How to block “Big Brother” from spying on you

Or, you could eat beetroot and garlic for a healthier comm channel, and take a shower if you feel your comms have been infiltrated ...
 
I've used Signal over the last year for confidential conversations.
Seemingly good so far
 
Last edited:
Telegram works for me.

normal conversation in whatsapp, but the moment things get more private move to whatsapp, its just better :)
 
If you have a bank account, own a cellphone or landline, have a laptop... You can not avoid being spied on!
 
Tor is pretty much the only option. Given that the NSA has great difficulties in identifying people using Tor, I can't imagine that our government has such facilities.

Who you contact is often more useful that what you say.
 
Tor is pretty much the only option. Given that the NSA has great difficulties in identifying people using Tor, I can't imagine that our government has such facilities.

Who you contact is often more useful that what you say.

As per Edward Snowden's leaks, people using Tor were easily hacked and tracked
 
As per Edward Snowden's leaks, people using Tor were easily hacked and tracked

I'm going to need a source on that.

The leaks I'm aware of showed that Tor was a massive headache for the NSA. The slides from their own presentation were leaked, along with all their attempts to identify users.

EDIT:

But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.

From: http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
 
Telegram works for me.

normal conversation in whatsapp, but the moment things get more private move to whatsapp, its just better :)
I will rather use Telegram, than whatsapp, for a little more privacy. :D
 

All of that relies on Firefox vulnerabilities. The redirection and impersonation sends the user the a certain server, from where the exploit is downloaded. If the exploit does not work, then their entire system is moot.

It is also easily possible to confine any software to prevent it from accessing the rest of the system, and perform audits on the changes made by it.

Tor is secure as far as we know. There is a reason why searching for distributions such as TAILS places you on the NSA watchlist.
 
Top
Sign up to the MyBroadband newsletter