Think Like CDT: How to Protect Your Privacy

Linked by Paul Ciano


Taking control of our personal data is often easier said than done. It can be overwhelming to think about how much data we generate each day, whether at work or just living our lives, and sharing some of this information is a non-negotiable part of modern life. Attempting to stop, let alone control this process, can feel daunting or hopeless, even for people in the privacy weeds.

It is a fool’s errand to come up with a standard set of tips for how best to protect your privacy. Even among people working at CDT, we each care about our privacy in different ways and manage our digital lives quite differently as a result. But in the spirit of Data Privacy Day, the staff at CDT wanted to offer a list of ideas for where to start, based on what we personally do to protect our privacy.

Pretty good list.

Barcelona Government Officially Endorses Tor-Based Whistleblower Platform

Linked by Paul Ciano

Cory Doctorow:

Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a Globalleaks repository, with their anonymity protected by Tor.

These best-of-breed tools for anonymity and accountability have often been the subject of government complaints and threatened crackdowns, but in Barcelona, the city government has endorsed the Complaint Box, advising Barcelonans who know about corruption to safely report it by using the platform. It’s the first time a municipal government has endorsed Tor.

Tor at the Heart: OnionShare

Linked by Paul Ciano

Awesome application.

Micah Lee:

In August 2013, David Miranda was detained for nine hours and searched at Heathrow Airport in London while he was trying to board a plane back home to Rio de Janeiro. Working on a journalism assignment for the Guardian, he was carrying an encrypted USB stick that contained classified government documents. When I first learned about this story, I knew there must be safer ways to move sensitive documents across the world than physically carrying them, one that didn’t involve putting individual people at risk from border agents and draconian “terrorism” laws that are used to stifle award-winning journalism.

Continue reading Tor at the Heart: OnionShare

Secure, Private, Cross-Platform Communication with Open Whisper System’s Signal (Part 2)

We have described the context that engendered the need for a new privacy and security-focused communications solution. Now, we need to discuss the result and how to use it.

Let us talk about Signal.

Continue reading Secure, Private, Cross-Platform Communication with Open Whisper System’s Signal (Part 2)

Giving Back: Become an Open Source Contributor

We live in interesting times. In the open source community, individuals give their time to create and maintain many of the technologies that digital citizens rely upon. These products are used for a variety of reasons. They help us create content, secure our communications, and power our computers.

Continue reading Giving Back: Become an Open Source Contributor

NSA Targets the Privacy-Conscious

Linked by Paul Ciano

Cory Doctorow:

According to the story, the NSA targets anyone who searches for online articles about Tails — like this one that we published in April, or this article for teens that I wrote in May — or Tor (The Onion Router, which we’ve been posting about since 2004). Anyone who is determined to be using Tor is also targeted for long-term surveillance and retention.

I have known that this story was coming for some time now, having learned about its broad contours under embargo from a trusted source. Since then, I’ve discussed it in confidence with some of the technical experts who have worked on the full set of Snowden docs, and they were as shocked as I was.

One expert suggested that the NSA’s intention here was to separate the sheep from the goats — to split the entire population of the Internet into “people who have the technical know-how to be private” and “people who don’t” and then capture all the communications from the first group.

An excellent English version of the original story is available here.