« Increasing Data Collection and Surveillance in the North American HomelandGuantanamo Hunger Striking Continues »

How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations

October 21st, 2013

via chycho

I. What’s Going On

Online, we are both a product for corporations and a person of interest to governments (2, 3).

Corporations are taking advantage of these times by changing their privacy policies so that they can track us, use us, and sell us whatever their algorithms decide that we need or want based on data they have acquired about our movements, contacts, desires, fantasies, or kinks. Governments on the other hand are using our data to make sure that we will never acquire enough power to change any policies that we deem to be a threat to our happiness, livelihood, or survival. In essence, we are at war with these organizations and we should act as such:

“…this is truly unprecedented in history. And what we’re seeing is secrecy and surveillance are completely subverting security and liberty, not just in the United States, but for many, many citizens around the world.”


This corporate misconduct and government surveillance is threatening the internet (2, 3), the original purpose of which was to create an “open architecture networking” system where “a globally interconnected set of computers” would allow “everyone” to “quickly access data and programs from any site”. So we have to be careful out there, at least until we have neutralized this threat.

Jacob Appelbaum: NSA's FoxAcid/Quantum Programs "Like the Military Occupation of Entire Internet"

Additional info at: “How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID”

Further information regarding this subject available through the following two videos featuring Jacob Appelbaum in a Q&A workshop discussing computer security, mobile phone security, cellphone forensics, and state repression and surveillance.

Jacob Appelbaum (Part 1/2) Digital Anti-Repression Workshop - April 26 2012

Jacob Appelbaum (Part 2/2) Digital Anti-Repression Workshop - April 26 2012

II. How to Protect Our Privacy

As for how we can protect ourselves from these intrusions into our privacy? Aside from everything mentioned above in Jacob Appelbaum’s Q&A workshop, which included some brief remarks about open-source software and an in-depth discussion on maintaining anonymity by using the Tor Network and how to secure your cell phone and computer, the Electronic Frontier Foundation (EFF) has provided a 12 step program - originally publish in 2002 and still very relevant today - with some suggestion on how we can protect our online privacy:

  1. Do not reveal personal information inadvertently.
  2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
  3. Keep a "clean" e-mail address.
  4. Don't reveal personal details to strangers or just-met "friends".
  5. Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer.
  6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
  7. Do not reply to spammers, for any reason.
  8. Be conscious of Web security.
  9. Be conscious of home computer security.
  10. Examine privacy policies and seals.
  11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom.
  12. Use encryption!

The dangers of providing too much personal information cannot be over emphasized. It is up to us to make sure that we are protected not only from identity theft but also from private data mining organizations and governments that have developed massive data collection systems.

Privacy is an Illusion: Alessandro Acquisti at TEDxMidAtlantic

An open Internet is crucial for our development and growth as a collective, but this social networking can also occur without us providing sensitive information about our identity - Have you ever had a nickname that you loved? Have you ever wanted to create a nickname that represented who you have become? Did you ever want to be younger or older then you are? Did you ever want to have a different birth sign? - The Internet provides a great opportunity for us to create our second persona that will live in parallel with us, expanding our social network beyond our wildest dreams.

Through the Net, we can visit and live anywhere we want, and be anyone we want. The Internet is where we reside, it is our home, so until Social Networking Websites give us the option to choose the Internet as our hometown, we should travel the world. Keep in mind that even an alternative spelling of our name, a different birth day, or a fake address can help protect our anonymity.

III. How to Improve Our Society

By protecting our privacy we can diminish the power that these organizations have over us and ensure that we will not be mistreated:

“We need a comprehensive data privacy law. This law should protect all information about us, and not be limited merely to financial or health information. It should limit others' ability to buy and sell our information without our knowledge and consent. It should allow us to see information about us held by others, and correct any inaccuracies we find. It should prevent the government from going after our information without judicial oversight. It should enforce data deletion, and limit data collection, where necessary. And we need more than token penalties for deliberate violations.”

The best way to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. Decentralizing power is a crucial aspect of this process.

Due diligence is required from all of us to make sure that the Internet remains a free form of communication without bounds. We must help protect the largest library ever created so that it will remain accessible to all, making sure that it does not turn into a spiders web.

Journey From the Psychology of Evil to the Psychology of Heroism

Source: http://chycho.blogspot.ca/2013/10/how-to-protect-ourselves-on-social.html

No feedback yet

Voices

Voices

  • Tracy Turner The DMCA Weaponized: The Dark Face of Web Censorship discusses how the Digital Millennium Copyright Act (DMCA), originally written to protect intellectual property, has increasingly been weaponized to silence dissent, stifle opposition, and…
  • By Tracy Turner In the shadowy lanes of global intelligence, wars are no longer fought with bullets and bombs but with backdoors and algorithms. Israel's Mossad, with its unmatched skills, has transformed the battlefield into an invisible war zone where…
  • Tracy Turner Netanyahu addresses AIPAC, underscoring Israel's outsized influence on U.S. foreign policy. Critics argue America's 'special relationship' with Israel resembles a tail wagging the dog—where Zionist lobbies dictate Washington's decisions.…
  • Police and Prisons Belong in Museums North America, What to do, Why End War, World By David Swanson, World BEYOND War, March 25, 2025 https://worldbeyondwar.org/police-and-prisons-belong-in-museums/ I want to recommend three new books about abolishing…
  • Robert David DarkBERT & DarkBART: The AI That Hunts Criminals in the Dark Web’s Shadows—Before They Strike. Artificial intelligence (AI) has revolutionized many sectors, ranging from enhancing customer service to maximizing medical diagnoses. Maybe one…
  • by Brian Shilhavy [1] The words of Jesus Christ, as recorded in the last book of the Bible in the prophetic book of Revelation, state: I know your afflictions and your poverty—yet you are rich! I know the slander of those who say they are Jews and are…
  • Cathy Smith Zionist propaganda and proponents of pro-Zionist ideology have intervened in global politics, which is referred to as Crypto-Zionism. Proponents of this movement have employed technology, media, and international alliances to achieve their…
  • By Mark Aurelius Has there ever been a word more super-charged, politicized, and over-bloated with frothing and rabid connotation, in our modernity, than terms as hate, hatred, hate speech or acts of hate? Perhaps there are some, but one’s noggin can be…
  • Cathy Smith With every passing moment of the United States settling into the post honeymoon phase of Donald Trump’s second presidential stint, one thing is becoming exceedingly evident; his guidance has been steering the nation towards the brink of…
  • Paul Craig Roberts interviewed On Target with Larry Sparano In the United States my generation began reading Shakespeare’s plays in high school. In universities you encountered Shakespeare in the core curriculum. When core curriculums were abolished,…
March 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

  XML Feeds

CMS software
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi