How to reduce government spying on you
December 12, 2018 — May 27, 2020
Many people today are living in surveillance states with weak citizen protection and persecution of citizens who blow the whistle on state wrongdoing, rapid erosion of privacy, criminalization of failure to turn state informer, or even counselling resistance, and attacks on the free press, all without oversight by the public.
That’s Australia. Things are worse in Yemen, India, China, Russia, Saudi Arabia, etc. I’ll go ahead and say that I think that on balance strong encryption is a good idea to have in society as one bulwark against surveillance societies and also for just plain safety of business communication. In practice, we all use consumer-grade encryption, even the army. There are some interesting options for solidarity in software designers, as Eleanor Saitta points out, or you might say, design challenges stringent enough that our quisling tech sector will be unlikely to rise to them.
🏗 link to particular risks for each state.
For any of these anti-journalist states, you need hardcore security.
1 Firstly avoid corporate surveillance
Patrick Merer, How to use Facebook if you are a repressive regime. Bear in mind even notionally democratic regimes Facebook provides your data to the police without warrants.
2 What you might use to get around this
EFF’s Surveillance Self Defense course is a good starting point.
They talk you through the theory and practice of different types of security, modeling the risks you face and trying to minimize them for different scenarios.
Maciej Cegłowski observes, discussing the related problem of securing political campaigns:
Campaigns have small budgets and operate in an unusually hostile environment. Not only are there people whose job it is to attack campaigns, but those people enjoy their work, get a government pension when they retire, and live happy, fulfilled professional lives.
I presume (hope?) he’s talking about hostile foreign actors but who knows these days?
OK, there is a lot to do, but let’s start with the basics. First, minimize your exposure to corporate surveillance.
Next, you probably want to lock down your computer. Maybe lock down one a little bit and also get a second, hardcore locked-down computer for your secret stuff.
3 DNS
You need to fix this to avoid getting profiled in the first place. Constantly leaking info if you don’t kick it in the pants. See DNS servers.
5 SSH
There’s a lot of fiddling in ssh.
To secure it in particular, you need to beat 1024-bit DH keys sigh. NSA is reading your comms with keys shorter than 2048 bits.
researchers Alex Halderman and Nadia Heninger presented compelling research suggesting that the NSA has developed the capability to decrypt a large number of HTTPS, SSH, and VPN connections using an attack on common implementations of the Diffie-Hellman key exchange algorithm with 1024-bit primes. […] In this post, we present some practical tips to protect yourself from the surveillance machine, whether you’re using a web browser, an SSH client, or VPN software.
There are more steps to secure ssh.
5.1 USB
USB is another security nightmare. See e.g. Badusb Malware: O.M.G cable (explanation for the busy), Poisontap
, lanturtle
usbarmory
… One imagines that if the DIY world can so readily destroy you via USB then the state actors are pretty good at it. Oh, Thunderbolt is broken too. Essentially, peripherals are a disaster.
Countering such attacks? USB condoms such as USG
could probably help if you need to use USB, which you do. That is, if you don’t mind carrying a large, inconvenient device whose job is to reduce the functionality and speed of your peripherals. Few of us feel like we are likely enough to be targeted that this is worth doing, although as the cost of these attacks drops lower, that might change.
6 Hardened Desktop OS
See hardened OSes.
7 Hardened smartphones
See hardened smartphones.
8 Dazzle camouflage
The future will ruin fashion! One day vintage will mean something different.
Confuse automated surveillance by being weird. (while at the same time attracting non-automated surveillance.) I have mixed feelings about this. Effective? Practical? 🤷♂ Fun? 🤘
9 Incoming
How can you keep your data secret if a state actor is compromising the very hardware of the servers that store your information, or just network security in general is a disaster because of terribly and ubiquitous decision. NB even if you don’t buy the Bloomberg article, there’s no reason to suppose it won’t eventually be true.
- NSA’s own Mac security advice
- Glitter nail polish for laptop security.
- Don’t leave your computer unattended, because things like PoisonTap mean that anyone who can get to your USB port can log on to your websites.
- Do you really need Bluetooth? It’s probably not secure, turn it off if you don’t.
- Prism break is a chaotic jumble of solutions for secure communication. Excellent reference, although it really needs to incorporate some idea of how popular their suggested solutions are; after all, most of these things are only of any damn use if your friends also use ’em.
- Quick guide to the basics of encryption (or how about one with stick figures)
- Without a Trace: How to Take Your Phone Off the Grid – The Markup