Now it is completely disclosed that how the National Security Agency has broad powers to capture private information and According to the various reports on the Internet by many websites that they all know that who we’re calling and also have access to our Emails, messages, chats over social websites including the Facebook, which we use on the daily basis and let we share and post personal stuffs but they are under NSA Surveillance.
It is totally impossible to stop this online harassment by NSA but we can take some security methods to hide our online presence and bypass NSA Prism, as lots of stuff over there on the internet but we will tell you 5 most useful tactics you can use.
1. Use TOR to browser over the Internet
According to the Washington post, NSA whistleblower Edward Snowden has been photographed with a Tor sticker on his laptop and Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Download TOR
2. Use OTR to secure your Chat conversation
Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing
- Encryption – No one else can read your instant messages.
- Authentication- You are assured the correspondent is who you think it is.
- Deniability- The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages he sees are authentic and unmodified.
- Perfect forward secrecy- If you lose control of your private keys, no previous conversation is compromised.
Download OTR
3. Make secure calls with Silent Circle
The conventional telephone network is vulnerable to government wiretapping. And many Internet-based telephony applications, including Skype, are thought to be vulnerable to interception as well.
If we talk about Silent Circle it will work, When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iPhone, Android device, iPad or Windows computer on our crystal-clear secure network and at the last we can say you can Shut-Out the NSA Survillance.
More about Silent Circle
4. Make secure calls with Redphone
Redphone is another application that makes phone calls with end-to-end encryption. Interestingly, it was developed with financial support from U.S. taxpayers courtesy of the Open Technology Fund.
The government hopes to support dissidents in repressive regimes overseas. But the only way to build a communications application that people will trust is to make it impervious to snooping by any government, including ours. So like Silent Circle, the Redphone client software is open source and has been independently audited to make sure there are no back doors.
More about Redphone
5. Remove your cellphone battery to thwart tracking
The NSA phone records program revealed by the Guardian last week not only collects information about what phone numbers we call, it also collects data about the location of the nearest cellphone tower when we make calls. That gives the NSA the ability to determine your location every time you make a phone call — and maybe in between calls too.
Unfortunately, Soghoian says there’s no technical fix for this kind of surveillance. “The laws of physics will not let you hide your location from the phone company,” he says. The phone company needs to know where you are in order to reach you when you receive a phone call.
So if you don’t want the NSA to know where you’ve been, you only have one option: You need to turn off your cell phone. Or if you’re feeling extra paranoid, take out the battery or leave your phone at home.
You can take the above steps to hide your identity over Internet and we also want your views to say on NSA Surveillance, for your response you can mail us to p[email protected] or you can suggest in the comment or by Fill up the Form below and we will publish them in our article and tweets.
[contact-form-7 404 "Not Found"]
I want to say – FUCK this NSA
[…] also gave you 5 Ways by which you can bypass the surveillance of NSA, so here is one more app coming nearby you by which […]
[…] http://hackersnewsbulletin.com/2013/06/5-ways-to-come-out-from-the-nsa-prism-its-easy-to-bypass-them… […]
Tor is now being questioned
#3 and #4 require a baseband.
Any device with a baseband can easily be hacked by the baseband exploit (which the feds already use). Once you own the baseband/sim you can listen to audio going into the mic and out of the speaker, so encryption can not possibly help. The baseband is independent of the OS, and can not be secured from within the OS. This means you can NOT secure a phone call AT ALL on a cellphone.
I run the Liberty Private Network and that is why we do not sell devices with basebands.
If you take out your cell phone’s battery it will still be active. every phone/device that can remember the date and hour has an auxiliary power supply to do that, which makes the device easy to listen or be located.