Tuesday, December 16, 2014

So easy you ensure – Aftenposten

Thanks to Edward Snowden has monitoring of ordinary people been put on the agenda last year.

Last Friday, the issue was again applicable through Aftenposten revelations about mobile surveillance in the center of Oslo. Sunday evening came revelations that also the financial community at Aker Brygge is subjected to the same type of monitoring.

Aftenposten have found is the use of so-called IMSI catchere or false base stations if you want. With such a false base station can monitors potentially both listen to phone calls, read text messages and monitor data traffic.

This type of monitoring equipment is allowed used in Norway, but only by the police, Police Security Service and the National Security Agency. All of these have rejected that there are those who stand for the use of IMSI catchere in downtown Oslo.



Can you ensure you

Now is hardly the people behind these IMSI catch forwards looking for just you, but many ask themselves enough anyway if it is possible to hedge against monitoring and snooping on one’s private cell phone.

The answer is both yes and no. To take the bad news first. You can never ensure 100 percent against snooping, at least not as long as you are connected to one or another network (internet, mobile networks, wi-fi).

This means that as long as you want to communicate with someone electronically so there is a theoretical possibility that you are being watched. Unless network being monitored, the actual mobile or mobile to your communicating with, be compromised.

The good news is that you can make it much harder for any hackers. Do you have a smart phone, there are a number of apps and methods that can make your communication more secure.

You just have to make sure that the person you are communicating with using the same apps and methods. Here are our top tips to protect your mobile from snooping.



Voice

An IMSI catcher can route your calls through its own fake base station, further to the real mobile network, while the call being listened to.

An obvious solution to this is to encrypt the actual conversation. There are many types krypteringsapper, so the trick is to find one from a reputable publisher that has the confidence of the people who work with security.

The Swedish journalist Fredrik Laurin, among others known to work with Snowden- documents, told us about the app RedPhone on harvest data SKUP seminar. A similar app available for iPhone and called Signal. These two apps are compatible with each other, and is free to download.

RedPhone and Signal acts simply as a regular ringeapp on your mobile. You open it, find the contact or dial the number, also goes conversation encrypted via RedPhone instead via telephone network.

RedPhone will only make the call if the recipient also has RedPhone installed. If not you will be informed about this and you are instead offered to send an automatic SMS invite your contact to install the app.

RedPhone will probably not help you if someone has managed to install a spyware on the phone itself, but will effectively stop all attempts to listen to the conversation via an IMSI-catcher.

See also:

The experts point toward three major powers

Crisis Meeting for telecommunications companies today

SMS

Despite competition from the messaging like Facebook Messenger, Skype and WhatsApp, SMS remains popular. Indeed, it set a new record in the number of sent SMS messages in Telenor’s network this year with over 5 billion SMS messages.

But SMS is that you said being caught by IMSI catchere. It’s better with an app that puts safety first and encrypts messages in mobile before they are sent to the receiver.

The developers of RedPhone has also created the app Text Secure that does exactly this. Text Secure can replace the regular messaging app. Then it will automatically encrypt your message if the recipient also has Text Secure installed. If not, it will send the message as normal SMS. You as a user need and not do anything about it.

About the reports you have with the app installed, so you can see it by a small lock symbol appears next to each message. It means that the message is encrypted and secure.

On the iPhone is the plan to include Text Secure functionality into Signal app.



Email

To send e -mail safe is also possible via mobile, but then requires that you have created your own PGP key, and have learned how to use it.

In short, consists PGP key of two parts. One is public and can be shared with your contacts. This can be used to encrypt messages to you.

The second part of the key is private and exists only in you. Only this part of the key can be used to unlock encryption. It’s a bit tedious to set up, but goes quite automatically when you and your contact first have everything in place.

On Android, you can download apps APG and K-9 Mail. A guide on how to get started with these apps can be found here.

Also on iOS are a plethora of apps that support PGP. An alternative may be Privacy, PGP Messenger, which is free, or iPGMail costing a small buck.



Data To protect data traffic its involves the use of VPN or proxy. Briefly, it is a server that you connect to, and then connect to the internet for you.

A VPN service usually costs money, but encrypts Internet traffic. Here comes the dog to find a provider you trust when a dishonest VPN provider just as easily can monitor data traffic.

Private Internet Access and HideMyAss are two VPN vendors that have held for a while and seems to Having gained the trust of consumers. Both also offer apps that make it easy to connect to their server.

Proxies for its part may be free, but are often not encrypted and you seldom know who sits on the other end. An alternative is still Tor network. It can use on Android by downloading “Orbot: Proxy with Tor” from Play store.

On iOS is not as good possibilities. There’s something called Tor Browser App Store, but Tor project itself warns against this when they can not guarantee that it is safe. It is also full of advertisements.



Use antivirus

Encryption helps little if you’ve got a spyware onto the mobile. Then monitor capture messages and calls before they all leave the phone.

Most serious antivirusapper trying not only to detect viruses, but also spyware. Therefore, it may be wise to have antivirus installed such as Avast, Avira ellerBitDefender.

For iOS selection rather slunkent but it is ogsåp a more closed system.

If anyone has physical access to your phone helps it anyway little when one can approve spyware above antivirus. It is therefore wise to always use code on your phone and tablet.



How secure do you be?

Some people like to use the old indeed a “Have you nothing to hide, has you have nothing to fear. ” The truth is that one need not be criminal for wanting to have a private life, hacking of Hollywood celebrities and Snapchat leaks earlier this year demonstrates.

That said, it is difficult to protect themselves 100%. If anyone will really listen to you, or snoop on your phone, so they manage it if they are skilled enough. It does however require highly targeted attacks against just you.

For the vast majority will more random attacks be the main concern. Then it is just a matter of raising the threshold bit so they’d rather go after the next guy.

The article is written by and published on Klikk.no.

Read also:

Tablet with projector

Larger and cheaper than iPhone 6

Test of Samsung Galaxy Gear S

Published: 16.des. 2014 11:38

LikeTweet

No comments:

Post a Comment