August 25th, 2024

Essays: NSA Surveillance: A Guide to Staying Secure – Schneier on Security

The article outlines the NSA's extensive surveillance methods and offers strategies for individuals to protect their privacy, emphasizing strong encryption and cautious use of commercial software to counteract potential backdoors.

Read original articleLink Icon
Essays: NSA Surveillance: A Guide to Staying Secure – Schneier on Security

The article discusses the extensive surveillance capabilities of the NSA and offers advice on how individuals can protect their privacy against such intrusions. The NSA primarily collects data through network traffic, leveraging partnerships with telecommunications companies and employing various methods to intercept communications. It gathers vast amounts of metadata, which is easier to analyze than content, and has the ability to compromise network devices and endpoint computers. The author emphasizes that while encryption can provide a level of security, the NSA often undermines it by exploiting weaknesses in cryptographic systems and working with vendors to introduce backdoors. To enhance security, the author suggests five strategies: using hidden services like Tor, encrypting communications, maintaining air-gapped systems for sensitive data, being cautious with commercial encryption software, and opting for public-domain encryption methods. The overarching message is that while the NSA has significant resources, individuals can make surveillance costly and difficult by employing strong encryption and being vigilant about their digital practices.

- The NSA utilizes extensive network surveillance and partnerships with telecom companies to collect data.

- Metadata collection is a key focus for the NSA, as it is easier to analyze than content.

- Strong encryption is essential, but users should be wary of potential backdoors in commercial software.

- Recommended practices include using Tor, maintaining air-gapped systems, and favoring public-domain encryption.

- Individuals can enhance their security by making surveillance efforts more expensive and challenging for the NSA.

Link Icon 6 comments
By @OutOfHere - 6 months
> I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit,

Let's update this for 2024:

Signal/Session/Matrix/^, Tails/Whonix/Qubes/Heads/BSDs, VeraCrypt/Cryptomator/^, GrapheneOS/CalyxOS/PureOS/^, KeePassXC/Bitwarden/^, Mullvad, NetGuard(Android)

^ represents others that I am leaving out for convenience.

By @mmh0000 - 6 months
If your adversary is someone who can … quite literally … send ninjas in attack helicopters at you. You’re probably going to lose.
By @Loic - 6 months
For the context, this from September 6, 2013.
By @LennyHenrysNuts - 6 months
What do people think of SimpleX?

https://simplex.chat/

By @jokoon - 6 months
I don't see why one would try to protect himself from the NSA.

I understand privacy from my neighbor and criminals.

But I want the government to spy on potential criminals.

I trust the courts and the process.

If you don't, you're just paranoid.