The right of the people

Secure in their personHere is an article to hopefully start you down the path of preparedness and self reliance as it relates to your “digital life”, remember…

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The right of the people…

By Delta01

This is a high speed-low drag overview of electronic security options available to safeguard your electronic communication freedom. I will mention the software or type of software and application; you can use non-logging or to search for more detailed info, use and installation.

In a nutshell the electronic “information” of every American is being recorded by a tyrannical Government. The recent events regarding the NSA and Verizon, violating the 4th amendment and monitoring every customers (97,000,000 million folks) phone calls are very disturbing.. I personally have never trusted the government to safeguard my freedom and privacy. I have always assumed the government can and will monitor everyone. My lack of trust thrust me into the world of computers to learn how to protect myself from an eavesdropping government. The list posted below represents a small snippet of what is available. If you do not like or understand specific software you can search for another type. I am merely planting a small seed of knowledge.  If you need help with a specific install or need advice you can always Bitmessage (encrypted anonymous messenger) me at (my address) BM-2DCExbSNY4Ca4Mm1xnKMiZBFE5RoDLN1K2 . You will need to install Bitmessage and configure your identity to be able to send a message to me.

The List:

EDS Lite:     Android phone/tablet Truecrypt encryption application

SeeCrypt:   Andriod phone (smart phone) VOIP phone call encryption

RedPhone:   Encrypt Andriod phone calls (phone to phone, not voip)

TrueCrypt:   Strong whole disk(before booting) encryption for laptops and computers

BitMessage:   Anonymous encrypted messenger

Dooble:   Encrypt all internet browsing data/ Encrypted web Browser

DNScrypt:   Encrypt the web address lookup information coming from your computer

Secure Eraser:   Securely wipe/erase data, slack space and free space on your computer

Bitwise:   Encrypted chat

Qubes:   Secure linux operating system

Batch purifier:   Removes file metadata  (like gps location, name etc from photos and files of all types)

Whonix:   Anonymous virtual system that runs through TOR

Tor Bundle:   Anonymous web surfing (do NOT click on java, flash etc while surfing)

TOR Birdy:   Anonymous email through TOR

TextCrypt:  Encrypted Android phone text messages

Axcrypt:   File encryption

OpenPuff:   Steganography encryption software to embed encrypted files inside photos and sound files.

Minimum safe practices would be as follows.

Install truecrypt whole disk encryption with a 50+ character passphrase (example of 50 you CAN remember: $$$$$$$$$$+++++QQQQQQQQQQ?????bbbbbbbbbbAAAAAAAAAA) and use 2 chaining encryptions (do not use Aes and ripe 160 alone, better to run AES/Twofish chained encryption).  To hack that password: Massive Cracking Array Scenario:(Assuming one hundred trillion guesses per second)9.52 trillion trillion trillion trillion trillion trillion centuries. Good luck!

Install Thunderbird mail and open PGP encryption

Install DNScrypt

Install Tor Bundle

On the phone install Seecrypt or Redphone or both

Install Bitmessage

You could also sign up with a secure non-logging out of country VPN service like EarthVPN for $4 dollars per month. Make sure you use a prepaid credit card and buy it with cash. Use Torbundle to surf to Earthvpn and pay with your prepaid card.

Two warnings. Skype encryption most likely has been hacked by the NSA or the key was given to them by Skype. Its not to be trusted for anything other than soup recipes. Also IPV6 can embed geolocation information as well as computer fingerprints (mac ID) into your IP address.  Windows is supposed to scramble this but Macs and Linux does not. It is best to disable IPV6 unless you know how to test your IP for leaks.

original article: The right of the people …By Delta01

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.

WordPress theme: Kippis 1.15