Don’t be the next Broadwell

A quick and dirty guide to locking down your online life -- and staying safe from government snooping

Topics: Paula Broadwell, Security, National Security Agency, David Petraeus, Privacy, encryption, ,

Don't be the next Broadwell (Credit: Tommaso79 via Shutterstock)

Call it Paula Broadwell blowback. If there’s anything we’ve learned from the tawdry mess that has suddenly overwhelmed our nation’s highest military and intelligence agency leaders, it’s that it’s far too easy for the government to pry into our email. Long-standing privacy concerns have reawakened with a vengeance. Last night, a correspondent amusingly writing Salon under the pseudonym “Fox Mulder” beseeched us to publish “an in-depth story (or stories) on how citizens can regain their privacy from the National Security State.” We’re working on that, but in the meantime, here are some quick and dirty tips for how you can start locking down your online life.

Remember, there are always going to be trade-offs for increased security , the more you encrypt your data to make it impossible for snoops to access, the more inconvenient it will be to get at your own information yourself. So be forewarned — you can find an astonishing plenitude of information on the Web about how to secure your information, but complete privacy is never going to be hassle-free.

1) Your smartphone

The most recent versions of the iPhone’s operating system, iOS, generally get high marks from security professionals, and Android phones have a fairly simple mechanism for encrypting all data, but by far the most important step is to use a passkey that locks your phone. And even that is no permanent guarantee of safety. Four-digit pins can be cracked reasonably quickly by brute force, six digits take longer, and so on. The iPhone has a setting that freezes access if more than 10 different attempts to input a pin number are employed in quick succession. Use it.

2) Your browsing

Want to ensure that a morning spent surfing the Web to figure out how to outwit the FBI is kept hidden from, uh, the FBI? Try TOR — a freely available software program that bounces your online communications through a series of encrypted connections across the Internet. No more “traffic analysis” of your habits, whether by Facebook or the FBI. One caveat: Using Tor will slow your Web browsing experience. For most of the world, that’s probably a deal-breaker.

3) Your hard drive

You’d rather the government doesn’t know that you’ve been writing pornographic fan fiction about the CIA director and a pair of Lebanese twins? Encrypt your hard drive data. Truecrypt is one popular, well-regarded, free option.

4) Your email

There are no shortage of encryption programs that will lock up your email. The old gold standard, Pretty Good Privacy, is now part of a package of commercially available encryption products sold by Symantec. There are also free software options, built on top of the GPG (GNU Privacy Guard) standard. Some may find, however, that their user-friendliness is less than ideal.

But then again, nobody ever said that defending yourself from the curiosity of the national security state would be easy.

Continue Reading Close
Andrew Leonard

Andrew Leonard is a staff writer at Salon. On Twitter, @koxinga21.

Next Article

Featured Slide Shows

What To Read Awards: Top 10 Books of 2012 slide show

close X
  • Share on Twitter
  • Share on Facebook
  • Thumbnails
  • Fullscreen
  • 1 of 10
  • 10. "The Guardians" by Sarah Manguso: "Though Sarah Manguso’s 'The Guardians' is specifically about losing a dear friend to suicide, she pries open her intelligent heart to describe our strange, sad modern lives. I think about the small resonating moments of Manguso’s narrative every day." -- M. Rebekah Otto, The Rumpus

  • 9. "Beautiful Ruins" by Jess Walter: "'Beautiful Ruins' leads my list because it's set on the coast of Italy in 1962 and Richard Burton makes an entirely convincing cameo appearance. What more could you want?" -- Maureen Corrigan, NPR's "Fresh Air"

  • 8. "Arcadia" by Lauren Groff: "'Arcadia' captures our painful nostalgia for an idyllic past we never really had." -- Ron Charles, Washington Post

  • 7. "Gone Girl" by Gillian Flynn: "When a young wife disappears on the morning of her fifth wedding anniversary, her husband becomes the automatic suspect in this compulsively readable thriller, which is as rich with sardonic humor and social satire as it is unexpected plot twists." -- Marjorie Kehe, Christian Science Monitor

  • 6. "How Should a Person Be" by Sheila Heti: "There was a reason this book was so talked about, and it’s because Heti has tapped into something great." -- Jason Diamond, Vol. 1 Brooklyn

  • 4. TIE "NW" by Zadie Smith and "Far From the Tree" by Andrew Solomon: "Zadie Smith’s 'NW' is going to enter the canon for the sheer audacity of the book’s project." -- Roxane Gay, New York Times "'Far From the Tree' by Andrew Solomon is, to my mind, a life-changing book, one that's capable of overturning long-standing ideas of identity, family and love." -- Laura Miller, Salon

  • 3. "Billy Lynn's Long Halftime Walk" by Ben Fountain: "'Billy Lynn's Long Halftime Walk' says a lot about where we are today," says Marjorie Kehe of the Christian Science Monitor. "Pretty much the whole point of that novel," adds Time's Lev Grossman.

  • 2. "Bring Up the Bodies" by Hilary Mantel: "Even more accomplished than the preceding novel in this sequence, 'Wolf Hall,' Mantel's new installment in the fictionalized life of Thomas Cromwell -- master secretary and chief fixer to Henry VIII -- is a high-wire act, a feat of novelistic derring-do." -- Laura Miller, Salon

  • 1. "Behind the Beautiful Forevers" by Katherine Boo: "Like the most remarkable literary nonfiction, it reads with the bite of a novel and opens up a corner of the world that most of us know absolutely nothing about. It stuck with me all year." -- Eric Banks, president of the National Book Critics Circle

  • Recent Slide Shows

  • Share on Twitter
  • Share on Facebook
  • Thumbnails
  • Fullscreen
  • 1 of 10

More Related Stories

Comments

10 Comments

Comment Preview

Your name will appear as username ( profile | log out )

You may use these HTML tags and attributes: <a href=""> <b> <em> <strong> <i> <blockquote>