aNewDomain.net — Online privacy is on everyone’s mind these days. But how can you communicate securely online, with absolute confidence that your correspondence will only be seen by the parties involved? What tools can you use?
In some instances where people are communicating through servers, the idea of using proxies and Tor have arisen for safe discussions or data sharing. Let’s talk TOR.
The U.S. Naval Research Library initially designed Tor to help reduce the risk of traffic analysis. It accomplishes this by distributing your transactions over several places on the Internet through proxies. That makes it more difficult to pinpoint one singular destination.
Such traffic analysis essentially informs servers of what is being done and who is doing it.
The problem with using proxies and Tor, especially when utilizing free proxies, is a matter of trust as to where your information will bounce.
The Tor Project pointed out that end-to-end attacks are still possible for those looking for information through the right channels, but the most-important aspect is staying smart when using technology. This includes not revealing personal information.
Installing Tor is relatively simple, though it does slow down connectivity to a server in return for safer communications.
From the technical perspective of telephone communication, IT security expert Scott Janiki noted that back-end routing of calls on various networks utilizes the cheapest path for many companies.
“Even with proper controls in place to keep calls private, the resources available by [big players] probably would not help for long,” Janiki explained. “Unfortunately, as in this case, the public, when utilizing such services, was not informed from the onset by the vendor of this routing possibility.”
“Within Verizon’s privacy policy, it wasn’t mentioned that a foreign government is monitoring all communications that enter the U.S.,” Janiki said. “Even if users were informed, most people would probably not understand the potential ramifications.”
For Canadians who are following this story closely, Canada’s communication voice and data infrastructure, on the other hand, only has a couple of major routing hubs, with the vast majority still located in the U.S. “Therefore the likelihood of a data/voice communication staying in Canada is extremely low,” Janiki said. “As a result of the spider web of networks which makes the communication connectivity so resilient, it has also eroded Canada’s sovereignty and with it certain Canadian rights and laws.”
Image credit: Wikimedia Commons
Scott Hutchinson, a public relations manager for Canada’s privacy commissioner, noted the issue of national surveillance programs aided through information technology is a concern for authorities around the world.
“While we don’t think privacy should uniformly trump security or vice versa, greater transparency regarding how the programs work is of order,” said Hutchinson. “Our office also plans to contact fellow international Data Protection Authorities who may share similar concerns about the personal information of their citizens to discuss combining fact finding efforts on this matter as appropriate.”
Communication Security Establishment Canada (CSE), similar to the National Security Agency (NSA), has its own metadata program with little-known tactics in regards to collecting specific information. However, as reported initially, the PRISM program has already recorded conversations of millions of Verizon’s customers.
“Though slow and not without its own concerns,” said Janiki, “regular postage through the mail may be the only secure way to ensure that communications remain private.”
Based in Canada, Cassandra Chin has worked as a reporter, covering big cities like Calgary and Toronto, and small towns such as Grand Forks and Christina Lake, B.C. She has written about the International Women’s Nations Cup and Rugby Canada. She is currently a business reporter for YourHamiltonBiz and can be reached at cchin@anewdomain.net.