<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Keeping Your Data Private From the NSA</title>
	<atom:link href="http://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: bing.com</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-1068860</link>
		<dc:creator><![CDATA[bing.com]]></dc:creator>
		<pubDate>Thu, 04 Sep 2014 06:49:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-1068860</guid>
		<description><![CDATA[Hi! Do you know if they make any plugins to safeguard against hackers?

I&#039;m kinda paranoid about losing everything I&#039;ve worked hard on. Any recommendations?]]></description>
		<content:encoded><![CDATA[<p>Hi! Do you know if they make any plugins to safeguard against hackers?</p>
<p>I&#8217;m kinda paranoid about losing everything I&#8217;ve worked hard on. Any recommendations?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: seo new york</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-636862</link>
		<dc:creator><![CDATA[seo new york]]></dc:creator>
		<pubDate>Tue, 01 Jul 2014 19:43:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-636862</guid>
		<description><![CDATA[There is certainly a lot to learn about this subject.
I love all of the points you&#039;ve made.]]></description>
		<content:encoded><![CDATA[<p>There is certainly a lot to learn about this subject.<br />
I love all of the points you&#8217;ve made.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-490033</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 26 May 2014 07:01:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-490033</guid>
		<description><![CDATA[The Only Email System The NSA Can&#039;t Access
http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/

When the NSA surveillance news broke last year it sent shockwaves through CERN, the particle physics laboratory in Switzerland. Andy Yen, a PhD student, took to the Young at CERN Facebook group with a simple message: “I am very concerned about the privacy issue, and I was wondering what I could do about it.”

Encrypted emails have actually been around since the 1980s, but they are extremely difficult to use. When Edward Snowden asked a reporter to use an end-to-end encrypted email to share details of the NSA surveillance program the reporter couldn’t get the system to work, says Yen.

physics to found ProtonMail, a gmail-like email system which uses end-to-end encryption, making it impossible for outside parties to monitor.

“We encrypt the data on the browser before it comes to the server,” he explains. “By the time the data comes to the server it’s already encrypted

While half the team is now at MIT, some are still in Switzerland where the ProtonMail’s servers are housed for extra protection.

Yen has turned down venture capital firms looking to invest in ProtonMail.

ProtonMail’s revenue model is similar to something like Dropbox – charging only for extra storage.

“One of our motivations was human rights,” says Yen. “Having privacy is very important from a freedom of speech standpoint.”

The paid accounts will be $5/month and will provide 1GB of storage.]]></description>
		<content:encoded><![CDATA[<p>The Only Email System The NSA Can&#8217;t Access<br />
<a href="http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/" rel="nofollow">http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/</a></p>
<p>When the NSA surveillance news broke last year it sent shockwaves through CERN, the particle physics laboratory in Switzerland. Andy Yen, a PhD student, took to the Young at CERN Facebook group with a simple message: “I am very concerned about the privacy issue, and I was wondering what I could do about it.”</p>
<p>Encrypted emails have actually been around since the 1980s, but they are extremely difficult to use. When Edward Snowden asked a reporter to use an end-to-end encrypted email to share details of the NSA surveillance program the reporter couldn’t get the system to work, says Yen.</p>
<p>physics to found ProtonMail, a gmail-like email system which uses end-to-end encryption, making it impossible for outside parties to monitor.</p>
<p>“We encrypt the data on the browser before it comes to the server,” he explains. “By the time the data comes to the server it’s already encrypted</p>
<p>While half the team is now at MIT, some are still in Switzerland where the ProtonMail’s servers are housed for extra protection.</p>
<p>Yen has turned down venture capital firms looking to invest in ProtonMail.</p>
<p>ProtonMail’s revenue model is similar to something like Dropbox – charging only for extra storage.</p>
<p>“One of our motivations was human rights,” says Yen. “Having privacy is very important from a freedom of speech standpoint.”</p>
<p>The paid accounts will be $5/month and will provide 1GB of storage.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-453674</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 16 May 2014 06:47:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-453674</guid>
		<description><![CDATA[Who Has Your Back? 2014: Protecting Your Data From Government Requests
https://www.eff.org/who-has-your-back-government-data-requests-2014

We entrust our most sensitive, private, and important information to technology companies like Google, Facebook, and Verizon. Collectively, these companies are privy to the conversations, photos, social connections, and location data of almost everyone online. The choices these companies make affect the privacy of every one of their users. So which companies stand with their users, embracing transparency around government data requests? Which companies have resisted improper government demands by fighting for user privacy in the courts and on Capitol Hill? In short, which companies have your back?

These questions are even more important in the wake of the past year’s revelations about mass surveillance, which showcase how the United States government has been taking advantage of the rich trove of data we entrust to technology companies to engage in surveillance of millions of innocent people in the US and around the world.]]></description>
		<content:encoded><![CDATA[<p>Who Has Your Back? 2014: Protecting Your Data From Government Requests<br />
<a href="https://www.eff.org/who-has-your-back-government-data-requests-2014" rel="nofollow">https://www.eff.org/who-has-your-back-government-data-requests-2014</a></p>
<p>We entrust our most sensitive, private, and important information to technology companies like Google, Facebook, and Verizon. Collectively, these companies are privy to the conversations, photos, social connections, and location data of almost everyone online. The choices these companies make affect the privacy of every one of their users. So which companies stand with their users, embracing transparency around government data requests? Which companies have resisted improper government demands by fighting for user privacy in the courts and on Capitol Hill? In short, which companies have your back?</p>
<p>These questions are even more important in the wake of the past year’s revelations about mass surveillance, which showcase how the United States government has been taking advantage of the rich trove of data we entrust to technology companies to engage in surveillance of millions of innocent people in the US and around the world.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-207286</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Mar 2014 09:32:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-207286</guid>
		<description><![CDATA[How to foil the NSA and GCHQ with strong encryption
Column Now is the time to secure your communications
http://www.theinquirer.net/inquirer/opinion/2331668/how-to-foil-the-nsa-and-gchq-with-strong-encryption

THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.

The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It’s available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service.

Whether or not you’re interested in the Blackphone to secure your phone calls and messages from unwarranted snooping by government intelligence agencies in the US, UK and elsewhere, there are other measures you can take to keep your private communications secure from the prying Five Eyes and others, and these have become easier to use in recent years.

There’s Pretty Good Privacy (PGP) for email as implemented by the OpenPGP Alliance and the GnuPG project for all major operating systems, including Windows, Mac OS X, Linux, BSD, Android and iOS. There are also a number of secure email service providers.

For online chat, there’s the Off The Record (OTR) plugin for Pidgin with several implementations.]]></description>
		<content:encoded><![CDATA[<p>How to foil the NSA and GCHQ with strong encryption<br />
Column Now is the time to secure your communications<br />
<a href="http://www.theinquirer.net/inquirer/opinion/2331668/how-to-foil-the-nsa-and-gchq-with-strong-encryption" rel="nofollow">http://www.theinquirer.net/inquirer/opinion/2331668/how-to-foil-the-nsa-and-gchq-with-strong-encryption</a></p>
<p>THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.</p>
<p>The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It’s available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service.</p>
<p>Whether or not you’re interested in the Blackphone to secure your phone calls and messages from unwarranted snooping by government intelligence agencies in the US, UK and elsewhere, there are other measures you can take to keep your private communications secure from the prying Five Eyes and others, and these have become easier to use in recent years.</p>
<p>There’s Pretty Good Privacy (PGP) for email as implemented by the OpenPGP Alliance and the GnuPG project for all major operating systems, including Windows, Mac OS X, Linux, BSD, Android and iOS. There are also a number of secure email service providers.</p>
<p>For online chat, there’s the Off The Record (OTR) plugin for Pidgin with several implementations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: fujitsu air conditioning</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-112789</link>
		<dc:creator><![CDATA[fujitsu air conditioning]]></dc:creator>
		<pubDate>Thu, 13 Feb 2014 02:31:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-112789</guid>
		<description><![CDATA[Fastidious replies in return of this question 
with firm arguments and explaining everything concerning that.]]></description>
		<content:encoded><![CDATA[<p>Fastidious replies in return of this question<br />
with firm arguments and explaining everything concerning that.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: wedding stationery</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-50712</link>
		<dc:creator><![CDATA[wedding stationery]]></dc:creator>
		<pubDate>Thu, 23 Jan 2014 02:51:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-50712</guid>
		<description><![CDATA[Hey there pleasant blog site! Guy. Excellent. Superb. I&#039;m going to book mark your web site and go ahead and take rss feeds as well? I am just content to locate quite a few helpful facts listed here from the placed, we&#039;d like develop additional tactics within this regard, thanks for spreading.]]></description>
		<content:encoded><![CDATA[<p>Hey there pleasant blog site! Guy. Excellent. Superb. I&#8217;m going to book mark your web site and go ahead and take rss feeds as well? I am just content to locate quite a few helpful facts listed here from the placed, we&#8217;d like develop additional tactics within this regard, thanks for spreading.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: http://twitter.com/BurkeStrobel</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-34161</link>
		<dc:creator><![CDATA[http://twitter.com/BurkeStrobel]]></dc:creator>
		<pubDate>Sun, 15 Dec 2013 06:36:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-34161</guid>
		<description><![CDATA[Paragraph writing is also a excitement, if you know then you can write or else it is complicated to write.]]></description>
		<content:encoded><![CDATA[<p>Paragraph writing is also a excitement, if you know then you can write or else it is complicated to write.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: nokia tracking</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-34160</link>
		<dc:creator><![CDATA[nokia tracking]]></dc:creator>
		<pubDate>Wed, 20 Nov 2013 17:07:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-34160</guid>
		<description><![CDATA[Good day very nice site!! Man .. Excellent .. Superb ..

I will bookmark your site and take the feeds also?
I am glad to search out so many useful information right here in the submit, we want work out more strategies on this regard, thank
you for sharing. . . . . .]]></description>
		<content:encoded><![CDATA[<p>Good day very nice site!! Man .. Excellent .. Superb ..</p>
<p>I will bookmark your site and take the feeds also?<br />
I am glad to search out so many useful information right here in the submit, we want work out more strategies on this regard, thank<br />
you for sharing. . . . . .</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/13/keeping-your-data-private-from-the-nsa/comment-page-1/#comment-34159</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Sep 2013 08:58:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20288#comment-34159</guid>
		<description><![CDATA[AppDirect raises $9M, acquires Standing Cloud to help businesses adopt a hybrid network in the NSA’s wake
http://pandodaily.com/2013/09/10/appdirect-raises-9m-acquires-standing-cloud-to-help-businesses-adopt-a-hybrid-network-in-the-nsas-wake/

The revelations have led to questions concerning the safety of many US-based technology services, with some suggesting that consumers should boycott or avoid companies based in the country, whether they’ve been implicated in the leaks or not. (Many companies are unable to reveal government requests.)

The acquisition will allow AppDirect to better serve businesses seeking to use a privately-hosted cloud infrastructure instead of relying on public clouds. Daniel Saks, the company’s chief executive, says that this capability will become increasingly important as businesses adopt hybrid infrastructures which rely on both privately-and publicly-hosted networks.

“People are certainly more afraid of the cloud for certain things but are embracing it for others,” Saks says. “Our response to that is, let’s give customers options.”

US-based cloud networks have advantages over private networks, Saks says — namely that they can be more reliable and easier to scale. Privately-hosted networks, meanwhile, are often seen as more secure and less likely to be tampered with by the US government. Hybrid solutions are meant to offer the best of both set-ups.

“Businesses need to make the choice that their data is confidential and that it needs added security,” Saks says. They can use a private network to host that data, he says; for other information and services they can use public networks.

That approach is riddled with potentially — or perhaps probably — faulty assumptions, of course. Most of us are unaware of the NSA and other government agencies’ ability to gather information from anything connected to the Internet, whether it’s a smartphone or a privately-hosted network.

Relying on a private network to keep data secure is like hoping that encryption will protect your communications or that a blanket will ward off nightmarish creatures in the middle of the night: it might make some businesses and citizens feel better, but it’s unlikely to make much of a difference in practice.]]></description>
		<content:encoded><![CDATA[<p>AppDirect raises $9M, acquires Standing Cloud to help businesses adopt a hybrid network in the NSA’s wake<br />
<a href="http://pandodaily.com/2013/09/10/appdirect-raises-9m-acquires-standing-cloud-to-help-businesses-adopt-a-hybrid-network-in-the-nsas-wake/" rel="nofollow">http://pandodaily.com/2013/09/10/appdirect-raises-9m-acquires-standing-cloud-to-help-businesses-adopt-a-hybrid-network-in-the-nsas-wake/</a></p>
<p>The revelations have led to questions concerning the safety of many US-based technology services, with some suggesting that consumers should boycott or avoid companies based in the country, whether they’ve been implicated in the leaks or not. (Many companies are unable to reveal government requests.)</p>
<p>The acquisition will allow AppDirect to better serve businesses seeking to use a privately-hosted cloud infrastructure instead of relying on public clouds. Daniel Saks, the company’s chief executive, says that this capability will become increasingly important as businesses adopt hybrid infrastructures which rely on both privately-and publicly-hosted networks.</p>
<p>“People are certainly more afraid of the cloud for certain things but are embracing it for others,” Saks says. “Our response to that is, let’s give customers options.”</p>
<p>US-based cloud networks have advantages over private networks, Saks says — namely that they can be more reliable and easier to scale. Privately-hosted networks, meanwhile, are often seen as more secure and less likely to be tampered with by the US government. Hybrid solutions are meant to offer the best of both set-ups.</p>
<p>“Businesses need to make the choice that their data is confidential and that it needs added security,” Saks says. They can use a private network to host that data, he says; for other information and services they can use public networks.</p>
<p>That approach is riddled with potentially — or perhaps probably — faulty assumptions, of course. Most of us are unaware of the NSA and other government agencies’ ability to gather information from anything connected to the Internet, whether it’s a smartphone or a privately-hosted network.</p>
<p>Relying on a private network to keep data secure is like hoping that encryption will protect your communications or that a blanket will ward off nightmarish creatures in the middle of the night: it might make some businesses and citizens feel better, but it’s unlikely to make much of a difference in practice.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
