Anyone opposing the Chumph – if he survives the next 45 days to actually become President, is going to need some personal protection against the FBI searching your computes, phones, and other electronic devices as, under Comey they become the Chumph’s Gestapo. The FBI just gained substantial power to mass search electronic devices under a new Legislative change called Rule 41,
What this means is that if the Chumph declares any group or organization a conspiracy – the FBI can search all computers and electronic devices which anyone has used to communicate within, or outside the group to the group. If you send a Tweet to Black Lives Matter, under the Chumph the FBI would gain the ability and authority to search every one of your electronic devices.
So, it is up to you to protect yourselves. This article gives good advice on many openly commercial ways with which to protect from FBI spying. If you are planning anything more active than a small, nonviolent protest march – instead of active participation in BLM, or more active types of resistance, I’d suggest you find your way over onto the Darknet where there are some very good tools. Suggest you also investigate and acquire a system called Blockchain. Blockchain secures information between “trusted” computers. The commercial version is definitely hack-able by NSA, because the NSA forces us developers to put “back doors” into commercial software for them to spy. The stuff found on the Darknet isn’t “commercial” and is designed to defeat even high level spying.
Remember, there is no such thing as an un-hackable system. It really just boils down to the cost and resources required to break any system. Which is why the Military frequently changes really critical systems. With the Chumph being Putin’s bitch, the Russians will be given free rein to invade systems on his behalf. They are a lot more sophisticated and capable enemy than anything the FBI can do.
One of the FBIs Control Centers. Remember, under Comey and Putin’s bitch – these guys no longer work for you.
Protect your privacy during Trump’s reign: A hacker’s guide to being cyber-safe
Protecting individual privacy from government intrusion is older than American democracy
Protecting individual privacy from government intrusion is older than American democracy. In 1604, the attorney general of England, Sir Edward Coke, ruled that a man’s house is his castle. This was the official declaration that a homeowner could protect himself and his privacy from the king’s agents. That lesson carried into today’s America, thanks to our Founding Fathers’ abhorrence for imperialist Great Britain’s unwarranted search and seizure of personal documents.
They understood that everyone has something to hide, because human dignity and intimacy don’t exist if we can’t keep our thoughts and actions private. As citizens in the digital age, that is much more difficult. Malicious hackers and governments can monitor the most private communications, browsing habits and other data breadcrumbs of anyone who owns a smartphone, tablet, laptop or personal computer.
President-elect Donald Trump’s criticism of encryption technology and interest in expanding government surveillance have technologists and civil libertarians deeply concerned.
As an ethical hacker, my job is to help protect those who are unable, or lack the knowledge, to help themselves. People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. Here’s what they — and I — advise, and why. I have no affiliation or relationship with any of the companies listed below, except in some cases as a regular user.
Phone calls, text messaging and email
When you’re communicating with people, you probably want to be sure only you and they can read what’s being said. That means you need what is called “end-to-end encryption,” in which your message is transmitted as encoded text. As it passes through intermediate systems, like an email network or a cellphone company’s computers, all they can see is the encrypted message. When it arrives at its destination, that person’s phone or computer decrypts the message for reading only by its intended recipient.
For phone calls and private text-message-like communication, the best apps on the market are WhatsApp and Signal. Both use end-to-end encryption and are free apps available for iOS and Android. In order for the encryption to work, both parties need to use the same app.
For private email, Tutanota and ProtonMail lead the pack in my opinion. Both of these Gmail-style email services use end-to-end encryption, and store only encrypted messages on their servers. Keep in mind that if you send emails to people not using a secure service, the emails may not be encrypted. At present, neither service supports PGP/GPG encryption, which could allow security to extend to other email services, but they are reportedly working on it. Both services are also free and based in countries with strong privacy laws (Germany and Switzerland). Both can be used on PCs and mobile devices. My biggest gripe is that neither yet offers two-factor authentication for additional login security.
Avoiding being tracked
It is less straightforward to privately browse the internet or use internet-connected apps and programs. Internet sites and services are complicated business, often involving loading information from many different online sources. For example, a news site might serve the text of the article from one computer, photos from another, related video from a third. And it would connect with Facebook and Twitter to allow readers to share articles and comment on them. Advertising and other services also get involved, allowing site owners to track how much time users spend on the site (among other data).