{"id":51245,"date":"2015-01-02T07:50:11","date_gmt":"2015-01-02T12:50:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa\/"},"modified":"2015-01-02T07:50:11","modified_gmt":"2015-01-02T12:50:11","slug":"leaked-nsa-documents-reveal-how-to-hide-from-the-nsa","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa\/","title":{"rendered":"Leaked NSA Documents Reveal How To Hide From The NSA"},"content":{"rendered":"<p><p> PC Format Magazine  via Getty Images New information reported by Der Spiegel  suggests staying anonymous online is a more accessible prospect  than it seems. (Photo by Simon Lees\/PC Format Magazine via Getty  Images)  <\/p>\n<p>    If you want a truly anonymous life, then maybe    it's time you learned about Tor, CSpace and ZRTP.  <\/p>\n<p>    These three technologies could help people        hide their activities from the National Security Agency,    according to     NSA documents newly obtained from the archive of former    contractor Edward Snowden by the German magazine     Der Spiegel.  <\/p>\n<p>    The combination of Tor, CSpace and ZRTP (plus    another anonymizing technology for good measure) results in    levels of protection that the NSA deems \"catastrophic\" --    meaning the organization has \"near-total loss\/lack of insight    to target communications,\" according to Der Spiegel.  <\/p>\n<p>    \"Although the documents are around two years    old, experts consider it unlikely the agency's digital spies    have made much progress in cracking these technologies,\"    Spiegel's staff     wrote.  <\/p>\n<p>    In comparison, accessing somebody's Facebook    messages is considered a \"minor\" task for the agency.    Similarly, virtual private networks (or VPNs), which are widely    used by companies, are easily accessed by the NSA, according to    Der Spiegel's report, as are so-called \"HTTPS\"    connections.  <\/p>\n<p>    So, what are these services and what do you    actually have to do to use them?  <\/p>\n<p>        Tor is basically a network that offers an easy way for    people to mask their location when communicating online. Anyone    can download Tor's web browser -- it's available on Mac,    Windows, Linux, and smartphones. It's not foolproof: When using    Tor, you're advised to sacrifice the convenience of browser    plugins, torrent downloads, and websites that don't use \"HTTPS    encryption\" if you truly want to stay off the grid.  <\/p>\n<p>    And that's just if you want to mask your online    habits -- messaging and phone calls require more steps still,    meaning you also have to add CSpace and ZRTP if you want to    hide those from the NSA, according to Der Spiegel.  <\/p>\n<p>        CSpace is a program that lets people text chat and transfer    files, while ZRTP is a form of encryption that protects mobile    phone calls and texting -- it's used in apps like     RedPhone and     Signal.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.msn.com\/en-us\/news\/technology\/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa\/ar-BBhoOkV?srcref=rss\/RK=0\/RS=PxohzgkYBff4UbK.IQh6YhAPw30-\" title=\"Leaked NSA Documents Reveal How To Hide From The NSA\">Leaked NSA Documents Reveal How To Hide From The NSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> PC Format Magazine via Getty Images New information reported by Der Spiegel suggests staying anonymous online is a more accessible prospect than it seems. (Photo by Simon Lees\/PC Format Magazine via Getty Images) If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-documents-reveal-how-to-hide-from-the-nsa\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-51245","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/51245"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=51245"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/51245\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=51245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=51245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=51245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}