Get the latest tech news

Essays: NSA Surveillance: A Guide to Staying Secure – Schneier on Security


The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe Now that we have enough details about how the NSA eavesdrops on the internet, including today’s disclosures of the NSA’s deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.

TAO has a menu of exploits it can serve up against your computer—whether you’re running Windows, Mac OS, Linux, iOS, or something else—and a variety of tricks to get them on to your computer. Snowden’s follow-on sentence is equally important: “Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.” Since I started working with Snowden’s documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I’m not going to write about.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Security

Security

Photo of Guide

Guide

Photo of Essays

Essays

Related news:

News photo

Your Guide to Surviving Extreme Weather

News photo

Want ChatGPT to roast your Instagram feed? A guide to being insulted by an AI bot

News photo

A Starter's guide on recovering damaged and rotten CDs