Prism break: Minimize surveillance and protect your privacy

40
PRISM BREAK HOW TO MINIMIZE SURVEILLANCE IN TODAY’S ELECTRONIC WORLD PRODUCED BY HEARTBEAT EARTH FOUNDATION www.heartbeatearth.org

description

A presentation that points out many issues around privacy, proprietary software, and how to use applications such as encryption to protect your voice online and one your smart or cell phone.

Transcript of Prism break: Minimize surveillance and protect your privacy

Page 1: Prism break: Minimize surveillance and protect your privacy

PRISM BREAK

HOW TO MINIMIZE SURVEILLANCE IN TODAY’S ELECTRONIC WORLD

PRODUCED BY HEARTBEAT EARTH FOUNDATION

www.heartbeatearth.org

Page 2: Prism break: Minimize surveillance and protect your privacy

INTRODUCTION

● WHO WE ARE● WHO ARE YOU?● WHY WE ARE HERE: THE CHALLENGE OF

OUR TIME AND TECHNOLOGY● YOUR RESPONSIBILITIES

– EDUCATE YOURSELF– DUE DILIGENCE (DON'T EVEN TRUST ME!)

Page 3: Prism break: Minimize surveillance and protect your privacy
Page 4: Prism break: Minimize surveillance and protect your privacy

WHAT, ME WORRY?

● SURVEILLANCE LEADS TO REPRESSION● SURVEILLANCE SCARES ACTIVISTS FROM

PARTICIPATING IN MOVEMENTS● TODAY WE WORRY AS MUCH ABOUT

WHAT CORPORATIONS KNOW ABOUT US AS WHAT THE STATE KNOWS– EDWARD SNOWDEN WAS A CONTRACTOR,

NOT A GOVERNMENT EMPLOYEE– IMPACTS ON JOB SEEKERS?

Page 5: Prism break: Minimize surveillance and protect your privacy

FREE/LIBRE OPEN SOURCE SOFTWARE

(F/LOSS)• ALL F/LOSS LICENSES REQUIRE THAT THE SOFTWARE

REMAIN AVAILABLE TO USE, MODIFY, AND DISTRIBUTE AT NO COST.

• F/LOSS IS INCREASINGLY THE GO-TO STANDARD FOR OPERATING SYSTEMS, PROGRAMS, AND USER APPLICATIONS, FOR INDIVIDUALS TO LARGE ENTERPRISES. IT HELPS REDUCE COSTS, AVOIDS LOCK-IN, INCREASES PRODUCTIVITY, ENHANCES SECURITY, AND IMPROVES STANDARDS COMPLIANCE. WITH THE BEST LONG-TERM INVESTMENT PROTECTION, F/LOSS IS THE LOWEST RISK CHOICE FOR SOFTWARE SYSTEMS TODAY.

Page 6: Prism break: Minimize surveillance and protect your privacy

FREE/LIBRE OPEN SOURCE SOFTWARE

(F/LOSS)• CONTRAST F/LOSS WITH MICROSOFT (PROPRIETARY

SOFTWARE):

– PROPRIETARY SOFTWARE NOW SHOWN TO HAVE LINKS TO NSA THROUGH *BACK DOORS*

– REQUIRES PAID LICENSING AND RENEWALS

– NOT CUSTOMIZABLE BY USERS

– CAN INCLUDE CODE TO TAKEOVER CONTROL OF CAMERAS AND MICROPHONES EVEN WHEN DEVICE IS TURNED OFF

– WINDOWS PCs SUBJECT TO INTENSE VIRUS ATTACKS

Page 7: Prism break: Minimize surveillance and protect your privacy

LibreTek LICENSES

● REQUIRE THE TEK BE AVAILABLE FOR US, THE ACTUAL OWNERS/USERS OF THE PRODUCT :– FULL ACCESS TO THE SOURCE CODE

AND / OR DESIGN SCHEMATICS– USE AS WE WISH– MODIFY AS WE WISH– REDISTRIBUTE MODIFIED VERSIONS

UNDER SIMILAR TERMS

Page 8: Prism break: Minimize surveillance and protect your privacy

LibreTek LICENSES

● STARTING WITH SOFTWARE AND SPREADING INTO HARDWARE AND ALL FORMS OF CULTURE AND TECHNOLOGY: ALSO REFERRED TO AS “ACCESS 2 KNOWLEDGE”, OR A2K

● LibreTek IS THE BEST LONG-TERM INVESTMENT PROTECTION AND LOWEST RISK CHOICE FOR TEK TODAY.

Page 9: Prism break: Minimize surveillance and protect your privacy

LibreTek LICENSES

● LibreTek :– RESPECTS YOUR A2K HUMAN RIGHTS– REDUCES COSTS– AVOIDS VENDOR LOCK-IN / DEPENDENCY– INCREASES PRODUCTIVITY– ENHANCES SECURITY– IMPROVES STANDARDS COMPLIANCE– MAY EVEN RAISE QUALITY– HUGE PEACEFUL ECONOMIC BOOST

Page 10: Prism break: Minimize surveillance and protect your privacy

PASSWORDS

• THE FALLACY OF *SECURITY*

• 20% OF USERS HAVE “1111” AS THEIR PASSWORD

• USE SOMETHING MEMORABLE, WITHOUT USING ACTUAL WORDS

• ADD NUMBERS AND SYMBOLS

• DIFFERENT PASSWORDS FOR EACH USE

• CAN BE IN A *PASSWORD SAFE*

Page 11: Prism break: Minimize surveillance and protect your privacy

CELL AND SMART PHONES

● NSA DELIGHT!

– GPS

– TOWER PINGS

– REMOTE ACCESS TO MICROPHONE, CAMERA

• VIRUSES, KEYLOGGERS

• ALWAYS USE ANTIVIRUS, ANTI SPYWARE, AND ANTI MALWARE PROGRAMS ON ALL DEVICES

• *SNIFFING* WHILE ON WIFI

Page 12: Prism break: Minimize surveillance and protect your privacy

CELL AND SMART PHONES

● Renew, the London-based marketing firm behind the smart trash cans, bills the Wi-Fi tracking as being "like Internet cookies in the real world"

Page 13: Prism break: Minimize surveillance and protect your privacy

CELL AND SMART PHONES

Page 14: Prism break: Minimize surveillance and protect your privacy

CELL AND SMART PHONES

• STUFF HIDDEN FROM VIEW

– NEAR FIELD COMMUNICATION

– APPS ACCESSING AND TRANSMITTING CONTACT AND/OR LOCATION DATA

– DIGITAL LIVING NETWORK ALLIANCE (DLNA)

– AUTOMATIC BACKUPS, UPDATES

Page 15: Prism break: Minimize surveillance and protect your privacy

PHONE SOLUTIONS

• TURN OFF THE PHONE, TAKE OUT THE BATTERY

• LEAVE IT AT HOME

• BUY A PREPAID, THROWAWAY PHONE FOR EMERGENCY USE ONLY (UNLOCKED, FOREIGN)

• USE ENCRYPTION

– REDPHONE, CSipSimple

– TEXTSECURE

• USE AN *OLD* PHONE FOR PHOTOS ONLY

Page 16: Prism break: Minimize surveillance and protect your privacy

EMAIL

• PGP, OR GnuPG

– MOZILLA THUNDERBIRD FOR EMAIL, W/SECURITY ADD-ON ENIGMAIL (OpenPGP ENCRYPTION)

– HUSHMAIL; RISEUP, GUERILLAMAIL; REDIFF

– BITMESSAGE

• USE VPN TO DODGE MULTIPLE HOPS

● HYPERBORIA: PROGRAM THAT ENCRYPTS MESSAGES END-TO-END

• CRYPTOCAT (EXTENSION FOR CHROME, FIREFOX) FOR CHAT, SENDING ZIP OR IMAGE FILES

Page 17: Prism break: Minimize surveillance and protect your privacy

EMAIL

• CONSIDER AT LEAST THREE ACCOUNTS:

– PERSONAL: ONLY FAMILY AND CLOSE FRIENDS

– GENERAL: USE FOR NEWSLETTERS, SIGNING INTO WEBSITES AS A USER NAME, AS A CONTACT POINT WHEN PURCHASING ONLINE

– RESET: HAVE ONE EMAIL THAT YOU ONLY USE TO RECEIVE THE EMAIL WHEN YOU ARE MAKING CHANGES TO AN ACCOUNT; LETS YOU KNOW IF YOUR PASSWORD HAS BEEN COMPROMISED

Page 18: Prism break: Minimize surveillance and protect your privacy

EMAIL

Page 19: Prism break: Minimize surveillance and protect your privacy

VPN

● HERE IS SOME INFO AND POTENTIAL VPN FOR YOUR USE: https://help.riseup.net/en/riseup-vpn

– BYPASSES YOUR ISP; GOES STRAIGHT TO RISEUP, THEN OUT TO THE INTERNET

– OPERATES BEHIND THE RISEUP FIREWALL– CAN BYPASS CENSORSHIP OR ENABLE USE OF

PROGRAMS, LIKE SKYPE, THAT ARE BLOCKED BECAUSE OF YOUR LOCATION OR COUNTRY

– OF COURSE, ADDS COMPLEXITY, MAY BE SLOWER● OPTION: https://www.privateinternetaccess.com/

Page 20: Prism break: Minimize surveillance and protect your privacy

VPN

● YOU VPN INTERNETINTERNET

Page 21: Prism break: Minimize surveillance and protect your privacy

DOCUMENT PROTECTION

● PDFCreator: OPEN SOURCE PROGRAM– PASSWORD PROTECTION FOR DOCUMENTS– CONTROL PRINTING OR EDITING– ENCRYPT WITH AES AND UP TO 128 BIT– DIGITALLY SIGN THE DOCUMENT TO VERIFY

YOU ARE THE AUTHOR

Page 22: Prism break: Minimize surveillance and protect your privacy

SEARCH

Page 23: Prism break: Minimize surveillance and protect your privacy

SEARCH

Page 24: Prism break: Minimize surveillance and protect your privacy

POP YOUR FILTER BUBBLE!

● SEARCH THAT IDENTIFIES YOU, YOUR LOCATION, YOUR PRIOR SEARCH HISTORY, EVEN WHAT COMPUTER YOU ARE USING (APPLE VS ANDROID VS WINDOWS) AND WILL ADJUST YOUR RESULTS ACCORDINGLY

Page 25: Prism break: Minimize surveillance and protect your privacy

SEARCH

• ENGAGE *DO NOT TRACK* OPTIONS IN YOUR BROWSER

– IF YOUR BROWSER OFFERS ADD-ONS, CHECK FOR OTHER PRIVACY AND SECURITY APPS

• USE TAILS (F/LOSS OPERATING SYSTEM) OR UBUNTU 10.04 PRIVACY REMIX

• USE ONE COMPUTER ONLY FOR INTERNET USE, HAVE SENSITIVE DOCS ON A SEPARATE SYSTEM THAT IS NEVER ONLINE

Page 26: Prism break: Minimize surveillance and protect your privacy

SURF SAFELY

● BLOCK COOKIES

● BLOCK THIRD PARTY TRACKING: “DONOTTRACKME”

● BLOCK REPORTED ATTACK SITES

● BLOCK REPORTED WEB FORGERIES

● ON FACEBOOK OR GOOGLE: “PRIVACYFIX”

● ADBLOCK

● NOSCRIPT

● MALWARE AND VIRUS PROTECTION

● PORTABLE FIREFOX

Page 27: Prism break: Minimize surveillance and protect your privacy

SOCIAL MEDIA

● YOU CAN NOT REMOVE ANYTHING YOU POST OR SEND, EVER

– BE PREPARED TO CHANGE YOUR NAME● RETROSHARE, DIASPORA, AS OPEN-SOURCE

ALTERNATIVES TO FACEBOOK

● EVOLVESOCIETY: AD-FREE, DoNotTrack SOCIAL NETWORK

● OFF-THE-RECORD (OTR) OFFERS AUTHENTICATION, ENCRYPTION, DENIABILITY, NO FORWARDING OF CHAT MESSAGES

Page 28: Prism break: Minimize surveillance and protect your privacy

SOCIAL MEDIA

● LIMIT THE INFO YOU SHARE ABOUT YOUR LIKES AND LOCATION

● CONSIDER FAKE INFO● USE FACEBOOK DISCONNECT TO

PREVENT TRANSFER OF YOUR INFO TO THIRD PARTIES

● USE GHOSTERY TO LET YOU KNOW WHAT THIRD PARTIES ARE LOOKING OVER YOUR SHOULDER (ON ALL WEBSITES!)

Page 29: Prism break: Minimize surveillance and protect your privacy

WIFI NETWORKS

• AVOID COFFEESHOPS!

• ONLY USE ENCRYPTED NETS:

– WEP IS WEAK

– WPA IS STRONGER

• CONSIDER USING TOR

– NO PLUGINS

– NO OPENING ATTACHMENTS WHILE ONLINE

– USE HTTPS IF POSSIBLE

• PIRATE BOX, A LOCAL WIFI NET THAT YOU RUN, NOT PART OF THE INTERNET

Page 30: Prism break: Minimize surveillance and protect your privacy

WHEN DELETE IS NOT DELETE

• “USING A COMPUTER FORENSIC EXPERT, THE BUSINESS WAS ABLE TO RECOVER TEMPORARY FILES STORED ON THE HARD DRIVE OF THE COMPANY-ISSUED COMPUTER WHICH CONTAINED COPIES OF AN EMPLOYEE’S ATTORNEY-CLIENT COMMUNICATIONS. (WE SHOULD NOTE THAT MANY WEB-BASED E-MAIL APPLICATIONS LEAVE SUCH TEMPORARY FILES ON THE HARD DRIVE OF THE SENDER’S COMPUTER.)”

– A COURT ACCEPTED THIS EVIDENCE

Page 31: Prism break: Minimize surveillance and protect your privacy

WHEN DELETE IS NOT DELETE

• YOU CAN’T *ERASE* DATA BY MOVING IT INTO THE RECYCLE BIN

• YOU NEVER KNOW HOW MANY PLACES THAT FILE LIVES ON YOUR HARD DRIVE

• SNOOPING DEVICES AND KEYLOGGERS MAY BE ON AN UNFAMILIAR SYSTEM (WORK, LIBRARY)

• DON’T COUNT ON OTHERS’ EQUIPMENT TO HIDE YOU

Page 32: Prism break: Minimize surveillance and protect your privacy

NOT SPYING, CENSORING!

• CIRCUMVENTOR

• USE A PROXY SERVER

– http://sesaweenglishforum.net IS ONE POSSIBILITY

• ULTRASURF

• AGAIN, TOR OR A VPN

Page 33: Prism break: Minimize surveillance and protect your privacy
Page 34: Prism break: Minimize surveillance and protect your privacy

MONEY

● DWOLLA AS PAYPAL SUBSTITUTE

● MANY ALTERNATE CURRENCIES

– BITCOIN, PERFECT MONEY, PAXUM, HOOPAY,C-GOLD, PECUNIX, GLOBAL DIGITAL PAY, AND MORE

● MANY TYPES OF EXCHANGES AND TRANSFERORS

– OKPAY.COM– THE-LIBERTYRESERVE.COM– CASHU.COM

● WANT ANONYMOUS? CASH!

Page 35: Prism break: Minimize surveillance and protect your privacy

NEW CONVERSATIONS

• METADATA

– GIVES UP INFO YOU DON’T KNOW ABOUT

– http://tiny.cc/lnyc1w FOR AN INTERESTING EXAMPLE

– THERE IS SOFTWARE THAT WILL STRIP THE META DATA FROM YOUR PHOTOS. ONE THAT YOU CAN USE IS METABILITY QUICK FIX, AVAILABLE AT http://tiny.cc/bsyc1w

• LIVE DROPS (SHARING “COPYRIGHTED” MATERIAL ANONYMOUSLY BY PASSING AROUND A FLASH DRIVE AT A PARTY OR MEETING; GIVE ONE FILE AND TAKE ONE FILE)

Page 36: Prism break: Minimize surveillance and protect your privacy

NEW CONVERSATIONS

• USE CASH!

• CLOUD COMPUTING, ARE YOU KIDDING ME?

• SURVEILLANCE CAMERAS

• LICENSE PLATE READERS

– BIKE!

• [FUTURE] UNSEEN MARKING POWDER DROPPED OVER A CROWD VIA DRONE

Page 37: Prism break: Minimize surveillance and protect your privacy

RESOURCES

• THIS LIST IS INCOMPLETE; IT IS MEANT TO GET YOU STARTED:

– SSD.EFF.ORG

– SECURITYINABOX.ORG

– WHISPERSYSTEMS.ORG

– BASICINTERNETSECURITY.ORG

– HELP.RISEUP.NET/EN/SECURITY

– FIXTRACKING.COM

Page 38: Prism break: Minimize surveillance and protect your privacy

SUMMARY

● IF WE END OUR ACTIVISM OR STOP SPEAKING OUT THEN THEY HAVE WON

● WE CAN NEVER BE 100% SAFE● THERE ARE PROGRAMS AND TECHNIQUES

THAT HELP KEEP US SAFE● LibreTek AND F/LOSS PUTS US ON A PATH

THAT LEADS AWAY FROM CORPORATE AND GOVERNMENT DOMINATION

Page 39: Prism break: Minimize surveillance and protect your privacy

WE GET TO CHOOSE OUR HEROES

Page 40: Prism break: Minimize surveillance and protect your privacy

THANK YOU!

IT TAKES WORK TO BE SAFE AND

ANONYMOUS ONLINE.

WE WANT TO MAXIMIZE THE ADVANTAGES OF OUR TECH-CONNECTED WORLD WHILE PREVENTING THE LOSS OF

OUR PRIVACY.

WE ARE CONSTRUCTING A NEW WORLDVIEW THAT VALUES A FREE EXCHANGE OF INFORMATION WITHOUT FEAR, WITHOUT COMPLYING WITH THE AGENDA OF ANY

POLICE STATE, AND WITHOUT THE NEED TO SELF-CENSOR.

COMMENTS: [email protected]