Saturday 15 June 2013

How important is your privacy?

Windows
http://www.pcworld.com/article/2041044/how-to-protect-your-pc-from-prism.html

OS X
http://www.macworld.com.au/help/how-to-encrypt-your-email-98432/?utm_medium=email&utm_campaign=WWDC+wrap-up+Macs+in+business+Group+Test+Multi-room+audio+and+much+much+more&utm_content=WWDC+wrap-up+Macs+in+business+Group+Test+Multi-room+audio+and+much+much+more+CID_8d9795981e5b2e1f59213e3ba178128b&utm_source=Email%20marketing%20software&utm_term=Find%20out#.UbvlGRBhiK2 / Windows OS X PV Mac Macintosg US U.S. USA U.S.A. United States Amaerica government spy spying emails email searches search Skype calls electronic communications Americans programme program PRISM reports Web AOL Apple Facebook Google Microsoft Skype PalTalk Yahoo YouTube participated perhaps unwittingly Dropbox report NSA National Security Agency direct access servers owned companies deny denial denied unaware NSA’s spying simply turned a blind eye The Guardian The Washington Post data covered email video voice chat video photos voice-over-IP voice over IP VoIP chats file transfers social networking details data report accurate government listen in on virtually electronic communication national security fight domestic terrorism government intrusion deeply distrusted advice no guarantee tips your PC PRISM proof belief  security world resources attacker secrets hack hacker hacking hacked unearthed Arab Spring movement U.S. government political uncertainty encrypting personal communications liberate Avoid using popular Web services Microsoft Bing Google search engines DuckDuckGo site track or store your searches store anonymized searches improve results some degree of confidence tracked online Post Guardian program is expanding ditch ditching ditched Gmail Hotmail account deleting accounts sites laying low skipping around services Mapquest for maps stop social networking person to person person-to-person communications Web www World Wide Web surfing Chrome, Internet Explorer Safari Firefox Opera PCWorld review Tor browser slow anonymous browsing Internet ditch your smartphone Apple Google Microsoft monitored safest avoid being tracked services your location providing better search results services BlackBerry company acceded to requests allow foreign governments access to its data paranoiacs ditch feature phones amount of information captured much smaller encryption communication communicate communicating  electronically electronic conversations encrypt hard drive existing files Alex Castle TrueCrypt tools secure securing your files monitor monitoring encryption protection connection your email provider messages stored cached archived email messages use using secure email service Internet accessed theoretically anyone Silent Circle pretty good protection public key protection encryption PGP creator Paul Zimmermann profess offer secure voice email voice communications dedicated connections between subscribed devices virtual private network VPN encrypted tunnel to another server which then acts as an agent on your behalf Eric Geier performance latency to funnel communications back forth solutions servers based European Union EU security layered upon the encryption applied other solutions communications private hotspot IP address location sniff your PC Preston Gralla story nailing down older apps block malware anti malware ant-malware antimalware solutions tested Trojan worm sneaks defence defense secure password knot passphrase 1Password LastPass Schneier scheme passphrase random words phrases easily guessed dictionary word /