{"id":213193,"date":"2017-08-25T03:45:47","date_gmt":"2017-08-25T07:45:47","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/is-there-anything-we-can-do-to-stop-someone-spying-on-us-newstalk-106-108-fm\/"},"modified":"2017-08-25T03:45:47","modified_gmt":"2017-08-25T07:45:47","slug":"is-there-anything-we-can-do-to-stop-someone-spying-on-us-newstalk-106-108-fm","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/is-there-anything-we-can-do-to-stop-someone-spying-on-us-newstalk-106-108-fm\/","title":{"rendered":"Is there anything we can do to stop someone spying on us? &#8211; Newstalk 106-108 fm"},"content":{"rendered":"<p><p>    Last year, a 16-year-old Mexican    schoolboy received an unsolicited text message making crude    sexual taunts. The text attempted to lure him into clicking on    a link at the bottom of the message. Had he clicked on the    link, his smartphone would have been secretly compromised,    allowing those targeting him to monitor everything he did,    steal login details, upload his contacts list and even spy on    him through his phones own microphone and    camera.  <\/p>\n<\/p>\n<p>    Whoever sent the message was using an    incredibly sophisticated piece of spyware created by an Israeli    company called NSO Group, which says it only sells its tools to    governments and law enforcement agencies around the world. It    is designed to track and monitor terrorists and other    high-profile criminals.  <\/p>\n<\/p>\n<p>    The researchers say they have no    conclusive evidence attributing these messages to specific    government agencies in Mexico. However, circumstantial evidence    suggests that one or more of NSOs government customers in    Mexico are the likely operators.  <\/p>\n<\/p>\n<p>    Many people on this side of the Atlantic    reading this report may be shocked to hear of a government    using spying tools to hack the smartphones belonging to    activists and journalists. At the same time, most people will    likely shrug their shoulders and say: Sure why would anyone    want to spy on me, Ive got nothing to hide?  <\/p>\n<\/p>\n<p>    But this is not about having something to    hide, it is about privacy. There are many things we all do    everyday which we dont want most people knowing about: How    often did you go to the toilet today? Did you have sex today?    Did you look up something online you wouldnt tell your family    or friends about?  <\/p>\n<\/p>\n<p>    We are all entitled to a private life,    and that goes for our digital lives as well as our offline    lives. And so, we should all be concerned about the use of    hyper-sophisticated tools like those from the NSO Group being    used against a 16-year-old boy.  <\/p>\n<\/p>\n<p>    The simple fact of the matter is that is    you have enough resources, then you can pretty much hack into    anything as long as it is connected to the internet. The    problem for you and me is the cost of compromising our lives is    dropping precipitously and the barrier which criminals have to    hurdle to find out the most intimate details of our lives is    getting lower and lower.  <\/p>\n<\/p>\n<p>    With such powerful tools available, the    question arises, is there anything I can do to protect myself?    The short answer is not really. If a committed adversary really    wants to hack into your smartphone, then they will likely be    able to succeed.  <\/p>\n<p>    However, that doesnt mean    you should just give up    completely and surrender your digital life to anyone who wants    to to take a look.  <\/p>\n<\/p>\n<p>    Here are some basic ways to harden your    online security to make what you do more private:  <\/p>\n<p>        Stop telling them everything:Every online service        that doesnt charge you to use it (Google, Facebook,        Twitter) is using your data as payment. When you sign up        they require a minimum level of information, but ask for a        whole lot more. If you dont want Facebook knowing when        your birthday is, then dont tell it. If you dont want        Google to know what your favorite pet it, dont tell it.        Oversharing of information is rife today on social media,        and while we may blame Facebook and Snapchat, the real        culprit is ourselves. If you dont want anyone to know        about it, just dont share it.      <\/p>\n<p>        Use the Tor browser:Tor, short for The Onion Router,        is a modified version of the Firefox browser which        anonymizes your identity by routing your IP address through        multiple nodes until no one knows where the traffic is        coming from or going to. Often associated with the dark        web, it is not just a tool for criminals, but one that can        be used by anyone who values their privacy.      <\/p>\n<p>        Dont eat the cookies:Third-party        cookies are the little bits of code websites use to track        your movements online. They are the reason why Facebook        will show you adverts for the nappies you were just looking        at on Amazon. Now through every major browser offers        the ability to turn off tracking cookies. It wont stop the        more determined companies tracking you, but it does shut        down the most common vector used by advertisers to build        usage profiles.      <\/p>\n<p>        Patch, patch, patch:Keep your software up to date.        One of the easiest ways for any hacker to compromise your        system is to use vulnerabilities in older versions of        software. So whether its iOS, Android or Windows, always        make sure you have installed the latest version available        to you.      <\/p>\n<p>        Free Wi-Fi may not be your friend:We all love        connecting to free Wi-Fi, particularly when were        travelling. But this is one of the easiest methods for        hackers to compromise a lot of peoples data in a very        short space of time. Make sure the network you are        connecting to is safe, particularly in locations like        airports and train stations.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.newstalk.com\/reader\/47.301.343\/103301\/\" title=\"Is there anything we can do to stop someone spying on us? - Newstalk 106-108 fm\">Is there anything we can do to stop someone spying on us? - Newstalk 106-108 fm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Last year, a 16-year-old Mexican schoolboy received an unsolicited text message making crude sexual taunts. The text attempted to lure him into clicking on a link at the bottom of the message. Had he clicked on the link, his smartphone would have been secretly compromised, allowing those targeting him to monitor everything he did, steal login details, upload his contacts list and even spy on him through his phones own microphone and camera.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/is-there-anything-we-can-do-to-stop-someone-spying-on-us-newstalk-106-108-fm\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-213193","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/213193"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=213193"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/213193\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=213193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=213193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=213193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}