Got a PRISM and Boundless Informant problem? Whisper and Tor can help

TextSecure PRISM Boundless Informant

PRISM and Boundless Informant. Don’t you just love names like that. They have a nice ring to them. But do not be fooled. Those are bad for your privacy and, with time, even worse for a true democracy.

But thank heavens for Free Software and those making them available. With much gratitude to them, here are two Free Software services that can help you deal with PRISM and Boundless Informant. Maybe not completely, but a little something is better than nothing.

1. Tor is a well-known anonymizing service. Many privacy-conscious people already use it. According to the official description:

Tor software’s job is to conceal your identity from your recipient, and to conceal your recipient and your content from observers on your end. By itself, Tor does not protect the actual communications content once it leaves the Tor network. This can make it useful against some forms of metadata analysis, but this also means Tor is best used in combination with other tools.

So while Tor by itself is not a complete solution to the problem that PRISM and Boundless Informant and other mass surveillance programs pose, it’s a very important piece to the solution. Other applications that can help make Tor a more complete solution are: Enigmail, TorBirdy, and HTTPS Everywhere. Read more about Tor and PRISM here.

Related Post:  Disk Encryption in Fedora 16

2. Open Whisper is a Free Software project that creates “tools for secure mobile communication and secure mobile storage.” So far, the project has published two Android applications – RedPhone and TextSecure. They are available for download for your Android devices from WhisperSystems.org.

Related Post:  How to customize Cinnamon 1.6

RedPhone is said to provide “end-to-end encryption for your calls, securing your conversations so that nobody can listen in.”
RedPhone PRISM Boundless Informant

TextSecure is a replacement for the default messaging applications and encrypts messages on the device, that is, locally, and over the air.
TextSecure PRISM Boundless Informant

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer run network ads?  Yep, no more ads from the usual suspects that track and annoy you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal or your favorite cryptocurrency.

  • Bitcoin
  • Ethereum
  • Xrp
  • Bitcoin cash
  • Bitcoin sv
  • Litecoin
  • Binance coin
  • Cardano
  • Ethereum classic
Scan to Donate Bitcoin to bc1qzvlte2m224zkayhdc7fdfjkp2rsgt0l5a496ua

Donate Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x0F4362DFF77F3Ba0Dc637F5f3Eba35D09a2fA60C

Donate Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Xrp to r4ggjvL36njsMCYTkJ3S7cTHscPsMsSGQv

Donate Xrp to this address

Scan the QR code or copy the address below into your wallet to send some Xrp

Scan to Donate Bitcoin cash to qrs0dedzp9t55af3nfwypydghp29r0xguy9s20fz2k

Donate Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Bitcoin sv to 15K9TLyVDBtLuG9cYvXCX9SSkq9C9oUKHK

Donate Bitcoin sv to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin sv

Scan to Donate Litecoin to LetJ9QQMb7u2LMZ9Tu6rtHwcBcQFW98fbG

Donate Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Binance coin to bnb1ga8trq08ssqepd90v6225nzfgy448pu5pw8gxp

Donate Binance coin to this address

Scan the QR code or copy the address below into your wallet to send some Binance coin

Scan to Donate Cardano to addr1qx2354yw49etstfljpdhwja3ajjlt487lg95vu9ngy2q6vu4rf2ga2tjhqknlyzmwa9mrm997h20a7stgectxsg5p5esq5l7d9

Donate Cardano to this address

Scan the QR code or copy the address below into your wallet to send some Cardano

Scan to Donate Ethereum classic to 0xcD6CC972a2297FcafACDcfE042C55C69516a9264

Donate Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Subscribe for updates. Trust me, no spam!

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Upcoming events

11 Responses

  1. Quote “…Those are bad for your privacy and, with time, even worse for a true democracy.”

    Democracy is just smoke and mirrors an illusion played out… you do not have it, you just think you do, very much like your freedom – UK, USA, Europe.

  2. Sometimes, simply knowing the sender and the receiver, without knowing the contents is enough. It’s unclear, still, if Verizon turned over simply who called whom and when and for how long, basically what’s on everyone’s cell phone bill, or whether Verizon allowed the NSA to record vast quantities of content. Tor doesn’t help for hiding the fact that you sent through Tor, when an agency can track every packet in and out of a Tor server, even if they can’t see the contents. That may be enough to attract attention, and further snooping by the agency involved. For example, the NSA may simply turn over the fact that you used Tor to the DoJ who can charge you with something (see the book “Three Felonies a Day”) simply because you used Tor.

    I’m still skeptical about Snowdown’s entire story. He’s obviously got part of it right, the part I already knew and had learned from publicly available sources. I am still not sure he is not exagerating that kernel of truth, and will be skeptical without separate, reliable information. And someone’s friend’s brother-in-law who knows someone who really knows, isn’t reliable. Nor are anonymous posters on the internet.

    1. Snowden did not tell “entire story.” In fact, the guy has not even said a whole lot. He just turned over hard evidence to reliable journalists, who published part of it. And there’s still more to come. So there’s nothing about Snowden that I’m skeptical about.

      For example, the NSA may simply turn over the fact that you used Tor to the DoJ who can charge you with something (see the book “Three Felonies a Day”) simply because you used Tor.

      Isn’t that very scary. Isn’t that part of what Snowden is trying to warn us about.

      If using Tor can get you in trouble, what’s next? Https?

      1. Part of the problem is that one of those “reliable journalists” isn’t.

        Glenn Greenwald at the Guardian is a notorious jihad-appeaser who wouldn’t fail to excoriate Israel if they found the cure for cancer. (ignore the “religious” issues if you are capable of doing so, and just research how much POSITIVE computer tech advances come from Israel).

        As much as I refuse to accept this administration spying on law-abiding American, it’s not hard to assume that part of Greenwald’s exposure is to help his jihadi friends who have been and should be the sole focus of Prism etc.

    2. “Nor are anonymous posters on the internet”

      PS – here’s the bottom line. This administration has taken tools designed to be used against American’s foreign and domestic enemies (muslims and marxists) and used them against ALL LAW_ABIDING Americans, concurrently with abusing the IRS to harass those domestic legitimate political groups and media that the Administration fears.

      Thats virtually treason, and most certainly falls under high crimes and misdemeanors.

      1. I take issue with 2 things you said.

        “American’s foreign and domestic enemies (muslims and marxists)”

        Some people (including some in the government) see these as enemies but they are not my enemies.

        “This administration has taken tools designed to be used against American’s foreign and domestic enemies”

        It’s not only this administration. This extensive spying has been taking place for at least 10 years. The Bush Administartion was also doing it. I am very disappointed in President Obama for continuing it.

        1. “but they are not my enemies”

          Then you are a muslim, a marxist, or a moron, because the first two are dedicated to controlling, converting or killing all those who do not follow their path. READ HISTORY.

          “It’s not only this administration. This extensive spying has been taking place for at least 10 years. The Bush Administartion was also doing it.”

          Yes but they started out doing to to track the muslims and their marxist allies.

          ” I am very disappointed in President Obama for continuing it.”

          Boo-fricking hoo, so you’re another obamunist, no wonder you are ok with jihad and communism.

    3. Is this clear enough for you? William Binney a former senior NSA crypto-mathematician for almost 40 years confirms what Snowdown said:

      http://www.democracynow.org/blog/2013/6/10/inside_the_nsas_domestic_surveillance_apparatus_whistleblower_william_binney_speaks_out

      It’s clear that the NSA is collecting and storing everyones text messaging such as email. And they are collecting the meta-data for everyones phone calls. Later they can use this data to build a case against anyone. They use computer algorithums to filter the data and find the so-called bad guys.

      This kind of power is easily abused. If the government doesn’t like persons political beliefs they can use this system to build a case against them.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.