« Increasing Data Collection and Surveillance in the North American HomelandGuantanamo Hunger Striking Continues »

How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations

October 21st, 2013

via chycho

I. What’s Going On

Online, we are both a product for corporations and a person of interest to governments (2, 3).

Corporations are taking advantage of these times by changing their privacy policies so that they can track us, use us, and sell us whatever their algorithms decide that we need or want based on data they have acquired about our movements, contacts, desires, fantasies, or kinks. Governments on the other hand are using our data to make sure that we will never acquire enough power to change any policies that we deem to be a threat to our happiness, livelihood, or survival. In essence, we are at war with these organizations and we should act as such:

“…this is truly unprecedented in history. And what we’re seeing is secrecy and surveillance are completely subverting security and liberty, not just in the United States, but for many, many citizens around the world.”


This corporate misconduct and government surveillance is threatening the internet (2, 3), the original purpose of which was to create an “open architecture networking” system where “a globally interconnected set of computers” would allow “everyone” to “quickly access data and programs from any site”. So we have to be careful out there, at least until we have neutralized this threat.

Jacob Appelbaum: NSA's FoxAcid/Quantum Programs "Like the Military Occupation of Entire Internet"

Additional info at: “How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID”

Further information regarding this subject available through the following two videos featuring Jacob Appelbaum in a Q&A workshop discussing computer security, mobile phone security, cellphone forensics, and state repression and surveillance.

Jacob Appelbaum (Part 1/2) Digital Anti-Repression Workshop - April 26 2012

Jacob Appelbaum (Part 2/2) Digital Anti-Repression Workshop - April 26 2012

II. How to Protect Our Privacy

As for how we can protect ourselves from these intrusions into our privacy? Aside from everything mentioned above in Jacob Appelbaum’s Q&A workshop, which included some brief remarks about open-source software and an in-depth discussion on maintaining anonymity by using the Tor Network and how to secure your cell phone and computer, the Electronic Frontier Foundation (EFF) has provided a 12 step program - originally publish in 2002 and still very relevant today - with some suggestion on how we can protect our online privacy:

  1. Do not reveal personal information inadvertently.
  2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
  3. Keep a "clean" e-mail address.
  4. Don't reveal personal details to strangers or just-met "friends".
  5. Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer.
  6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
  7. Do not reply to spammers, for any reason.
  8. Be conscious of Web security.
  9. Be conscious of home computer security.
  10. Examine privacy policies and seals.
  11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom.
  12. Use encryption!

The dangers of providing too much personal information cannot be over emphasized. It is up to us to make sure that we are protected not only from identity theft but also from private data mining organizations and governments that have developed massive data collection systems.

Privacy is an Illusion: Alessandro Acquisti at TEDxMidAtlantic

An open Internet is crucial for our development and growth as a collective, but this social networking can also occur without us providing sensitive information about our identity - Have you ever had a nickname that you loved? Have you ever wanted to create a nickname that represented who you have become? Did you ever want to be younger or older then you are? Did you ever want to have a different birth sign? - The Internet provides a great opportunity for us to create our second persona that will live in parallel with us, expanding our social network beyond our wildest dreams.

Through the Net, we can visit and live anywhere we want, and be anyone we want. The Internet is where we reside, it is our home, so until Social Networking Websites give us the option to choose the Internet as our hometown, we should travel the world. Keep in mind that even an alternative spelling of our name, a different birth day, or a fake address can help protect our anonymity.

III. How to Improve Our Society

By protecting our privacy we can diminish the power that these organizations have over us and ensure that we will not be mistreated:

“We need a comprehensive data privacy law. This law should protect all information about us, and not be limited merely to financial or health information. It should limit others' ability to buy and sell our information without our knowledge and consent. It should allow us to see information about us held by others, and correct any inaccuracies we find. It should prevent the government from going after our information without judicial oversight. It should enforce data deletion, and limit data collection, where necessary. And we need more than token penalties for deliberate violations.”

The best way to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. Decentralizing power is a crucial aspect of this process.

Due diligence is required from all of us to make sure that the Internet remains a free form of communication without bounds. We must help protect the largest library ever created so that it will remain accessible to all, making sure that it does not turn into a spiders web.

Journey From the Psychology of Evil to the Psychology of Heroism

Source: http://chycho.blogspot.ca/2013/10/how-to-protect-ourselves-on-social.html

No feedback yet

Voices

Voices

  • Chris Spencer Draining the Swamp? Is that even possible? An Analysis of Dwight Eisenhower's and Joe Biden's Ominous Warnings, Assassinations of JFK, MLK, and RFK Eisenhower's farewell address was less a goodbye and more a dire warning wrapped in a…
  • Fred Gransville The More It Changes, the More It Stays the Same. "Rebellion" of Status Quo. Social Justice via Corporate Hegemony, Neoliberalism, Global Elites, Political Rhetoric, Think Tanks, Corporate State, Faux Democracy, Anti-Human Rights, Empire…
  • Janet Campbell Image via Freepic Starting a business in your community offers the unique opportunity to create something meaningful while building connections with those around you. It begins with understanding the needs of your area and aligning your…
  • Tracy Turner Modern Feminism Chants Equality Ad infinitum While Promoting Misandry A Cultural Revolution at the Hands of Covert Influence The very fabric of modern civilization is inculcated with the contributions of legions of people, mostly men, whose…
  • by Tracy Turner January 17 Update: Eaton/Palisades Fires $390+ Billion in Damage Do their red ties blind these politicians (Listed below), or are they not just enemies of California? Are they purveyors of a globalist agenda, a term used to describe a…
  • Paul Craig Roberts Dear Friends, I am as tired of challenging and distressing news as you. Today there is a treat instead. The treat is “the Tall Texan,” the American pianist Van Cliburn playing Tchaikovsky’s First Piano Concerto at the first Soviet…
  • by Ellen Brown North Dakota is staunchly conservative, having voted Republican in every presidential election since Lyndon Johnson in 1964. So how is it that the state boasts the only state-owned bank in the nation? Has it secretly gone socialist? No.…
  • Dr. Althea Mentes An Exposé of The Brain Police Mental health care has always been in conflict and dispute, struggling with deep-seated cultural perceptions, changing medical practices, and a growing tide of mighty industry profit. What is often…
  • By David Swanson Like the Republican Party whose senators will make Pete Hegseth the next U.S. Secretary of War, Hegseth is a bad joke. The Democratic minority in the horribly unrepresentative Senate is a joke you might hear at an amateur mic night.…
  • The real question in the 21st century is not "Are we living in a simulation?" but "Are we living in a prison?" Welcome to the Digital Matrix-a highly interconnected web of surveillance, AI, predictive analytics, and corporate greed that seeks to trap…
January 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

  XML Feeds

CMS software
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi