{"id":30006,"date":"2013-06-17T12:00:23","date_gmt":"2013-06-17T11:00:23","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=30006"},"modified":"2015-05-06T12:52:51","modified_gmt":"2015-05-06T11:52:51","slug":"it-wont-be-easy-but-heres-how-you-can-keep-all-your-conversations-private","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/06\/it-wont-be-easy-but-heres-how-you-can-keep-all-your-conversations-private\/","title":{"rendered":"It Won\u2019t Be Easy, But Here\u2019s How You Can Keep All Your Conversations Private"},"content":{"rendered":"<p>Your private conversations aren\u2019t that private. In fact, the <a target=\"_blank\" href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/nsa-tapped-internet-servers\/\" >government is tapped into<\/a> the servers of the top technology companies.<\/p>\n<p>The NSA was granted carte blanche to the metadata of <a target=\"_blank\" href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/nsa-verizon-call-records\/\" >millions of Verizon phone calls<\/a>. Current laws allow cops to <a target=\"_blank\" href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/holder-email\/\" >access your email without a warrant<\/a> if that email is stored in the cloud at least six months. Someone, somewhere could potentially be listening or reading your conversations. You can fight it, but it\u2019s not easy.<\/p>\n<p>If you\u2019re not concerned about the government, hackers are out there ready to dox (display all your personal information online) you if they deem you important enough or for the fun of it. So how do you communicate without the whole world finding out that you\u2019ve visited the doctor 12 times in the past six months for a mysterious rash? Well it\u2019s not easy, but there are ways to keep your correspondence off the grid.<\/p>\n<p><b>Phone<\/b><\/p>\n<p>Clearly you can\u2019t use your own phone, given that the government already is compiling metadata on who you call and how often. To limit the chance of being spied upon while making calls on the go you need to invest in a \u201cburner\u201d phone (so named because such phones are used for a brief period of time, then tossed away like stale pizza). As anyone who watched <i>The Wire<\/i> knows, these cheap pay-as-you-go phones can be picked up at most electronic stores and some convenience stores. If you\u2019re extra parano\u2026 er, cautious, pay cash. Now you have a phone that\u2019s not linked in any way to your identity. if you\u2019re extra, extra parano\u2026 er, cautious, pay cash and never buy them from the same store twice.<\/p>\n<p>Of course, the person you\u2019re calling also needs a burner phone. What\u2019s the point of using an anonymous phone if the person you\u2019re calling is still using their potentially tapped personal phone?<\/p>\n<p><b>Email<\/b><\/p>\n<p>A quickie burner account from Gmail or other online outfit isn\u2019t enough these days. By tracing the IP address of a sent email, law enforcement and anyone with a little bit of technical skill can determine where an email originated. It doesn\u2019t take <a target=\"_blank\" href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/nsa-tapped-internet-servers\/\" >NSA-level access to Google\u2019s servers<\/a> to trace the origin of all those emails you sent to the UN and the White House about black helicopters and the New World Order.<\/p>\n<p>To truly and effectively hide your identity, you need to use <a href=\"https:\/\/www.torproject.org\/index.html.en\"  target=\"_blank\">Tor<\/a>. Tor was developed by the U.S. Navy to help protect government communications. The service creates a network of virtual tunnels that ISPs and other more nefarious organizations can\u2019t track. Just download the Tor browser and start emailing.<\/p>\n<p>But not with Gmail. Use Hushmail\u2019s secure email service. It has fancy security features like OpenPGP to encrypt all those emails you\u2019re sending to your friends about the party at the lake this weekend.<\/p>\n<p>And finally, don\u2019t open any documents, enable any Flash or Quicktime files, or enable or install any browser plugins while using Tor or web-based email. All of those could <a href=\"https:\/\/www.torproject.org\/download\/download-easy.html.en#warning\"  target=\"_blank\">potentially reveal your location<\/a>.<\/p>\n<p>Of course, like your phone calls, this works best when your friends start using Tor and anonymous email accounts Hushmail. Just tell them it\u2019s like you\u2019re super spies. Or you\u2019re <a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enemy_of_the_State_%28film%29\" >Robert Clayton Dean and Edward Brill<\/a>.<\/p>\n<p><b>IM<\/b><\/p>\n<p>Google, AIM, Yahoo and Skype may do a good job securing your chats, but when the NSA comes to the door with a warrant, all your communications are available for scrutiny. Instead of letting big brother read all your LOLs, OMGs, and WTFs, you need to start using OTR (off the record) messaging. Such messages are encrypted so they can\u2019t actually be read if they\u2019re intercepted or pulled with a subpoena.<\/p>\n<p>Just head on over to the <a target=\"_blank\" href=\"http:\/\/www.cypherpunks.ca\/otr\/index.php#downloads\" >OTR messaging site<\/a>. If you use Pidgin for Windows, you can download a plugin. If you use anything else you can download the source code, library, and toolkit to get OTR working on your machine. Yeah, you might need a degree in computer science to get up and running, but if private IMs are important to you, you won\u2019t mind compiling some software to chat with friends.<\/p>\n<p>Once that\u2019s all done, launch Tor and use that in conjunction with OTR. And of course, go to your friends\u2019 houses and do the same thing on their computer.<\/p>\n<p><b>In Person<\/b><\/p>\n<p>Sometime you have to meet people in real life. What if they\u2019re wearing a wire, or worse, you\u2019re being tracked by, oh I don\u2019t know, the FBI. One way to deter audio recording is to talk near a waterfall or other location bathed in white noise. (It totally worked for the terrorists on <i>Homeland<\/i>).<\/p>\n<p>The fact of the matter is that total privacy isn\u2019t just tough, it\u2019s nearly impossible for the average person. The truly paranoid, and there are people that should be, have so many hoops to jump through just do something as easy as send an email or make a phone call. And even if you follow all recommended tips, the biggest breach is still the person on the other end. You could go through all the hassle of making sure your messages are private and they could just throw all those messages onto the Internet.<\/p>\n<p><b>See Also<\/b><\/p>\n<ul>\n<li><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/verizon-responds\/\"  target=\"_blank\">Verizon Breaks Silence on Top-Secret Surveillance of Its Customers<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/nsa-verizon-call-records\/\"  target=\"_blank\">Report: NSA Was Granted Order to Snag Millions of Verizon Call Records for 3 Months<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/nsa-tapped-internet-servers\/\"  target=\"_blank\">NSA Is Wired Into Top Internet Companies\u2019 Servers, Including Google, Facebook<\/a><\/li>\n<li><a href=\"http:\/\/www.wired.com\/opinion\/2013\/05\/listen-up-future-deep-throats-this-is-how-to-leak-to-the-press-today\/\"  target=\"_blank\">Hear Ye, Future Deep Throats: This Is How to Leak to the Press<\/a><\/li>\n<\/ul>\n<p>__________________________<\/p>\n<p><i>Roberto is a Wired Staff Writer for Gadget Lab covering cord-cutting, e-readers, home technology, and all the gadgets that fit in your backpack. Got a tip? Send him an email at: roberto_baldwin [at] wired.com.<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.wired.com\/gadgetlab\/2013\/06\/private-conversations\/?cid=co8627504\" >Go to Original \u2013 wired.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So how do you communicate without the whole world finding out that you&#8217;ve visited the doctor 12 times in the past six months for a mysterious rash? Well it&#8217;s not easy, but there are ways to keep your correspondence off the grid.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,60],"tags":[],"class_list":["post-30006","post","type-post","status-publish","format-standard","hentry","category-media","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/30006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=30006"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/30006\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=30006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=30006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=30006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}