http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/

Top four anti-surveillance apps
By Violet Blue for Zero Day |    June 8, 2013 -- 02:00 GMT (19:00 PDT)

Did they or didn't they? That's the question at the end of this week's 
ground-shaking news that two highly classified programs reveal the U.S. 
government has been spying on its citizens behind closed doors for years, made 
public in leaks as reported by Guardian U.K.

One NSA program brought to light this week harvests phone records via Verizon. 
The second program is called Prism, in which the NSA data-mines user 
information directly from nine Internet giants, including Apple, Facebook, 
Google, Microsoft and Skype.

No one has contested the Verizon data/surveillance exchange deal. President 
Obama today confirmed the existence of both NSA programs and acknowledges 
Prism, tech companies Google and Facebook issued carefully-worded statements 
with each company saying it had never head of Prism.

If the NSA is getting their intel without our knowledge or consent straight 
from the tap, there's nothing we can do to protect ourselves. Except maybe yell 
at them really loud. Just like in a classic scary movie, the calls are actually 
coming from inside the house.

Add to this the element of outside information seekers: data dealers who work 
to make a buck by scraping sites, exploiting security holes, or making direct 
data sales with the very same companies alleged to be part of Prism. Now we can 
extend the horror film analogy, where we find out (always too late!) that the 
serial killer is also the babysitter.

Even against odds, I felt that at the very least we can make someone's job a 
little bit harder.

Hence the title of this post. I asked not just one, but several hackers who 
work professionally in high-level security environments what the best 
anti-surveillance, pro-privacy phone apps are. What is on their phones? What 
should be on mine?

After they finished laughing at my question (especially in light of the Prism 
revelations), I got solid answers. You can tell me what I left out in the 
comments, but I only wanted to post apps that were tested and in use by people 
whose jobs (or more) depend on personal communication security.

Keep in mind that the sudden activation of encryption tools can draw attention 
to you, when before there might have been none.

However, now might be a good time to take advantage of the fact that in the 
middle of this news storm, suddenly lots of people are going to be trying out 
anti-surveillance software.

Most recommended: Text Secure and Red Phone by Whisper Systems (Android only; 
iOS in development).

Both apps are free and open source, "enabling anyone to verify its security by 
auditing the code."

1. Text Secure (play.google.com)

TextSecure encrypts your text messages over the air and on your phone. It's 
almost identical to the normal text messaging application, and is just as easy 
to use. 

TextSecure provides a secure and private replacement for the default text 
messaging app. All messages are encrypted locally, so if your phone is lost or 
stolen, your messages will be safe.

Messages to other TextSecure users are encrypted over the air, protecting your 
communication in transit. TextSecure is the only Android private SMS/MMS 
messenger replacement that uses open source peer-reviewed cryptographic 
protocols to keep your messages safe.

Rather than simply pretending to hide your texts by putting them in another 
place, TextSecure uses cryptography to ensure that they remain truly secure.

2. Red Phone (play.google.com)

RedPhone provides end-to-end encryption for your calls, securing your 
conversations so that nobody can listen in.

RedPhone uses your normal phone number to make and receive calls, so you don't 
need yet another identifier. Use the default system dialer and contacts apps to 
make calls as you normally would.

RedPhone will give you the opportunity to upgrade to encrypted calls whenever 
the person you're calling also has RedPhone installed.

RedPhone calls are encrypted end-to-end, but function just like you're used to. 
Uses wifi or data, not your plan's voice minutes.
Second place must-haves: Tor apps Onion Browser (Apple iOS) and Orbot 
(Android), or running your own VPN.

Both Onion Browser and Orbot make use of the Tor Project, but they each 
function slightly differently (with privacy protection limitations falling on 
the Apple side of the tree due to the closed nature of iOS).

3. Onion Browser (Apple iTunes)

Onion Browser is a minimal web browser that encrypts and tunnels web traffic 
through the Tor onion router network and provides other tools to help browse 
the internet while maintaining privacy.

Websites do not see your real IP address. Your connection is encrypted before 
it leaves your device, providing protection against snooping by ISPs or people 
who share a WiFi connection with you.

Tunnel bypasses restrictive firewalls: you can access the entire Internet from 
behind ISPs or corporate connections, or when inside countries that practice 
online censorship. Access websites on the "dark net" of anonymous .onion web 
sites, only accessible in the Tor network.

User-Agent spoofing: hides the fact that you are using an iPhone/iPad from 
websites you visit. Ability to block third party cookies or all cookies. Can 
change IP address and clear cookies/history/cache in one button.

CHINA/IRAN NOTE: Due to online censorship techniques using deep-packet 
inspection (DPI), this app does NOT currently function in China or Iran.
4. Orbot (play.google.com)

Orbot is a "proxy app that empowers other apps to use the internet more 
securely. It uses Tor to encrypt Internet traffic and hide it by basically 
bouncing through a series of computers around the world; it is the official 
version of the Tor onion routing service for Android.

(...) instead of connecting you directly like VPNs and proxies. This process 
takes a little longer, but the strongest privacy and identity protection 
available is worth the wait.

Use with Orweb, the most anonymous way to access any website, even if it’s 
normally blocked, monitored, or on the hidden web. Use Gibberbot with Orbot to 
chat confidentially with anyone, anywhere for free.

Orbot can be configured to transparently proxy all of your Internet traffic 
through Tor. You can also choose which specific apps you want to use through 
Tor.

Any installed app can use Tor if it has a proxy feature, using the settings 
found here. Check out our fun, interactive walkthrough.
The thing to know about Tor-based projects is that they will slow down your 
response times, and for many — privacy or not — this is a dealbreaker.

To Tor or not to Tor, everyone agreed that running a VPN (Virtual Private 
Network) of some kind is a smart thing to do. Read Why You Should Start Using a 
VPN (and How to Choose the Best One for Your Needs).

Yes, there is so much more you can do.

A good place to start is The Electronic Frontier Foundation (EFF) Surveillance 
Self-Defense Guide. If you're low on time to read it all, skip to What Can I Do 
To Protect Myself?

The EFF now has a two-click form — Massive Spying Program Exposed — where 
visitors can instantly send emails to their representatives calling for a full 
Congressional investigation saying, "It's time for a full accounting of 
America's secret spying programs—and an end to unconstitutional surveillance."

Update Saturday, June 8, 2:34am PST to include footnote: 

These apps are good to protect you from many types of invasive attacks, but 
they won't protect against skilled attackers (such as powerful, unethical 
governments with unrestrained technical access). It's important to know that 
mobile devices - in this instance mobile phones, specifically - are generally 
weak platforms. If you're a person who's at-risk, don't bet your life on any 
app - or any phone.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at [email protected] or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to