1. The Topic of the Month for October is "Make this the Perfect Bugout Location". Please join the discussion in the TOTM forum.

Encryption options for non-hackers

Discussion in 'Technical' started by CATO, Feb 15, 2013.

  1. CATO

    CATO Monkey+++

    DIY Data encryption. | The Survival Homesteader

    DIY Data encryption.
    Protect your privacy from the prying eyes of big government.

    pdf16. Download this page in PDF format

    So, I have been mulling over this whole idea of President (use the term loosely) Obama signing an executive order to “take over” the internet. How could this be done? What does all of this mean exactly? How much is hype and how much is truth?
    The first thing I found out is that the executive order was signed, and that it looks exactly like a bill that was submitted to Congress. The name you may know is CISPA. I also learned that the bill (and executive order) will create a department that will “work closely with the private sector to create and implement standards for companies running critical infrastructures”. To me, this seems like a bunch of legal double talk.
    I am not sure where this is going, but I don’t like big government wanting to help me with my internet.
    I also found out that this order (bill?) will empower the National Security Agency and the military to collect your private internet records. This is a blatant invasion of our fourth amendment rights. All in the name of keeping us safe. Benjamin Franklin once said “He who sacrifices freedom for security deserves neither. People willing to trade their freedom for temporary security deserve neither and will lose both.”
    With that in mind, I thought about ways to at least try to keep as much of my private data safe. Obviously, there are going to be points in which you can’t protect your data, such as when you buy or sell online, when you enter private data on a form of any kind or when you send email (an email is more like a postcard than it is a letter. Anyone with the knowledge can look at what is written).
    The first thing you can do is create an encrypted space on your computer. There are several programs out there that can do this. Many of these are free. The best ones I have heard of are TrueCrypt, Free OTFE and Gpf4win. I have some experience with TrueCrypt. I installed it on clients systems while I was playing computer tech over the summer. Make sure to get an understanding of the software before you start playing with these.
    The next thing would be encrypting files that I want to move from one place to another. There are several ways to do this, but I tend to lean towards a form of encryption called steganography. Steganography is a form of encryption that uses the “white noise” in a picture (or other file formats) to hold the data of another folder.
    There are some good (and free) software in the field of steganography. A few of these are OpenPuff, CypherTune and QuickStego. All of these will encode your file into another file. Then you can upload it and put it anywhere (such as a picture on your website).
    The last thing I want to bring up is email encryption. Earlier, I said that email is more like a postcard than it is a letter. Because of this, everyone should have some kind of encryption for emails. For email encryption, you can use stego or you can opt for software that will encrypt your emails. Comodo makes great software, many of which are free for personal use. While Comodo Unite isn’t technically email encryption, you can use the vpn server to chat securely and send files. Another one is called Crypt4Free. The third one I want to discuss is iSafeguard free. Both of these are reported to do the job.
    There are hundreds of other programs out there as well as a hundred different things to do to protect yourself from the power of the dark side that is our government. Be careful and stay safe.
    pdf16. images_thumb.
    Mindgrinder likes this.
  2. UGRev

    UGRev Get on with it!

    I use true crypt at work. Great product.
    I use ziptr for secure file and email-like conversations.
    RedPhone on my android to make secure calls.
    Mindgrinder likes this.
  3. Mindgrinder

    Mindgrinder Karma Pirate Ninja Jedi Bipolar WINNING M.L.F.

    Encrypt Everything

    Main Page

    From Encrypt Everything

    Operation Encrypt Everything was started in 2012 by the Pirate Party of Canada to counteract the increasing threat of total communications surveillance by governments and private industry. It is intended to bring together information about protecting your privacy online, and making easily-understood instructions available to our friends online.
    By getting in the habit of using good privacy and encryption practices, you can protect your information online from surveillance and tracking. With governments and corporations pushing online spying more than ever before, it is incredibly important that people learn to use these techniques to protect themselves.

    Privacy Guides

    How To Act Online

    Other Privacy-Related Information

    Privacy Software

    To view software to increase your privacy click on your operating system below:
  4. Mindgrinder

    Mindgrinder Karma Pirate Ninja Jedi Bipolar WINNING M.L.F.

    if anyone needs coaching with these walkthroughs...PM me and we can do a skype or remote desktop sessions. You may also contact the webmaster of the source page and tell'em Grinder sent u.
    CATO likes this.
survivalmonkey SSL seal        survivalmonkey.com warrant canary