You’re closer than you think to a career in tech. Our grads have launched rewarding new careers — you can too.View Our Jobs Report
So you don’t trust the government and you want privacy.
Assume the NSA pays 0.01cents per GB a month (which is 10 times cheaper than amazon) with a 20 million dollar budget and 114million house holds that leaves the NSA with 1.46gb per house hold. That’s a sizable sum, but not enough to hold any voice data. It’s probably just transactional data and keywords.
That would also mean that the NSA only has roughly $0.17 to spend on surveillance per American via this Prism program. Also take into consideration this blows the entire budget on storage and save nothing for data mining or the upkeep of systems.
This tells me one of two things; our information is very unsecure or they are lying about their numbers.
There’s a few things we can do to beef up our security and one of them is using TOR.
How to disappear completely.
What is TOR?
TOR was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.
Using TOR protects you from a form of internet snooping called “traffic analysis”. TOR helps reduce the risks of both simple and sophisticated traffic analysis by distributing your encrypted communications over several proxys of the internet so not one single proxy can link you to your destination.
Tor can’t solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don’t want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer’s configuration.
Installing TOR for Mac with homebrew
IF you don’t have homebrew installed (shame on you) open a terminal window and input the following
ruby -e “$(curl -fsSkL raw.github.com/mxcl/homebrew/go)
STEP 1 : Getting TOR
brew install tor
STEP 2 : Get the TOR browser
TOR won’t work on all websites but it’s a start.
SO now that you are decently protected from “traffic analysis” what about your phone?
Buy an Untraceable Phone!
Get a burner phone. Unlimited talk and text for 30 days. You can even buy it with Bitcoin
Anonymous Internet Banking
How to get a debit card that doesn’t have your name it that you can use anywhere that is connected to an IBAN bank number to deposit funds into.
In conclusion, No ones secrets are safe. Not even the governments. If the Americas state-of-the-art spy agency can’t keep its secrets secret what hope do you have?
Oh and if your password looks like this… you’d should probably change it.
Blog Post Author
Since we opened our doors in 2012, thousands of students have joined Flatiron School to launch new careers in tech.
Find the perfect course for you across our in-person and online programs designed to power your career change.
Connect with students and staff at meetups, lectures, and demos – on campus and online.
Have a question about our programs? Our admissions team is here to help.