How To Combat Online Surveillance

Online_Inline

Download High Resolution Version

In English | PDF | JPEG

Em Português | PDF | JPEG

Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. We might not all be able to prevent the NSA and GCHQ from spying on us, but we can at least create more obstacles and make surveilling us more expensive. The more infrastructure you run, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.

THIS GUIDE IS A VERY BRIEF INTRODUCTION TO ONLINE SECURITY IN THE HOPES THAT YOU’LL INVESTIGATE FURTHER. DON’T TRUST YOUR LIFE TO IT.

1. TOR BROWSER BUNDLE

Includes all you’ll need to access the Tor Network.

Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).

2. BLEACH BIT

Many features to help you easily clean your computer, free-up space and maintain privacy.

3. TAILS

A live operating system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.

Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more.

4. ENCRYPTION OPTIONS

AxCrypt / DiskCryptor / BitLocker / AES Crypt / Kruptos 2 / BestCrypt /
CloudFogger

Create virtual hard drives which encrypt any files you save onto them. Many types of encryption.4. ENCRYPTION OPTIONS

5. PIDGIN

Chat software that allows use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.

6. OFF THE RECORD

A simple plugin for Pidgin. It encrypts all conversations held using the software.

7. THUNDERBIRD

Free email software. Add your existing mail account to it.

8. ENIGMAIL

A security extension to Thunderbird. Write/receive emails signed and/or encrypted with the OpenPGP standard.

9. GNUPG

Free implementation of the OpenPGP standard. Encrypt and sign your emails.

 

Creative Commons LicenceThis work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

3 Comments

  • Thank you for this infographics! I’m surprised though to see TrueCrypt in the list of recommended software, given its known issues: 1) the non-free licensing restrictions regarding copies; 2) the statically-linked libraries dependencies. For more information, and suitable alternatives, please see the Tomb website.

Leave a reply

required

required

optional


*