tl;dr Andryou’s beginner-friendly privacy tools
Practival privacy; the twin to politics of privacy.
Technoprivacy is difficult and tedious for our monkey minds to get a handle on. However, it’s not too hard. The trick is, don’t get hung up on thinking you are some kind of secret agent who needs to hide from the NSA. You are no Osama bin Laden. To be fair, these days, even Osama bin Laden is not Osama bin Laden. Deal with state surveillance through political means if you are worried about the state stealing your information. (Or at least, work up gradually to truly paranoid privacy attitudes, and research more widely the tips here.)
Instead, for us normal people, the rule should be: Start by not giving your information away for free to everyone. And don’t simply give up because it’s too hard: That’s just doing what big business wants you to do..
That said, just because I’m talking about what our attitude should be as informed consumers of the addictive drug of single-serve online socialising, doesn’t mean I’m blaming Jane/Joe Public for not getting it right. As long as corporate social networks are permitted to harness their heady blend of plausibly-deniable social engineering on the vulnerable, we are all put at greater risk.
Case in point: A friend of mine just showed me his facebook profile public link before friending me; on open, public display to anyone who google him were pictures of his children, his home, his friends, dying relatives in hospital with confidential medical information and records in the background; With his well-intentioned handphone wielding he has voluntarily compromised the privacy, and credit-worthiness of a variety of bystanders.
This kind of thing is tricky. How do you stop friends with crappy privacy hygiene? Privacy is a weakest-link kind of concept, and as long as Facebook can rely on a reasonable fraction of the population voluntarily and unconsciously selling the rest out, we are all compromised. I know that everything I do in front of my aforementioned friend will be obediently tagged and put on public display for the use of not only facebook but any passing mobster, data miner or insurance company. The thing is, it is not sufficient if privacy-violating companies are able to get away with it if in principle experts could avoid some of the pitfalls; Social media is a habit-forming drug that potentially transmits ailments such as credit-score-risk, misinformation and confidential data breaches.
Is it consistence particularly consistence stance to regulate, say, alcohol tobacco and gambling but not social media usage?
This is leaving aside the question of companies who sell your information no matter what you do) or government-business alliances that accidentally leak your information.
Anyway, with blame for the abuse appropriately apportioned to the predators… let’s get back to what we, the victims, can do by taking what responsibility is available to us which is not so hard, for all that it should not be required of us.
Right now, if you are a typical internet user, you are walking around with no pants on online. Everyone can see your junk. You don’t need to wear a tinfoil hat to hide your junk, not if your anatomy is anything typical; you just need to put some pants on.
This enpantsing will be more tedious than we’d like, because the world is badly designed, but let’s start with what’s achievable, and work towards making it easier next time, eh?
How we could do it better now
So, some baby steps towards a healthier privacy regime. I am going to list some techniques that have aroused my attention. Later I will triage them according to how urgent is the priority of the privacy leak they plug and how onerous to handle; e.g. something like:
- first keep my credit card details out of the hands of the hands of the mafia, then
- keep gratuitous personal data out of the hands of unscrupulous corporations, next
- keep nude selfies and pony tail pics out of the hands of potential employers
- keep personal data out of the hands of prying foreign security agencies
- keep personal data out of the hands of prying local security agencies
These reflect my personal needs; if you are actually a person of specific interest to state security agencies, or a mafia credit card thief, you will probably have different ones.
Practically, first step, I would like to minimise the amount of information complete strangers get about me for free. For example, I would prefer the mafia not to be able to buy stuff with my credit cards, I’d prefer my personal relationships are not used sell crap to me, I’d prefer not to release those awkward photos from when I had a pony tail.
Broadly, some stuff I’d like to keep private, some stuff I’d like to share, and some stuff, I’m happy to share, but only for the right price or with the right organisation; I want to assign my personal information to the correct publicness categories, and at a better price point. And by “better”, I mean, “not selling off the foundations of functional democracy for all future times to unaccountable interests for a few dollars a year right now.” which seems a little steep for kitten pictures.
- Don’t leave your computer unattended, because things like PoisonTap mean that anyone who can get to your USB port can log on to your websites.
- Prism break is a chaotic list of solutions. Excellent reference, although it really needs to incorporate some idea of how popular their suggested solutions are; after all, most of these things are only of any damn use if your friends also use ‘em.
- quick guide to the basics of encryption (or how about one with stick figures)
VPNs and encrypted networks
- you can run your own, as per my running your own server
- That one privacy guy’s big overview has a great list of, e.g. bandwidth, jurisdiction, and privacy advocacy.
- tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you’ll feel no difference in your every day user experience, but yet your traffic will be more secure and you’ll have made life much harder for hackers.
Black hat nonsense
You should be approximately aware of the nasty things that people can and will do to your computer.
- search engines in general
- disconnect anonymises other search engines from their servers
- Advanced: run your own search anonymiser:
I really need to tidy these up a bit and explain, because they are so simple and so useful.
- Privacy badger is an open source non-profit low-configuration blocker of tracking advertisers
- Adblock Edge, Ghostery, Disconnect, DoNotTrackMe, RequestPolicy
- Ghostery disables most of the social media spyware.
- Privacy badger (see above) also works for chrome
- HTTPS everywhere is vexing. Every browser should implement this functionality, of being secure by default instead of writing your passwords on the lawn in big letters anytime someone asks. That’s why it’s annoying that you have to install a plugin to make it work. And, worse, a horribly memory-hungry plugin.
- adblock plus
- Which android phones do not leave gaping unpatched security holes?. tl;dr - Google, LG, then everyone else.
- Running your own server? See secure web servers.
See Synchronising files.
You need one. See passwords.
See transferring money.
BadUSB and other asinine bullshit
Single site browsers
I use a Single site browser to access facebook because
- otherwise facebook would know even more about me than they do
- Facebook is a blackhole of timewaste that I don’t want to browse to by accident, so I should make it slightly more difficult for myself.
You can do this too.
The Browser UI is very minimal, just a toolbar (with site tabs) that disappears in Full-Screen mode.
MacPin apps are shown in OSX’s Dock, App Switcher, and Launchpad.
Custom URL schemes can also be registered to launch a MacPin App from any other app on your Mac.
So, minimal browserlets.
Fluid.app. No longer recommended because it’s unmaintained and obsolescent. The free version doesn’t isolate your workspace. I reckon the fee for the paid version (USD5) would be worth it if it were maintained.
How we could do it better later
OK, anyway, we shouldn’t all have to be digital privacy experts to survive in the 21st century; How could we change the rules so that we can focus on our day jobs?
Slamming PGP and the model of human behaviour it assumes is a cottage industry:
GPG and HTTPS (X509) are broken in usability terms because the conceptual model of trust embedded in each network does not correspond to how people actually experience the world. As a result, there is a constant grind between people and these systems, mainly showing up as a series of user interface disasters. The GPG web of trust results in absurd social constructs like signing parties because it does not work and creating social constructs that weird to support it is a sign of that: stand in a line and show 50 strangers your government ID to prove you exist? Really? Likewise, anybody who’s tried to buy an X509 certificate (HTTPS cert) knows the process is absurd: anybody who’s really determined can probably figure out how to fake your details if they happen to be doing this before you do it for yourself, and of the 1500 or so Certificate Authorities issuing trust credentials at least one is weak or compromised by a State, and all your browser will tell you is “yes, I trust this credential absolutely.” You just don’t get any say in the matter at all.
The best explanation of this in more detail is the Ode to the Granovetter Diagram which shows how this different trust model maps cleanly to the networks of human communication found by Mark Granovetter in his sociological research. We’re talking about building trust systems which correspond to actual trust systems as they are found in the real world, not the broken military abstractions of X509 or the flawed cryptoanarchy of GPG.
When someone says “assume that a public key cryptosystem exists,” this is roughly equivalent to saying “assume that you could clone dinosaurs, and that you could fill a park with these dinosaurs, and that you could get a ticket to this ‘Jurassic Park,’ and that you could stroll throughout this park without getting eaten, clawed, or otherwise quantum entangled with a macroscopic dinosaur particle.”
Getting old school
Academic stuff to read to stay paranoid
Yes, that’s right, deducing your password by listening to your computer. But it gets worse:
Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped attacker need merely touch the target computer with his bare hand, or get the required leakage information from the ground wires at the remote end of VGA, USB or Ethernet cables.
Maybe don’t read this if you are working on reducing your background paranoia.
Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Now Publishers. Online.
The mathematical foundations of doing stuff privately. I hope someone else is reading this so that I don’t have to.
Sarigol, E., Garcia, D., & Schweitzer, F. (2014). Online Privacy as a Collective Phenomenon. arXiv:1409.6197 [cs]. Online.
Your friends have already disclosed secrets about you by disclosing they know you on social media, secrets that will be further disseminated by random grad students in Switzerland when the social media company you entrusted with this information goes bust.
Politics of privacy
See the quantified other.
- I went to the same school as Julian Assange but we learned different lessons
- GNU privacy handbook
- I2P seems to be hot right now
- freenet is somewhat hot
- NSA’s own Mac security advice