The modern (online) surveillance is not a question anymore. It’s not only government supported: large corporations play big role in it, using it to profit from data mining and big data analysis.
In favor of standing up against the surveillance you can:
- support organization that raise the awareness for privacy protection
- keep your communications secure and
- find ways to stay anonymous online.
Even when faced with the most ubiquitous of modern surveillance, there are ways to keep your communications away from prying eyes.
What you’ll have to teach yourself first is that how much the tech giants deny participating in this surveillance, the monitoring of emails, file transfers, photos, videos, chats, phone calls and even live surveillance of search terms can’t happen without their help. After all they rule the Internet and the mobile technologies, which are now part of our everyday life.
So, in order to protect your privacy online, you’ll need to stay anonymous and protect your communications. The three aspects that will fully protect your identity and online actions include:
Masking your browsing identity
To make it harder and even impossible to be tracked and snooped on, instead of letting your ISP freely analyze your traffic, you can protect yourself by masking your browsing identity, using anonymizing tool, such as Tor.
Tor will prevent your Internet connection being watched, from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Another way to protect your identity while browsing online is to use Virtual Private Network (VPN). VPNs extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Using a VPN increases privacy and security, by allowing only authenticated remote access using tunneling protocols and encryption techniques, thus preventing disclosure of private information.
What is more, if you want to avoid Google “spying on your searches” you can use an alternative, such as DuckDuckGo, Startpage or Ixquick which do not store user agents or IP addresses, share terms and do not set cookies on the searcher’s device by default or share information with third parties.
Protect your Email Communications and Data Sharing
Next thing we are all using the Internet for is email communication and data sharing.
The commercial providers not only will help the governments in the surveillance, but they will also use your the content of your messages to data mine you and throw you Ads that “may be of your interest”.
In fact, Google once described how their ads work:
“In Gmail, ads are related to the content of your messages. Our goal is to provide Gmail users with ads that are useful and relevant to their interests”.
So, do you really want anyone to be able to snoop around your private data?
What can you do, you may think. What if you could control where your data gets used and how? It would be perfect, right?
What you should consider when communicating over email is learning how to send and receive encrypted emails and store encrypted documents. Encryption is essential if you want to keep your private or corporate communications and data confidential. To protect and encrypt your email communication, you can use the techniques, such PGP or GPG, both to encrypt and decrypt messages.
If you find it too hard to learn how you can use these techniques, do not hesitate to try out our encrypted email services. We offer secure collaboration and email accounts. All data is stored exclusively in Switzerland and protected by a unique combination of terms of services, law, operational principles and technology. Secure Swiss Data will never put you under surveillance to sell your data or profile details, and there will be no advertisements. Enjoy the convenience of easy-to-use service without compromising freedom and openness.
Secure your phone calls
To secure your phone calls and messages, chats, data transfers, you should avoid the insecure solutions from Microsoft and Google and use services that offer encrypted communications.
Silent Circle makes it available to use end-to-end communication by using their product the Blackphone or their app the Silent Phone. By using the Silent Circle products, you can make and receive encrypted calls and send encrypted texts and files, both in the Silent World and outside of it.