
From Tor to proxies to VPNs, keep your data secure with these nine tools for private browsing, searching, chatting and lots more.
NSA spying was one of the biggest news stories of the last decade. The revelation of constant monitoring of all electronic communications not just in the United States, but across the entire world, will have shockwaves that last until the end of Western democracy. We may not see the full ramifications for decades. But in the meantime, there are some tools for private browsing that we can use to keep our online communications secure. They’re not without their downsides, but they’re there to use for private browsing and conducting day-to-day affairs. Even an unbreakable encryption tool can be circumvented by hackers and spies if they are able to secretly install software that hijacks communications on a computer or phone before it is encrypted. Other factors to consider are that both people communicating need to install the software for it to be effective, few tools provide very much anonymity (meaning that while your messages are unreadable your contact list could remain exposed) and many of the tools are run by disorganized teams of volunteers.
But still, online privacy is so important to most Internet users that they would prefer some effective encryption than none at all. These tools may not be 100% NSA-proof—nobody quite knows what the NSA (or even individual hackers) are capable of—but they’re a start.
Andrei Burke contributed to this story.
1. Use Tor Browser for Private Browsing
Tor (short for The Onion Router) is a free software package that allows private browsing with Firefox. Its use is mandatory for accessing the so-called “Deep Web.” Tor conceals its users’ identities by directing traffic through over three thousand relays, all of which are maintained by volunteers. Tor is a double-edged sword: although it’s a tool that can enable whistleblowing (WikiLeaks conducts business in the Deep Web, and even Edward Snowden used Tor to leak his PRISM documents to Glenn Greenwald), it’s also a tool that’s favored by everybody from drug dealers to child pornographers to jihadis, making Tor a flashpoint in the current civil ethics debate America is having over anonymity. Though Tor certainly does provide anonymity, it’s also a beast to use: websites load glacially, so it’s not a tool for casual browsing. Users also voice concern that even if what you’re doing while on Tor can’t be seen, the fact that you’re using it at all can be seen, and may immediately raise suspicion. It’s also only truly safe if you use it behind multiple proxies. Get it here.
2. You Can Also Try Pirate Browser for Private Browsing
For those who don’t want to jump into Tor, there’s Pirate Browser, a browser package created by the infamous Pirate Bay torrent network, and which incorporates Tor. As a bonus, Pirate Browser will circumvent content filters if you have them in your country.
3. Get a VPN (Virtual Private Network)
VPNs are private groups of computers networked together and nested within a public network. Accessing such a private network can render your data encrypted and secure—you can also access one, and its security, even if you’re on an untrusted public net connection (Starbucks, let’s say).
RELATED: 10 Ways to Protect Yourself From NLP Mind Control
They’re favored by people who want to use BitTorrent anonymously, for instance. Lifehacker has a guide to VPNs and a list of some of the top VPN providers here. VPNs can offer a considerable level of protection, and their use is expected to become much more widespread as concern about net surveillance grows.
4. Use HTTPS Everywhere for Even More Private Browsing
Developed by the Electronic Frontier Foundation, HTTPS Everywhere is a Firefox add-on that forces your connection to major websites (like Facebook and Google) into a secure HTTPS connection instead of only HTTP. This immediately adds a modicum of online anonymity without having to go through Tor.
5. Use Anonymous Search Engines
Services like Ixquick and DuckDuckGo allow for anonymous search, instead of going through untrustworthy Google or Bing.
6. Use Anonymous E-Mail
Anonymous e-mail providers like Safe-mail can provide secure, disposable e-mail addresses for sending information without interference.
7. Use Anonymous Chat
To open an anonymized chat room, try the CryptoCat extension, the web-based ChatCrypt or the Guardian Project’s ChatSecure. Especially combined with an anonymized browser, these programs will allow for chat that doesn’t leave a record.
CryptoCat was famously used by journalist Glenn Greenwald while he met with Snowden in Hong Kong in 2013. It’s a free chat program that can be installed in any browser. Developed by Nadin Kobeissi, CryptoCat was just an experiment when he created it in 2010 as a student at Concordia University in Montreal. Since CryptoCat won a 2012 New York hackathon, Kobeissi has raised about $150,000 in grants to pay for professional developers to work on improvements to the software.
The Guardian Project’s ChatSecure app works across a multitude of platforms, and claims to support free unlimited secure messaging over Facebook Chat, Google Talk, Hangouts, Jabber, Dukgo and more.
For anonymous video conferencing and calls, check out Silent Circle’s app for iPhone and Android, which protects voice and video communication. It is free to download, but users must pay for a $9.95 monthly subscription fee.
“It takes a lot of money to have a robust, always-on and high-quality service,” says Mike Janke, CEO of Silent Circle. “Most free apps don’t or cannot support this,” without selling ads or user data.
You can download it for iPhone here, and for Android here.
8. Use Burner Phones and Signal
The Burner app will provide anonymous phone numbers for when you don’t want to give out your digits (especially to potential creepers). You can get the app here.
Open Whisper Systems’ free cellphone app Signal will make secure calls for iPhone and Android, respectively. The Signal app attempts to protect users’ anonymity by using what’s called a “boom filter,” a sophisticated system that allows users to find one another without sharing address books. While Signal is close to flawless on encryption, if your phone itself is compromised, the encryption won’t matter, however.
“The contacts from your device are never transmitted anywhere,” says Open Whisper Systems security expert Moxie Marlinspike.
Signal is available for free at the iTunes store and Google Play.
9. Use Bitcoin
As it’s been the subject of just about every Internet commentator and “digital freedom activist’s” tweets for the last, uh, forever, you may be a bit tired of hearing about Bitcoin—but let’s include it anyway. Bitcoin is an anonymous, open source, P2P online currency that can be transferred over the Internet without having to go through a financial institution. This, obviously, scares the hell out of a lot of people—not to mention its insanely fluctuating exchange rate and the fact that people often use it to buy drugs and conduct other illegal transactions online.
RELATED: 10 Foods to Naturally Protect Yourself From Fukushima Radiation
The Bottom Line
The above resources can bring the Internet and your communications back under your control, somewhat—a major step towards regaining some of the freedoms that have been infringed upon by the NSA, DEA and others. But their use is only a patch on a broken system: in a sane world, normal, law-abiding citizens wouldn’t have to use shady technologies just to talk without fear of government surveillance. But here we are, so use these technologies wisely. And like law-abiding citizens, please.
A final way to protect your online privacy might be to stay off of social media all together—especially Facebook. At a recent Q&A in Canada, Glenn Greenwald provided some insight into why Edward Snowden isn’t on the popular social media site.
“He doesn’t use Facebook because he hates Facebook,” Greenwald said. “They’re one of the worst violators of privacy in history. Nobody should use Facebook.”
yabancı dizi izle izlemek için sitemize bekleriz. Full hd 1080o kalitede özel player ile donmada kesintisiz film izle Dizimag.org sitemiz için link adresimiz. https://dizimag.org/
Lisanslı Casino Siteleri https://chungmaa.com/
Howdy! I know this is kind off off topic but I was
wondering if you knew where I could find a captcha
plugin for my comment form? I’m using the same blog platform aas
yours and I’m having problems finding one? Thanks a lot!
Check out my web-site; mariobet
We just wanted to take a moment to acknowledge all the hard work and effort you’ve been putting in lately. Keep up the amazing job, you’re doing great!
Your blog post was fantastic, thanks for the great content!
Keep up the amazing work! Can’t wait to see what you have in store for us next.
I really like reading through a post that can make men and women think. Also, thank you for allowing me to comment!
Very well presented. Every quote was awesome and thanks for sharing the content. Keep sharing and keep motivating others.
very informative articles or reviews at this time.
Türkiye`nin en çok kazandıran şans oyunları sitesi
Casibom https://casibom2025.pro/
Nice article inspiring thanks. Hello Administ . Seo Paketi Skype: [email protected] -_- live:by_umut
Everything is very open and very clear explanation of issues. was truly information.Seo Paketi Skype: [email protected] -_- live:by_umut
Thanks foor the marvelous posting! I actually enjoyed reading
it, yyou may be a great author. I will be sure to bookmark your blog and wikl
come back someday. I want to encouraye yyou to definitely continue
your great writing, have a nice day!
My page :: zibilyonbet
After all, what a great site and informative posts, I will upload inbound link – bookmark this web site? Regards, Reader.Seo Paketi Skype: [email protected] -_- live:by_umut
Good info. Lucky me I reach on your website by accident, I bookmarked it. Seo Paketi Skype: [email protected] -_- live:by_umut
Ofset Kutu, Ofset Kutu Üretimi, Ofset Kutu İmalatı
I’m gone tto convey my little brother, that hee should alao visit tis weblogg on regbular basis to take updated from hottest reports.
my blog post :: Doğum günü organizasyonu
Nice post. I learn something totally new and challenging on websites
This paragrfaph is genuinely a good one it asxsists nnew web users,
who are wishing for blogging.
Have a loo at my web site – Karın germe
very informative articles or reviews at this time.
Awesome! Its genuinely remarkable post, I have got much clear idea regarding from this post
Hello, I liked your site very much, I will probably visit your site again, thank you.Hello, I liked your site very much, I will probably visit your site again, thank you.v
Thank you for content. Area rugs and online home decor store. Hello Administ . Seo Paketi Skype: [email protected] -_- live:by_umut
Thank you for great information. Hello Administ . Seo Paketi Skype: [email protected] -_- live:by_umut
Thank you great post. Hello Administ .Seo Paketi Skype: [email protected] -_- live:by_umut
What other topics would you like to see covered on the blog? Let us know in the comments!
Thank you for great article. Hello Administ .Seo Paketi Skype: [email protected] -_- live:by_umut
Hello! I could have sworn I’ve been to this blog before but after browsing through some of the post I realized it’s new to me.Seo Paketi Skype: [email protected] -_- live:by_umut
Hi, I think your website might be having browser compatibility issues.
When I look at your website in Opera, it lookss fine but
when opening in Internet Explorer, it has some overlapping.
I just wajted to give you a quick heads up! Other
then that, grteat blog!
Also visit my blog post: Side escort
I completely agree with your perspective on this topic It’s refreshing to see someone presenting a balanced and thoughtful viewpoint
Awesome! Its genuinely remarkable post, I have got much clear idea regarding from this post bandırma nakliyat firmaları
For the reason that the admin of this site is working, no uncertainty very quickly it will be renowned, due to its quality contents. manyas mutfak dolabı
makar web | With MAKAR Web, you get a combination of innovative design and robust functionality.
Your posts are always so relevant and well-timed It’s like you have a sixth sense for what your readers need to hear
Child Porn – 12 years old Child Porn
This was beautiful Admin. Thank you for your reflections. etiler banyo
I blog frequently and I really thuank you for your content.
This article has truly peaked my interest. I’m going to take a note of your
blog and keep checkikng for new details about omce per week.
I opted in for your Feed too.
My web page … temp email
Filipinler | Perfume is an art. The right notes, balanced composition, and expert craftsmanship create masterpieces.
Child Porn – 12 years old Child Porn
I very delighted to find this internet site on bing, just what I was searching for as well saved to fav
I very delighted to find this internet site on bing, just what I was searching for as well saved to fav
makar web | MAKAR Web’s digital expertise ensures that every project meets industry best practices.
Thank you for sharing your thoughts. I truly appreciate your effots and I am waiting for youjr next write
ups thank you once again.
Heere is my web site – Palyaço kiralama
Child Porn – 12 years old Child Porn
If you desire to improve your know-how just keep isiting this site andd bee upeated with the
most recent gossip posted here.
my web page … livestreaming on twitter
Amazing things here. I’m very happy too peer your article.
Thanks sso much and I’m looking ahead to touch you.
Wiill you please drokp me a e-mail?
my website; istif makinesi
Child Porn – 12 years old Child Porn
I’m impressed by how modern endpoint protection solutions have evolved beyond traditional antivirus software. The integration of AI and machine learning to detect novel threats shows how security tools are keeping pace with emerging challenges. It’s reassuring to see security technology becoming more proactive rather than just reactive.
Your writing always leaves me feeling uplifted and empowered. Thank you for being such a positive influence.
Your blog always leaves me feeling uplifted and inspired Thank you for consistently delivering high-quality content
I’ve never commented on a blog post before, but I couldn’t resist after reading yours. It was just too good not to!
This was beautiful Admin. Thank you for your reflections. ulus mutfak tadilatı
I do not even understand how I ended up here, but I assumed this publish used to be great kolay web sitesi kur
I read this article completely about the difference of most
recent and earlier technologies, it’s aawesome article.
Herre iis my web-site – gastronom küvet fiyatları
Casibom Giriş https://www.google.com/maps/place/Casibom/@41.0450416,29.0186811,4157m/data=!3m1!1e3!4m6!3m5!1s0x14cab7af62d80be3:0xdf80bb0acb5323d7!8m2!3d41.0449472!4d29.01696!16s2Fg2F11m5jx3k42?hl=tr&entry=ttu&g_ep=EgoyMDI1MDIxOS4xIKXMDSoASAFQAw3D3D
I very delighted to find this internet site on bing, just what I was searching for as well saved to fav beşiktaş banyo tadilatı
Hmm it appears like your website ate mmy first comment
(it wwas super long) so I guess I’ll just sum
it up what I had written and say, I’m thoroughly
enjoying your blog. I aas well amm an aspiring blog blogger but I’m still
new to tthe wyole thing. Do you have anny tips and hints for
newbie blog writers? I’d definitely appreciate it.
Also visit my homepagge – Bubble Show