Americans are advised to go into the digital underground: what is happening?

Man

Professional
Messages
3,222
Reaction score
975
Points
113
Experts are proposing measures to counter surveillance.

Cybersecurity experts have called on Americans to reconsider their approach to protecting personal data ahead of Donald Trump's possible return to the presidency of the United States. According to experts, the new administration is ready to use the tools of state supervision more actively than any other administration in recent times.

Recommendations to strengthen digital security are particularly relevant for journalists, activists, minorities and other vulnerable groups. "No matter what platforms you use or what devices you have, you need to understand what data you're generating and then use the controls available to limit who can see your activity," said Runa Sandvik, a former New York Times digital security specialist and founder of Granitt.

Experts identify several key areas of protection:

Secure Communications

For secure communication, you need to use end-to-end encrypted messengers such as Signal, WhatsApp, iMessage, and FaceTime. Experts especially recommend Signal because the service does not collect metadata about calls and messages, offers a self-destructing message feature, and does not create backups in cloud storage. Facebook Messenger, Telegram, and X (formerly Twitter) are less reliable, according to experts, as the information can be accessed by companies and law enforcement agencies.

Device encryption

On modern smartphones with iOS and Android operating systems, full disk encryption is enabled by default. To strengthen protection, experts recommend setting a long alphanumeric password instead of a simple numeric code. Biometric Unlock should be temporarily disabled in critical situations. For MacOS laptops, you need to activate FileVault, on Windows Pro – BitLocker, and Windows Home users need to install Veracrypt.

Cloud storage

In recent years, companies have started offering end-to-end encryption for cloud services, including iCloud backups and Meta chats. However, experts recommend minimizing the use of cloud storage, as providers can access data at the request of the authorities. If you need to store sensitive information, you should first encrypt your files using special tools.

Online anonymity

To protect against tracking activities on the Internet, experts recommend using the Tor browser or its mobile counterpart Orbot. An alternative is the Brave browser with built-in anonymous browsing or Apple's iCloud Private Relay service. It is also useful to use reliable VPN services that do not keep logs of user activity.

Geolocation data

The protection of location information is becoming critical, as it allows you to determine a person's place of residence, work, social circle and even political views. It is recommended to limit app access to geolocation, use VPNs, and use ad blockers. iPhone users have access to Lockdown Mode, which restricts the functions of the device to increase security. In cases that require complete anonymity, experts advise leaving the devices at home or using special Faraday cases that block all electromagnetic signals.

Financial privacy

To protect against financial surveillance, experts recommend using cash whenever possible. The popular payment apps PayPal, Venmo, and Cash App, like most cryptocurrencies, do not provide a sufficient level of anonymity. Although some cryptocurrencies, such as Monero and Zcash, offer improved privacy protection, experts consider cash to be the most reliable means.

About Temporary Phones

Temporary or "burner" phones can serve as a tool to protect geolocation and other data. They are intended for short-term use without reference to the identity of the owner. However, experts do not recommend them to most users due to the difficulty of maintaining anonymity. Even when buying with cash, using a temporary phone for regular communication or turning it on at home can reveal the owner's identity. Instead, experts advise separating work and personal information on different devices.

Source
 
Top