Skip to content

The Mind Tech Podcast: Episode 25

September 11th, 2013

MindSet

Audio clip: Adobe Flash Player (version 9 or above) is required to play this audio clip. Download the latest version here. You also need to have JavaScript enabled in your browser.

Subscribe to The Mind Tech Podcast

Shit Kat

Hosted by Gareth Davies and Joe Ressington

The Mind Tech Podcast is your weekly dose of tech, privacy, security and conspiracy.

Each week we'll talk about the very latest tech news and the continued threats to internet freedom.

Joe's Nexus 7 Home Screen

Pogoplug

Mind Tech News:

New Apple Stuff

Android KitKat

Some reasons why Google should not be in bed with Nestlé

Linux Security, In Light of NSA Crypto-Subverting Attacks?

UK gov't wants to ban dirty words in UK domain names; tell them to #£@* off

NSA surveillance: A guide to staying secure

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you're much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn't. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it's pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It's prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it's harder for the NSA to backdoor TLS than BitLocker, because any vendor's TLS has to be compatible with every other vendor's TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it's far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

Until Next Week...

Contact us via Bitmessage!  Here's our address:

BM-2D827QEqWztqKZaRW4xkL8z7WPGu3qryyM

The Mind Set Facebook group

The Mind Set Google+ group

Support Mind Set Central:


5 Comments

Post a comment
  1. christopher moreland #
    September 12, 2013

    I had a parcel sent from Canada it took 2 months to get here so you never know

  2. OMG itz Windowz #
    September 12, 2013

    Nice show as always!), I’m thinking Gareth is sponsored by @pple “Who knew in 1984 … that [Steve Jobs] would be Big Brother … and the zombies would be paying customers?”

    http://www.redicecreations.com/article.php?id=26861

    http://www.businessinsider.com/nsa-iphone-slides-in-der-spiegel-2013-9

    http://www.redicecreations.com/article.php?id=26714

  3. Joe Ressington #
    September 12, 2013

    I don’t think I will ever really give up hope…

  4. MindSet #
    September 12, 2013

    I wish I was sponsored. Lol. Unfortunately I’m not…

  5. Warren #
    September 12, 2013

    Enjoyed this weeks show.
    I think OwnCloud has it’s pro’s & con’s. It does take a bit of effort to set up for sure, but offers some good services as a reward. I mainly use it for file and contacts sync, and running it through a VPN helps a bloke feel a little less nervous about ports being exposed to the Net. Horses for courses I suppose.

Leave a Reply

Basic HTML is allowed. Your email address will not be published.

Subscribe to this comment feed via RSS