
For email get Bitmessage
Cons: Sender and recipient have to have the software and sender must know recipients address. The addresses are complicated. For example mine is: BM-GuQ3CsAJXEKeZD7wrWs3RopWBbhxBMUT.
Pros: unreadable, untraceable

For browsing get the Tor Browser Bundle
Cons: Something of a learning curve. URLs are complex. For example the URL for The Silk Road marketplace is: http://silkroadvb5piz3r.onion/
Pros: untraceable, complete anonymity.

N.B. Never, ever log into a web service such as Yahoo email while using TOR as all your anonymity can go up in a puff of smoke.

If these are more than you want to bother with, start using Ixquick for your web searches and use the anonymous proxy links.

Regardless of the excellent job their PR firm has done with the MSM, do not ever use Duck Duck Go and think you have achieved anonymity.

16 posted on 07/18/2013 10:27:10 AM PDT by atomic_dog
[ Post Reply | Private Reply | To 1 | View Replies]

To: RC one
I wonder if they’re able to identify individual freepers and store our posts and messages? I always assume they do.

In my case:

You've posted a total of 1,186 threads and 116,868 replies.

Every post potentially provides a clue. You talk about cities you've lived in, places you've visited, people you've met, cars you've driven, schools you've attended, letters you've written to your elected representatives, rallies you've attended, vacations you've taken, etc.

Every bit of information narrows down the number of people you could possibly be.

A determined investigator can fairly quickly know who you are.

We have very determined enemies.

I was advised a long time ago (before PCs actually) to never say or write anything that I didn’t want shared with the entire world.

Sage advice.

17 posted on 07/18/2013 10:28:51 AM PDT by null and void (Republicans create the tools of oppression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: ryan71; 1_Rain_Drop
I read someplace that the encrypted emails were given special attention by the gov spies...
If I was a spy that’s the first place I would look...

If I was a spy I would establish an internet encryption service. The operation would be self-funding after a point.

18 posted on 07/18/2013 10:30:16 AM PDT by marron
[ Post Reply | Private Reply | To 11 | View Replies]

To: null and void

When I clicked on the Duck duck go link in the story I got this:

http://www.dnsrsearch.com/index.php?origURL=

When I google it I get this:

https://www.google.com/search?q=duck+duck+goose&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a

Is this a research site? On our side or not? Kinda strange ...


19 posted on 07/18/2013 10:37:46 AM PDT by GOPJ (Department of Justice to Americans:'How many fingers am I holding up, Winston?')
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

bfl


20 posted on 07/18/2013 10:39:37 AM PDT by VRW Conspirator (The Lefties can drink Kool-Aid; I will drink Tea.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-54 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson