Hacker News Bulliten
June 27, 2013
Now it is completely disclosed that how the National Security Agency has broad powers to capture private information and According to the various reports on the Internet by many websites that they all know that who we’re calling and also have access to our Emails, messages, chats over social websites including the Facebook, which we use on the daily basis and let we share and post personal stuffs but they are under NSA Surveillance.
1. Use TOR to browser over the Internet
According to the Washington post, NSA whistleblower Edward Snowden has been photographed with a Tor sticker on his laptop and Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing
The conventional telephone network is vulnerable to government wiretapping. And many Internet-based telephony applications, including Skype, are thought to be vulnerable to interception as well.
If we talk about Silent Circle it will work, When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iPhone, Android device, iPad or Windows computer on our crystal-clear secure network and at the last we can say you can Shut-Out the NSA Survillance.
More about Silent Circle
Redphone is another application that makes phone calls with end-to-end encryption. Interestingly, it was developed with financial support from U.S. taxpayers courtesy of the Open Technology Fund.
The government hopes to support dissidents in repressive regimes overseas. But the only way to build a communications application that people will trust is to make it impervious to snooping by any government, including ours. So like Silent Circle, the Redphone client software is open source and has been independently audited to make sure there are no back doors.
More about Redphone
The NSA phone records program revealed by the Guardian last week not only collects information about what phone numbers we call, it also collects data about the location of the nearest cellphone tower when we make calls. That gives the NSA the ability to determine your location every time you make a phone call — and maybe in between calls too.
Unfortunately, Soghoian says there’s no technical fix for this kind of surveillance. “The laws of physics will not let you hide your location from the phone company,” he says. The phone company needs to know where you are in order to reach you when you receive a phone call.
So if you don’t want the NSA to know where you’ve been, you only have one option: You need to turn off your cell phone. Or if you’re feeling extra paranoid, take out the battery or leave your phone at home.
You can take the above steps to hide your identity over Internet and we also want your views to say on NSA Surveillance, for your response you can mail us to firstname.lastname@example.org or you can suggest in the comment or by Fill up the Form below and we will publish them in our article and tweets.
This content was brought to you by Intellihub.com