your device, someone else is. OS participating in mass surveillance: • Apple (MacOS, iOS) • Windows (Win7,8,10, WP) • Android Own your OS: • Linux Distros / BSD / SlackWare • LineageOS (without GAPPS) or AOSP ROMS based
extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. Content data remain on the system for only 3-5 days, while metadata is stored for up to 30 days. "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."
is a much more subtle though much more effective means of fostering compliance with social norms or with social orthodoxy, much more effective than brute force could ever be » Glenn Greenwald « Why privacy matters » TED Talk, Oct. 2014
for any purpose. 1 : Study how the program works, and change it to make it do what you wish. 2 : Redistribute and make copies so you can help your neighbor. 3 : Improve the program, and release your improvements (and modified versions in general) to the public, so that the whole community benefits.
with Javascript injection • by malware • by ISP • by antivirus Letsencrypt : a "centralized" service to get a TLS certificate Configure your server to get A+ with SSL Labs and PFS (perfect forward secrecy) Forward secrecy protects past sessions against future compromises of secret keys or passwords.
like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services. https://prism-break.org/