How to best secure your data from the NSA
About one week ago, we were all given the information that the NSA can crack many of the encryption technologies in place today, using backdoors put into software at government request, a $250 million per year budge to encourage vendors to make its security exploitable, and computer cracking technology. Due to this new information, we must take different methods in order to encrypt our data if we don't want the NSA to be able to crack it, or I should say, crack it as easily.
Embrace open source encryption
Since corporations have been working with the NSA in order to build backdoors into their software, certain technology that we may have used for encryption now may be rendered useless. One piece of software for instance is Microsoft's BitLocker. Since the NSA has been working with Microsoft can we really trust BitLocker anymore?
Instead of using tools like this, tools that are made by big corporations that may have worked with the NSA we should attempt to use tools that use open-source or public-domain encryption methods. Some potential software that we should take a look at are the following:
- Truecrypt: encrypting sensitive files, folder, and entire drives
- GPG: encrypt email communications
- TAILS: Linux built distribution with security and anonymity in mind.
- Off-the-record messaging: cryptographic protocol for encrypting and authenticating instant-message communications.
In addition to these tools, others that are made overseas could be less likely to have installed backdoors in their software. It is not definite that they have not, but it is a lesser chance.
In addition to this information, the following websites give a good amount of useful information:
The source that I used for my information in this article is:
The information shared is very useful and made me anxious to learn more about this process. I will do visit the link to gather more information about how to protect and encrypt information. Thanks.
ReplyDeletedigital signature certificate