« Increasing Data Collection and Surveillance in the North American HomelandGuantanamo Hunger Striking Continues »

How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations

October 21st, 2013

via chycho

I. What’s Going On

Online, we are both a product for corporations and a person of interest to governments (2, 3).

Corporations are taking advantage of these times by changing their privacy policies so that they can track us, use us, and sell us whatever their algorithms decide that we need or want based on data they have acquired about our movements, contacts, desires, fantasies, or kinks. Governments on the other hand are using our data to make sure that we will never acquire enough power to change any policies that we deem to be a threat to our happiness, livelihood, or survival. In essence, we are at war with these organizations and we should act as such:

“…this is truly unprecedented in history. And what we’re seeing is secrecy and surveillance are completely subverting security and liberty, not just in the United States, but for many, many citizens around the world.”


This corporate misconduct and government surveillance is threatening the internet (2, 3), the original purpose of which was to create an “open architecture networking” system where “a globally interconnected set of computers” would allow “everyone” to “quickly access data and programs from any site”. So we have to be careful out there, at least until we have neutralized this threat.

Jacob Appelbaum: NSA's FoxAcid/Quantum Programs "Like the Military Occupation of Entire Internet"

Additional info at: “How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID”

Further information regarding this subject available through the following two videos featuring Jacob Appelbaum in a Q&A workshop discussing computer security, mobile phone security, cellphone forensics, and state repression and surveillance.

Jacob Appelbaum (Part 1/2) Digital Anti-Repression Workshop - April 26 2012

Jacob Appelbaum (Part 2/2) Digital Anti-Repression Workshop - April 26 2012

II. How to Protect Our Privacy

As for how we can protect ourselves from these intrusions into our privacy? Aside from everything mentioned above in Jacob Appelbaum’s Q&A workshop, which included some brief remarks about open-source software and an in-depth discussion on maintaining anonymity by using the Tor Network and how to secure your cell phone and computer, the Electronic Frontier Foundation (EFF) has provided a 12 step program - originally publish in 2002 and still very relevant today - with some suggestion on how we can protect our online privacy:

  1. Do not reveal personal information inadvertently.
  2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
  3. Keep a "clean" e-mail address.
  4. Don't reveal personal details to strangers or just-met "friends".
  5. Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer.
  6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
  7. Do not reply to spammers, for any reason.
  8. Be conscious of Web security.
  9. Be conscious of home computer security.
  10. Examine privacy policies and seals.
  11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom.
  12. Use encryption!

The dangers of providing too much personal information cannot be over emphasized. It is up to us to make sure that we are protected not only from identity theft but also from private data mining organizations and governments that have developed massive data collection systems.

Privacy is an Illusion: Alessandro Acquisti at TEDxMidAtlantic

An open Internet is crucial for our development and growth as a collective, but this social networking can also occur without us providing sensitive information about our identity - Have you ever had a nickname that you loved? Have you ever wanted to create a nickname that represented who you have become? Did you ever want to be younger or older then you are? Did you ever want to have a different birth sign? - The Internet provides a great opportunity for us to create our second persona that will live in parallel with us, expanding our social network beyond our wildest dreams.

Through the Net, we can visit and live anywhere we want, and be anyone we want. The Internet is where we reside, it is our home, so until Social Networking Websites give us the option to choose the Internet as our hometown, we should travel the world. Keep in mind that even an alternative spelling of our name, a different birth day, or a fake address can help protect our anonymity.

III. How to Improve Our Society

By protecting our privacy we can diminish the power that these organizations have over us and ensure that we will not be mistreated:

“We need a comprehensive data privacy law. This law should protect all information about us, and not be limited merely to financial or health information. It should limit others' ability to buy and sell our information without our knowledge and consent. It should allow us to see information about us held by others, and correct any inaccuracies we find. It should prevent the government from going after our information without judicial oversight. It should enforce data deletion, and limit data collection, where necessary. And we need more than token penalties for deliberate violations.”

The best way to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. Decentralizing power is a crucial aspect of this process.

Due diligence is required from all of us to make sure that the Internet remains a free form of communication without bounds. We must help protect the largest library ever created so that it will remain accessible to all, making sure that it does not turn into a spiders web.

Journey From the Psychology of Evil to the Psychology of Heroism

Source: http://chycho.blogspot.ca/2013/10/how-to-protect-ourselves-on-social.html

No feedback yet

Voices

Voices

  • By Kathy Kelly, World BEYOND War The Biblical Book of Job chronicles a string of catastrophes relentlessly plaguing the main character, Job, who loses his prosperity, his home, his health, and his children. Eventually, an agonized Job curses his own…
  • LifeSiteNews The president-elect praised the former Democratic congresswomen and said she'll bring a 'fearless spirit' to the intelligence community as a member of his cabinet. President-elect Donald Trump announced Wednesday that he would nominate…
  • Paul Craig Roberts There’s many a slip between cup and lip I have been speaking with MAGA Americans and, as I suspected, there is little comprehension of the vast impediments to renewal. The swamp that Trump is to drain is entrenched and…
  • PDF's for Einstein, Dr. Rosaly M. C. Lopes, Darwin, Lorenzo Langstroth, Marie Curie, Shakespeare & Many More! by Tracy Turner Shakespeare, Curie, Orwell, Hemingway, Dostoevsky, Lopes, Einstein Dr. Rosaly Lopes Director of the Planetary Science…
  • RT.com Speaking just one day after the Republican candidate's US election victory, the Russian president explained Moscow's position on a range of global issues Russian President Vladimir Putin addressed pressing global issues at Sochi's annual Valdai…
  • The Pretender's Magic is their diversity in musical range. Mystifying the sultry blues of "Blue Sun" to the punk-infused anthems like "Brass in Pocket," the band slips into these heterogeneous grooves with greased skids. Chrissie's wide-ranging influences pair with The Pretenders, evolving while retaining core elements of its personality. The eclectic portfolio will consistently deliver a "new" live surprise. Sorry, but there is no raucous Lynyrd Skynyrd "Play Free Bird" here. Everybody has a favorite, many favorites. The diversity of the songs makes every new and old fan curious to learn more about one aspect or another of the band's expression.
  • By Joe Granville When the formula is calculated, it yields a very small probability—around 1.45 × 10⁻¹⁴, or 0.00014%. This result suggests that, mathematically, Trump's victory is extremely unlikely under these assumptions. A centrist in the Tea Party,…
  • by Ellen Brown Buncombe County North Carolina – damage after Hurricane Helene floods. NCDOTcommunications, CC BY 2.0 https://creativecommons.org/licenses/by/2.0, via Wikimedia Commons Asheville, North Carolina, is known for its historic architecture,…
  • By: Brett Redmayne-Titley "When injustice becomes law, resistance becomes duty." It is not inaccurate to determine that we, the remaining moral world, are in reality also Palestinian by metaphor. Likewise, we are all individually disenfranchised,…
  • Paul Craig Roberts The Democrats are set to steal the election. They have everything in place except enough votes to hide their theft. Watch the video of the Trump Grand Finale, listen to the speeches by Robert Kennedy and Tucker Carlson. Marvel at the…
November 2024
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

  XML Feeds

multiblog platform
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi