{"id":2800,"date":"2015-05-21T07:16:22","date_gmt":"2015-05-21T11:16:22","guid":{"rendered":"https:\/\/english.cpnn-world.org\/?p=2800"},"modified":"2026-02-02T21:24:23","modified_gmt":"2026-02-02T20:24:23","slug":"6-simple-tools-to-protect-your-online-privacy-and-help-you-fight-back-against-mass-surveillance","status":"publish","type":"post","link":"https:\/\/english.cpnn-world.org\/?p=2800","title":{"rendered":"6 simple tools to protect your online privacy (and help you fight back against mass surveillance)"},"content":{"rendered":"<div style=\"float: left; width: 46%;\">\n<p>FREE FLOW OF INFORMATION<\/p>\n<p>An article by <a href=\"https:\/\/www.amnesty.org\/en\/articles\/blogs\/2015\/05\/6-simple-tools-to-protect-your-online-privacy-and-fight-back-against-mass-surveillance\/\"> Tanya O&#8217;Carroll, Amnesty International<\/a> <\/p>\n<p>As intelligence agencies hoover up more and more of our online communications, we\u2019ve compiled a list of some simple apps and tools to help protect your privacy and make your calls, emails, texts and chats more secure.<\/p>\n<p><center><a href=\"https:\/\/english.cpnn-world.org\/wp-content\/uploads\/2015\/05\/privacy.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/english.cpnn-world.org\/wp-content\/uploads\/2015\/05\/privacy.jpg\" alt=\"privacy\" width=\"868\" height=\"563\" class=\"alignnone size-full wp-image-2801\" srcset=\"https:\/\/english.cpnn-world.org\/wp-content\/uploads\/2015\/05\/privacy.jpg 868w, https:\/\/english.cpnn-world.org\/wp-content\/uploads\/2015\/05\/privacy-300x195.jpg 300w\" sizes=\"auto, (max-width: 868px) 100vw, 868px\" \/><\/a><br \/>\n<\/center><\/p>\n<p>Faced with the enormous power of agencies such as the NSA and GCHQ, it can feel like there is little we can do to fight back. However, there are some great ways you can take control of your private communications online.<\/p>\n<p>The six tools below, which have been designed with security in mind, are alternatives to the regular apps and software you use. They can give you more confidence that your digital communications will stay private.<\/p>\n<p>Note: No tool or means of communication is 100% secure, and there are many ways that governments are intercepting and collecting our communications. If you&#8217;re an activist or journalist, you should use these tools as part of a comprehensive security plan, rather than on their own. Additionally, this list is by no means comprehensive \u2013 we recommend checking out Security-in-a-Box (from Tactical Technology Collective and Front Line Defenders) and Surveillance Self-Defense (from the Electronic Frontier Foundation) too.<\/p>\n<p>1. TextSecure \u2013 for text messages<\/p>\n<p>TextSecure is an easy-to-use, free app for Android (iPhones have a compatible app called Signal). It looks a lot like WhatsApp and encrypts your texts, pictures, video and audio files. The app is open-source and provides end-to-end encryption. That means only you and the person you are sending to will be able to read the messages. (See below for an explanation of technical terms.)<\/p>\n<p>2. Redphone \u2013 for voice calls<\/p>\n<p>Redphone is another free, open-source app for Android (for iPhones it\u2019s the same Signal app, which combines voice calls and messaging) which encrypts your voice calls end-to-end. All calls are over the internet, so you only pay for wifi or data rather than using your phone\u2019s credit.<\/p>\n<p>3. meet.jit.si \u2013 for video calls and instant messaging<\/p>\n<p>meet.jit.si is a free and open-source service to secure your voice calls, video calls, video conferences, instant messages and file transfers. It runs directly in your browser with no need to download anything and allows you to invite multiple people to join a video call. It\u2019s a bit like Google hangouts, but your calls and chats are encrypted end-to-end. There is also a desktop version called Jitsi which you can download for Windows, Linux, Mac OS X and Android.<\/p>\n<p>4. miniLock \u2013 for file sharing<\/p>\n<p>This free and open-source plug-in for your web browser lets you encrypt files \u2013 including video, email attachments and photos \u2013 and share them with friends really easily. You can upload and send your file to selected contacts by using their unique miniLock id, meaning your file can only be downloaded by the person you share it with.<\/p>\n<p>(Article continued on right side of page)<\/p>\n<p>(Click <a href=\"http:\/\/french.cpnn-world.org\/?p=2803\">here for a version in French<\/a> of this article or <a href=\"http:\/\/spanish.cpnn-world.org\/?p=2831\">here for a version in Spanish<\/a>.)<\/p>\n<\/div>\n<div style=\"float: right; width: 46%;\">Question related to this article:<\/div>\n<div style=\"float: right; width: 46%;\"><\/div>\n<div style=\"float: right; width: 46%;\">\n<p align=\"justify\">\n<p>How can we protect our online privacy?<\/p>\n<p>(Article continued from left side of page)<\/p>\n<p>5. Mailvelope \u2013 for more secure email <\/p>\n<p>This is a free add-on for your web browser which provides end-to-end encryption for your emails. It can be configured to work with almost any web-based email provider, including Gmail, Yahoo and Outlook. It\u2019s open source and uses OpenPGP encryption.<\/p>\n<p>6. SpiderOak \u2013 for cloud sharing and storage<\/p>\n<p>This service helps you back-up your files, sync between multiple devices and share files privately with people you trust. It fully encrypts your data end-to-end which means that, unlike other cloud sharing and storage services such as Dropbox, even the company itself cannot see your documents on its servers. SpiderOak charges $12 each month for a personal account. It\u2019s not yet open-source.<\/p>\n<p>Quick guide to technical terms<\/p>\n<p>Encryption: This is a way of coding something that disguises the original form. Today\u2019s modern encryption, when well implemented, can be virtually unbreakable. When encrypting and decrypting content, a complex password \u2013 known as a key \u2013 is used for authentication. Very often this key is held by the company that provides services such as email or website hosting. That means that the company has full access to your data. Governments can compel the company to hand over this information or can try to hack into a company\u2019s server to get direct access. <\/p>\n<p>End-to-end encryption: With end-to-end encryption, the key is only known to you and never leaves your device. This means your communications stay between you and your correspondents only. To the company transmitting your communication \u2013 or anybody else who tries to intercept it \u2013 your messages will look like a long string of random numbers and letters. They can know who you communicated with but will not be able to access the contents. <\/p>\n<p>Open-source: Very often the code that makes up computer software is proprietary, meaning that whoever developed it has sole access to it. Open-source code is available for anyone to see and analyse. While it might seem counter-intuitive, this is widely considered to be the best way to make software secure. It helps ensure it doesn\u2019t do anything nasty, like providing a \u2018back door\u2019 for intelligence agencies, and that any security weaknesses can be discovered and patched up.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>FREE FLOW OF INFORMATION An article by Tanya O&#8217;Carroll, Amnesty International As intelligence agencies hoover up more and more of our online communications, we\u2019ve compiled a list of some simple apps and tools to help protect your privacy and make your calls, emails, texts and chats more secure. Faced with the enormous power of agencies &hellip; <a href=\"https:\/\/english.cpnn-world.org\/?p=2800\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">6 simple tools to protect your online privacy (and help you fight back against mass surveillance)<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,76],"tags":[11],"class_list":["post-2800","post","type-post","status-publish","format-standard","hentry","category-information","category-global","tag-global"],"_links":{"self":[{"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/posts\/2800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2800"}],"version-history":[{"count":1,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/posts\/2800\/revisions"}],"predecessor-version":[{"id":38725,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=\/wp\/v2\/posts\/2800\/revisions\/38725"}],"wp:attachment":[{"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/english.cpnn-world.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}