Guide to Self- Defence Tools

Guide to Self- Defence Tools

Considering that we are living in what ten create these services simply as bait and implementation, they sketch a map Mark Zuckerberg has called the age for getting hold of data (“the product is of what could be the future of electron- when privacy is over, there are a sur- you”). The table that we reproduce be- ic self-defence: a world in which the cli- prising number of alternatives devel- low, that does not aim to be exhaustive ent-product is affirmed as a citizen and oping in the most common systems and nor definitive, but illustrative, includes demands control over the data he or she solutions for sharing data online. From some of the alternatives with the great- generates and the information deriving Guidethe social networks to email, to and pass- est impactSelf- in spheres still controlled to- from them. ing through search engines, services in day by those large corporations, as well the cloud or voice over Internet, in re- as solutions that help to raise awareness cent years we are witnessing the emer- of how personal data are (mis)managed gence of alternatives to the standards in the digital world. With different levels developed by large companies, which of- of user-friendliness, privacy protection, 15 Defence Tools - 14 Category Description/Conventional products Alternatives Audio/ The spread of the use of alternatives to conventional telephone services through Jitsi Free and open-source multiplatform voice (VoIP), videoconferencing and IM Video/ Voice over IP (VoIP) services is not related with the revelations made by Edward application for Windows, Linux and Mac OS X with LPG license. It supports several Snowden, which made it even clearer that telephone calls are not safe from being in- popular instant-messaging and telephony protocols and also allows desktop sharing. VoIP tercepted. In reality, resorting to programmes such as Skype (Microsoft), Hangouts https://jitsi.org/ (Google) and VoIPbuster (Betamax GmbH & Co KG) is related with more competi- tive tariffs that include similar services and even additional benefits without cost Redphone Open-source application with GPL license that provides end-to-end en- (instant messaging, video-conferencing, party calls, etc.). The alternative offered cryption calls for users who have this app installed, securing their conversations so by VoIP services offers not guarantee of privacy, rather to the contrary. Already in that nobody can listen in. 2012, Skype was accused of changing its infrastructure to facilitate the intercept- https://whispersystems.org ing of conversations between users. It is for this reason that specific programmes Tox Program that offers users video-conferencing, calls and text messaging, prior- emerge that make privacy their flag by promising a much more meticulous encryp- itising privacy and without added cost or advertising contents. tion of communications. http://tox.im Cloud The combination of growing needs for storage and tendencies in the area of mobility DocumentCloud Privacy-friendly alternative to Scribd. DocumentCloud runs every storage led to the arrival of the “cloud”: remote storage solutions that are easily accessible document you upload through OpenCalais, giving you access to extensive informa- from any device connected to the Internet. There are true “farms” of interconnected tion about the people, places and organizations mentioned in each. servers that are designed simply to offer back-up copies and storage services. Today, https://www.documentcloud.org/home services such as Google Drive, iCloud and Dropbox head up cloud storage solutions ELECTRÓNICA SecureDrop Open-source software platform for secure communication between for small and medium-sized users. However, leaving a copy of our information in the hands of others, without knowing who has access and it being stored in unknown journalists and sources (whistleblowers). It was originally designed and developed places whose legal frameworks we ignore, cannot give us the greatest peace of mind. by Aaron Swartz and Kevin Poulsen under the name DeadDrop. Above all, if we are talking about documents that contain sensitive information or https://pressfreedomfoundation.org/securedrop that reveal secrets to the public (and have to be deposited in a 100% anonymous way). SpiderOak Makes it possible for you to privately store, sync, share & access In the case of the service offered by Google, one of the main risks is that the ac- your data from everywhere, based on a “Zero-knowledge” environment. AUTODEFENSA cess is linked with the rest of the services through a unique user identifier, expos- https://spideroak.com/ DE ing access to files if one is does not take special care to close the session. The need for cloud storage services with special privacy protection is a demand Tresorit Storage for digital valuables, anywhere accessible, safely shareable. High- that is gradually being attended. Of course, the most secure option will always be to est-grade encryption protects every aspect of the content management in the cloud. store the files in a device without any kind of connection to the Internet. https://tresorit.com MANUAL Drive Even if a storage device is not connected to the Internet, if it is robbed or confiscat- Bitlocker Full disk encryption feature included with the certain versions of Win- Encryption ed it can be examined without any problem if it does not have good encryption. An dows, designed to protect data by providing encryption for entire volumes. additional security mechanism consists of codifying, not only information exchang- http://www.microsoft.com/en-us/download/details.aspx?id=7806 es, but also the information in itself, available on our local storage unit. Hard disks ANONIMÍZATE do not come with an encryption system by default, therefore if we want to increase security, we will have to configure it ourselves. E-mail The majority of private individuals use email accounts based on webmail systems, Enigmail Security extension to Mozilla Thunderbird and SeaMonkey. It enables in other words, the access, management and storage of our virtual correspondence you to write and receive email messages signed and/or encrypted with the Open- is entrusted to large corporations that offer said services: MSN (Microsoft), Gmail PGP standard. (Google), Yahoo!, etc. In so far as they are free products, the profitability of webmail https://www.enigmail.net is based on anonymised surveillance of a commercial nature, with regard to adapt- GnuPG (GPG) Gnu Privacy Guard or GPG is a tool for encryption and digital sig- HANDBOOK ing the resulting advertising according to the users’ characteristics. Furthermore, evidence on mass espionage by public intelligence agencies have shown that if we natures, a substitute for the PGP (Pretty Good Privacy) system with the advantage wish to defend the privacy of electronic communications, conventional security of being free software licenced under GPL. GPG uses the IETF standard known as levels are never sufficient and it is necessary to go further. The alternatives include OpenPGP. https://www.gnupg.org DEFENCE encryption keys, projects offering webmail with guarantees and even “disposable” MailPile “Webmail” project that allows you to choose between using your own com- - email addresses. puter as server, so you have control over your data and your privacy, or running MailPile on a computer in the cloud. SELF https://www.mailpile.is RiseUp Project to create democratic alternatives and practice self-determination by promoting secure means of communication. It offers privacy-friendly webmail: en- crypted traffic, location anonymity, IP anonymity, etc. ELECTRONIC https://www.riseup.net/ IM (Instant Instant messaging offers communication in real time through text and was popu- Chatsecure Free and open-source encrypted chat client for iPhone and Android that Messaging) larised several years ago thanks to the clients offered by MSN Messenger, ICQ, and supports “Off-the-record” (OTR) encryption over XMPP. YOURSELF AIM. Today there are dozens of options available, some based on the XMPP open https://chatsecure.org protocol. The IM system has widely spread its use through mobile terminals, prom- inently with programs such as Line, Hangouts (Google), WhatsApp, Facebook Mes- Cryptocat Open-source, freeware, accessible app developed by encryption profes- senger, and tending towards multimedia exchanges, which completes the communi- sionals that offers encrypted chat in the browser or the mobile phone. Even the Cryp- cation with images, sounds, and videos. Some of these options for communication tocat network itself can’t read your messages. https://crypto.cat ANONYMISE have shown serious vulnerabilities. However there can be no doubt that in the case of these tools, those who show most curiosity in spying on us, are precisely people Telegram Telegram Messenger is a cross-platform messenger whose clients are from our environment: one only has to take a glance at the Internet to see the great open-source. Telegram users can exchange encrypted and self-destructing messag- demand for and supply of tools for intercepting conversations. In the area of instant es, photos, videos and documents (all file types are supported). messaging is precisely where a great range of alternatives has emerged that affirm https://telegram.org the protection of user privacy. TextSecure Encrypts your text and chat messages over the air and on your phone. All messages are encrypted locally, so if your phone is lost, your messages will be safe. https://whispersystems.org/#encrypted_texts Password When we are warned to choose a secure password, it is absolutely no exaggeration. Encrypter Open-source, “Zero-Knowledge”, cloud-based password manager, key/ manage- The capacity to discover and predict passwords has acquired terrifying levels of so- value store and e-wallet. phistication. One of the greatest errors and risks is that of using a single password https://encryptr.crypton.io/ ment for everything or almost everything. SplashData publishes each year its list of the 25 most common passwords, also showing their lack of security. In 2013, the ranking KeePassX Saves many different pieces of information e.g.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us