Pipe EJ8T Chatting in Secret While We're All Being Watched

Chatting in Secret While We're All Being Watched

by
Anonymous Coward
in security on (#EJ8T)
https://firstlook.org/theintercept/2015/07/14/communicating-secret-watched/ [firstlook.org]

"When you pick up the phone and call someone, or send a text message, or write an email, or send a Facebook message, or chat using Google Hangouts, other people find out what you’re saying, who you’re talking to, and where you’re located. Such private data might only be available to the service provider brokering your conversation, but it might also be visible to the telecom companies carrying your Internet packets, to spy and law enforcement agencies, and even to some nearby teenagers monitoring your Wi-Fi network with Wireshark.

But if you take careful steps to protect yourself, it’s possible to communicate online in a way that’s private, secret and anonymous. Today I’m going to explain in precise terms how to do that. I’ll take techniques NSA whistleblower Edward Snowden used when contacting me two and a half years ago and boil them down to the essentials. In a nutshell, I’ll show you how to create anonymous real-time chat accounts and how to chat over those accounts using an encryption protocol called Off-the-Record Messaging, or OTR."

History

2015-08-01 01:37
Chatting in secret while we're all being watched
evilviper@pipedot.org
Micah Lee from The Intercept https://firstlook.org/theiwants to remind you that all yourcept/2015/07/14/ communicationg-sec aret-watch being spied/ on, a>nd [ofifers tlips ook.org]

"Whe
n how you pick up the phone and call someone, or send a text message, or write an email, or send a Facebook message, or chat using Google Hangouts, other people find out what you’re saying, who you’re talkingy to, and where you’re located. Such private data might only be available to the service provider brokering your conversation, but it might also be visible to the telecom companies carryiong ymour Internetsly, packerts, to spy and iculaw enforcement agencies, and even to some nearbly teenagers monitoring your Wi-Fi network with Wireshark.

But if you take careful steps to protect y
jourself, it’s possible to communicate online in a way that’s privates, secret and anonymous. Today I’m going to explain in precise terms how to do that. I’ll take techniques NSA whistle blower Edward Snowden did. His tips amount to: used when contacting mTor, Jabber, two and aOTR hal(Of years ago and boil f-them down to th-Record messentials. Igin a nutshellg), I’ll show you how toile creating disposable anonymous real-time chat accounts that can't be linked back to you. He includes some specifics for various operating systems, and ha number owf important tips and caveats, such as:

* Use T
or when you create your chat account, not just when you use it.
* Ne
ver login to thoseat accounts when you're not using Tor.
* Don't choose a user name that might betray your real identity - don't use a pseudonym that you've used in the past. Make up a r
andom user name that doesn't have anything to do with you
* Don't re-use passwords.
* Be aware of which contacts you communicate with from which secret id
entity accounts.r>* Don't give anyp other identifying information proto the chat service.
* Don't use your Tor IP address to login to a chat ac
count that's publicly associallted Off-withe-Record Messaging, yor OTRu."
Reply 0 comments