On June 5, 2013, Edward Snowden released classified NSA documents, causing ripples of distrust and anger to not only boil up within America, but throughout the world. Since the news broke, many have wondered what it means for the average individual. Should you be worried? Or does it even really matter, because you have nothing to hide . . . right? Those debates will sift through the public discourse in one form or another. But while those arguments rage on, let’s take a look at how using a few simple tools can help protect your right to privacy in the digital age.
The emperor has no clothes. Now that the President has been exposed by the likes of concerned patriots like Edward Snowden, he is running around trying to rescue his legacy and save face to the staunch leftists who once supported him. Make no mistake: these recent new proposals are in response to U.S. tech companies, such as Cisco and Google, possibly losing billions in future sales to foreign firms rather than concern for the individual citizen.
Famed technologist and White Hat, Jacob Applebaum, gave a presentation at the Chaos Communication Congress that outlines many of the ways the NSA compromises computer systems and networks.
We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users.