« Increasing Data Collection and Surveillance in the North American HomelandGuantanamo Hunger Striking Continues »

How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations

October 21st, 2013

via chycho

I. What’s Going On

Online, we are both a product for corporations and a person of interest to governments (2, 3).

Corporations are taking advantage of these times by changing their privacy policies so that they can track us, use us, and sell us whatever their algorithms decide that we need or want based on data they have acquired about our movements, contacts, desires, fantasies, or kinks. Governments on the other hand are using our data to make sure that we will never acquire enough power to change any policies that we deem to be a threat to our happiness, livelihood, or survival. In essence, we are at war with these organizations and we should act as such:

“…this is truly unprecedented in history. And what we’re seeing is secrecy and surveillance are completely subverting security and liberty, not just in the United States, but for many, many citizens around the world.”


This corporate misconduct and government surveillance is threatening the internet (2, 3), the original purpose of which was to create an “open architecture networking” system where “a globally interconnected set of computers” would allow “everyone” to “quickly access data and programs from any site”. So we have to be careful out there, at least until we have neutralized this threat.

Jacob Appelbaum: NSA's FoxAcid/Quantum Programs "Like the Military Occupation of Entire Internet"

Additional info at: “How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID”

Further information regarding this subject available through the following two videos featuring Jacob Appelbaum in a Q&A workshop discussing computer security, mobile phone security, cellphone forensics, and state repression and surveillance.

Jacob Appelbaum (Part 1/2) Digital Anti-Repression Workshop - April 26 2012

Jacob Appelbaum (Part 2/2) Digital Anti-Repression Workshop - April 26 2012

II. How to Protect Our Privacy

As for how we can protect ourselves from these intrusions into our privacy? Aside from everything mentioned above in Jacob Appelbaum’s Q&A workshop, which included some brief remarks about open-source software and an in-depth discussion on maintaining anonymity by using the Tor Network and how to secure your cell phone and computer, the Electronic Frontier Foundation (EFF) has provided a 12 step program - originally publish in 2002 and still very relevant today - with some suggestion on how we can protect our online privacy:

  1. Do not reveal personal information inadvertently.
  2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
  3. Keep a "clean" e-mail address.
  4. Don't reveal personal details to strangers or just-met "friends".
  5. Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer.
  6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
  7. Do not reply to spammers, for any reason.
  8. Be conscious of Web security.
  9. Be conscious of home computer security.
  10. Examine privacy policies and seals.
  11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom.
  12. Use encryption!

The dangers of providing too much personal information cannot be over emphasized. It is up to us to make sure that we are protected not only from identity theft but also from private data mining organizations and governments that have developed massive data collection systems.

Privacy is an Illusion: Alessandro Acquisti at TEDxMidAtlantic

An open Internet is crucial for our development and growth as a collective, but this social networking can also occur without us providing sensitive information about our identity - Have you ever had a nickname that you loved? Have you ever wanted to create a nickname that represented who you have become? Did you ever want to be younger or older then you are? Did you ever want to have a different birth sign? - The Internet provides a great opportunity for us to create our second persona that will live in parallel with us, expanding our social network beyond our wildest dreams.

Through the Net, we can visit and live anywhere we want, and be anyone we want. The Internet is where we reside, it is our home, so until Social Networking Websites give us the option to choose the Internet as our hometown, we should travel the world. Keep in mind that even an alternative spelling of our name, a different birth day, or a fake address can help protect our anonymity.

III. How to Improve Our Society

By protecting our privacy we can diminish the power that these organizations have over us and ensure that we will not be mistreated:

“We need a comprehensive data privacy law. This law should protect all information about us, and not be limited merely to financial or health information. It should limit others' ability to buy and sell our information without our knowledge and consent. It should allow us to see information about us held by others, and correct any inaccuracies we find. It should prevent the government from going after our information without judicial oversight. It should enforce data deletion, and limit data collection, where necessary. And we need more than token penalties for deliberate violations.”

The best way to stop these entities is to make fundamental changes to the system itself. This requires us to be educated in the methods in which we are controlled, allowing us to understand the problems that exist in the current system so we can avoid its pitfalls. Placement at the highest levels in government of ethical civil servants that are accountable to the people and regard the privacy of individuals as the most important aspect of their duties is an essential starting point. Decentralizing power is a crucial aspect of this process.

Due diligence is required from all of us to make sure that the Internet remains a free form of communication without bounds. We must help protect the largest library ever created so that it will remain accessible to all, making sure that it does not turn into a spiders web.

Journey From the Psychology of Evil to the Psychology of Heroism

Source: http://chycho.blogspot.ca/2013/10/how-to-protect-ourselves-on-social.html

No feedback yet

Voices

Voices

  • By David Swanson, World BEYOND War Switzerland got that way through NEUTRALITY Remarks at Neutrality Colloquium: A Call to Action for Active Neutrality & World Peace, June 26-27, 2025 in Geneva, Switzerland. I grew up in a town in the United States that…
  • Fred Gransville I. The Fluoride Question For decades, fluoride has had an uncontested official story: it is a beneficial, even benevolent substance—vital to healthy teeth. In toothpaste tubes to water supplies, fluoride has been presented as a dental…
  • Tracy Turner #SCOTUScorruption #FascistAmerica #EndCitizensUnited Bush started it. Obama enabled it. Trump perfected it. And the Court? It never checked power—it built it. I. Opening Jab: The Judicial Illusion "They wear robes to appear impartial. But…
  • Dr. Vladislav B. Sotirovic Carl von Clausewitz The focal questions about war In dealing with both theoretical and practical points of view about war, at least six fundamental questions arise: 1) What is war?; 2) What types of war exist?; 3) Why do wars…
  • By Tracy Turner What begins as an assault on immigrants ends as an assault on the Constitution itself. The Constitution Is Not a Loophole Come the summer of 2025, the sitting president of America is pushing the limits of constitutional tolerance yet…
  • By Tracy Turner I. The Faustian Bargain “Kids can’t eat pronouns. Families can’t pay bills with gender-neutral bathrooms.” Somewhere between Occupy Wall Street and “Latinx Heritage Month,” the Democratic Party lost the plot—and with it, the nation. In…
  • Fred Gransville 1. Russian Summer Offensive Advances on Multiple Axes Cutting-edge drone warfare Russia is deploying "unjammable" fiber-optic–linked drones across Donbas, Sumy, and Kharkiv, allowing coordinated tactical advances. These UAVs have enabled…
  • Fred Gransville I. Introduction The Lungs of the Earth Are Being Stabbed from All Sides In June 2025, the Amazon and Orinoco basins—twin arteries of South America's ecological soul—are hemorrhaging under a coordinated assault. These are not isolated…
  • Fred Gransville How Politicians and Corporations Are Sacrificing the Arctic—And Our Future—For Profit "Thousands of tired, nerve-shaken, over-civilized people are beginning to find out that going to the mountains is going home; that wildness is a…
  • by Dr. Althea Mentes I. Introduction In the ever-evolving pharmacopeia of modern medicine, few substances have traveled from criminalized taboo to mainstream therapeutic darling as rapidly as cannabinoids. Once dismissed as the intoxicants of the…
July 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31    

  XML Feeds

CMS software
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi