{"id":187572,"date":"2017-04-13T23:29:09","date_gmt":"2017-04-14T03:29:09","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/what-individuals-should-do-now-that-congress-has-obliterated-the-fccs-privacy-protections-aclu-blog\/"},"modified":"2017-04-13T23:29:09","modified_gmt":"2017-04-14T03:29:09","slug":"what-individuals-should-do-now-that-congress-has-obliterated-the-fccs-privacy-protections-aclu-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/what-individuals-should-do-now-that-congress-has-obliterated-the-fccs-privacy-protections-aclu-blog\/","title":{"rendered":"What Individuals Should Do Now That Congress Has Obliterated the FCC&#8217;s Privacy Protections &#8211; ACLU (blog)"},"content":{"rendered":"<p><p>    Congress has voted to reverse new FCC privacy    protections that would have required internet service providers    (ISPs) like Comcast, Verizon, and AT&T to seek your    permission before sharing information about your browsing    history, location history, contacts, and other personal    information. Last Tuesday, President Trump signed the measure.  <\/p>\n<p>    There are some limited steps we as individuals can still take    to protect our data. But the truth is that none of them are    adequate when the companies that run wires into our home are    determined to spy on our use of their services. The best thing    Americans can do is to exercise their rights as citizens in a    democratic society through activism, voting, working to support    and oppose candidates, etc. Right now, people need to make    their displeasure heard, loud and clear. Check to see if your    senators and representative voted to protect the interests of    Big Telecom, or the interests of individuals who dont want to    be spied upon, profiled, bought and sold, and possibly     discriminated against. If they did the former, voice your    displeasure. Speak up online, support federal legislation to    restore these protections, advocate for your     state governments to take action to fill the gap left by    Congressand dont let your memory of this travesty fade away,    as telecom-supporting members of Congress are counting on you    to do.  <\/p>\n<p>    A common but inadequate response in situations like this is    that we should let the market decide. The reality for most    Americans is that the market has failed to provide meaningful    choice among network operators. Fully 51 percent of Americans        have only one real choice of broadband internet service    provider, and even the lucky Americans with access to two or    more providers may not see any meaningful difference between    the providers in terms of user privacy. This makes it    difficult, if not impossible, to vote with your wallet.  <\/p>\n<p>    What are the limited steps that people can take to restore the    privacy that     ought to be their right? There is no perfect solution, but    we have a few suggestions.  <\/p>\n<p>    Despite the obliteration of the FCCs privacy protections, most    ISPs (for now) offer consumers limited opportunity to opt out    of data sharing about their internet use, often referred to by    the legal term Customer Proprietary Network Information, or    CPNI. Although this step has definite limitations, it is    something that every customer should take advantage of.  <\/p>\n<p>    Unfortunately, the telecoms have every incentive to make    it difficult for you to do so, and often do not present    discoverable, meaningful options. This is a highly imperfect    solution from a policy standpoint  because of the difficulty    in opting out, because it throws the burden of protecting    privacy onto the customers when the law clearly places it on    carriers, and because it attempts to normalize surveillance by    making surveillance the default when the default should be    privacy.  <\/p>\n<p>    To look at what it takes to opt-out, we explored the sites of    the top ISPs in the United States. What we found is that their    opt-out procedures and options are hopelessly inadequate, and    that it was very difficult and time-consuming to get accurate    information from the companies. When we sought help from    Comcasts customer service chat, for example, it took over 20    minutes to get a link to their privacy policy, and they did not    provide any information on how to opt out of information    sharing. We also found that the companies privacy policies    were generally vague and lacking in information about exactly    what data is collected by the ISP and what a broadband user can    expect in terms of privacy. Furthermore, none of the opt-out    options appeared to allow a user to opt out of having    information about their personal browsing histories retained    and stored, which many people find offensivesome ISPs merely    let users opt out of getting ads based on the collection and    storage of that data. Other ISPs will still send some marketing    materials based on the information they have collected, even if    the user has opted out.  <\/p>\n<p>    Here are links to opt-out pages for the leading ISPs:  <\/p>\n<p>    AT&T: Instructions on opting out of    various uses of data are here,    including this CPNI    Restriction Request Form  <\/p>\n<p>    CenturyLink: Instructions for opt-outs on    marketing contacts as well as other practices are     here.  <\/p>\n<p>    Charter Spectrum: Privacy preferences can be    set here and by    calling the company as described in Charters     privacy policy in the sections entitled Can I prohibit or    limit Charters use and disclosure of my personally    identifiable information? and Charter Residential Customer    Proprietary Network Information (CPNI) Policy. Charter has    acquired Time-Warner Cable, but TWC still has a CPNI Opt Out    form online     here.  <\/p>\n<p>    Cox: Features a Privacy Settings page    to opt out of marketing based on CPNI as well as other uses of    data such as location-based advertising.  <\/p>\n<p>    Comcast: Information about opting out of    various uses of information is contained within Comcasts    xfinity     privacy policy.  <\/p>\n<p>    Verizon: Instructions to opt out of various    uses of internet, cell phone, and television services are    here    (in the section How to limit the sharing and use of your    information) and     here.  <\/p>\n<p>    If you use a smaller ISP not listed above, a providers privacy    policy is generally the place to look for opt-out instructions    and links. Nearly all companies include a link to a privacy    policy on their main page, though it is often in very small    print at the very bottom of the page.  <\/p>\n<p>    Encryption is an effective way of hiding the content of your    communications from an ISPs prying eyes (not to mention those    of other parties). Encryption will block your ISP from seeing    the content of your communications, but depending on the    application it may still permit them to see your metadata (such    as who you are communicating with and\/or when).                                                                             <\/p>\n<p>    Nevertheless, using encrypted communications and apps as much    as possible is a good idea. As weve recommended     before, for example, everyone should use Signal where    possible to replace traditional text messaging or voice calls.    Of course, many of your friends may use an end-to-end encrypted    messaging app like Signal or Apples iMessage, but many may    not, and you will be obliged to communicate with those friends    over channels that your ISPand theirscan snoop on. So    encourage your friends to move to better messaging platforms!  <\/p>\n<p>    You can also use the HTTPS Everywhere    browser extension, developed by our friends at The Tor Project    and the Electronic Frontier Foundation, to force more of your    web browsing to HTTPS. When a customer connects to a web site    that uses HTTPS (as opposed to plain unencrypted HTTP), the ISP    cant see the exact pages within a site that a customer is    reading, or the content of the pages that he or she downloads.    The ISP will, however, still see that youre visiting the site    itself (i.e. <a href=\"http:\/\/www.autism.org\" rel=\"nofollow\">http:\/\/www.autism.org<\/a>    or <a href=\"http:\/\/www.aids.gov\" rel=\"nofollow\">http:\/\/www.aids.gov<\/a>). Another    limitation is that while many web sites have shifted to HTTPS,    many have not, and the end-user has no control over that.  <\/p>\n<p>    Despite such limitations, moving to encrypted communications as    much as possible is a good idea and is a step that will protect    your privacy not only from your ISP, but also potentially from    other parties ranging from the IT workers in your office to the    NSA.  <\/p>\n<p>    In addition to using encrypted communications, you might want    to protect more of your metadata (information about where you    are going and who you are communicating with on the internet).    One approach is to use a Virtual Private Network (VPN), which    creates an encrypted connection between a customers computer    and the VPNs network, and routes all of the customers traffic    through that remote network, leaving the customers ISP unable    to see either the content or the destination of a customers    communications. Configured this way, the VPN acts as an    encrypted proxy to the rest of the internet. VPNs can be an    effective way of preserving some degree of privacy against some    parties, including ISPs.  <\/p>\n<p>    The use of VPNs has a number of significant limitations you    should be aware of.  <\/p>\n<p>    VPNs cost money, forcing you to pay for privacy that should be    your right (and which many Americans cannot afford). Unless    expertly configured, a VPN may not cover the growing eco-system    of     Internet of Things devices that is appearing in many homes,    such as personal assistants (like the Amazon Echo), smart or    GPS watches, FitBits, appliances, etc. Even with use of a VPN,    your ISP can still see the amount of data you are sending and    receiving, and at what times. And VPNs can slow down your    internet data speeds, because all your traffic has to be    funneled through a remote server. It might introduce delay into    video chats or VoIP phone calls, for example.  <\/p>\n<p>    Finally, use of a VPN just shifts the privacy issues to a new    party. When you use a VPN, many details about your internet    usage become invisible to your ISPbut whatever party is    operating the VPN service (employer, third-party service, etc.)    then gains access to all that information. For this and other    reasons, its important to do good research and be very careful    about whom you select as a VPN provider. Your choice may depend    on whom you're trying to protect yourself from: someone who is    trying to avoid the local advertising agency might have a    different set of choices than someone who is trying to avoid    immigration authorities or a vindictive city councilmember. The    Electronic Frontier Foundation lists questions that should    guide your VPN choice     here.  <\/p>\n<p>    Another option for protecting privacy is to do your browsing    through Tor, which is an    encrypted network of servers that bounce your traffic around    between you and the site youre visiting so that it cant be    tracked. The simplest way to use Tor is to download    and install the Tor Browser and use it instead of your    normal web browser. Installing and using the Tor Browser wont    have any effect on your normal web browser, so you can try it    out and still easily switch back, or use Tor for some of your    browsing and another web browser the rest of the time.  <\/p>\n<p>    As with a VPN, your ISP will be able to see the amount and    timing of your data transmissions over Tor, but it will all    come and go from the Tor guard    node to which you are connected, and it will all be    encrypted. Even more than a VPN, Tor can slow down a users    internet speeds. Furthermore, some website operators     block traffic that arrives over Tor, which can be    frustrating if you need to visit those sites.  <\/p>\n<p>    To avoid losing advertising dollars, ISPs might be tempted to    detect customers use of Tor Browser or VPNs and deliberately    slow down that traffic in order to discourage people from    protecting their privacy in that way. Fortunately, the FCCs    network neutrality rules prohibit that kind of interference    with customers traffic. Thats greatas long as Congress or    Trumps FCC doesnt undo the network neutrality rules as they    have the privacy rules. So privacy-conscious Americans are    advised to politically agitate for the preservation of network    neutrality in addition to agitating for the restoration of    broadband privacy.  <\/p>\n<p>    Overall, nobody should view any of the above suggestions as a    permanent fix for the problem that Congress has created by    nuking the FCCs privacy protections. When something bad    happens, its natural to want assurance that we still can be in    control of our own destiny. Taking advantage of the limited    steps that are available can be a good idea, but the best thing    Americans can do about this betrayal of their privacy is to    exercise their right to support and oppose candidates, to vote,    and to engage in vocal speech and vigorous activism.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.aclu.org\/blog\/free-future\/what-individuals-should-do-now-congress-has-obliterated-fccs-privacy-protections\" title=\"What Individuals Should Do Now That Congress Has Obliterated the FCC's Privacy Protections - ACLU (blog)\">What Individuals Should Do Now That Congress Has Obliterated the FCC's Privacy Protections - ACLU (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Congress has voted to reverse new FCC privacy protections that would have required internet service providers (ISPs) like Comcast, Verizon, and AT&#038;T to seek your permission before sharing information about your browsing history, location history, contacts, and other personal information.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/what-individuals-should-do-now-that-congress-has-obliterated-the-fccs-privacy-protections-aclu-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-187572","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187572"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=187572"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187572\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=187572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=187572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=187572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}