"The wicked flee when no man pursues them, but the righteous are bold as a lion."~~Proberbs 28:1
"If we intend to succeed at being ourselves, we must reach a point where we can be led by the Holy spirit. Only God, through His Spirit, will lead us to succeed and be all we can be. Other people usually won't, the devil certainly won't, and we are not able to do it ourselves without God.
OCTOBER 25, 2013 | BY DANNY O’BRIEN
One of the trends we’ve seen is how, as the word of the NSA‘s spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?
The bad news is: if you’re being personally targeted by a powerful intelligence agency like the NSA, it’s very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
Here are ten steps you can take to make your own devices secure. This isn’t a complete list, and it won’t make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they’re the NSA or a local criminal, have to work that much harder.
Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still “your friend”. And your best friends remain open source systems that don’t share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you’re chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you’ve done that, look into PGP–it’s tricky to use, but used well it’ll stop your email from being an open book to snoopers. (OTR isn’t the same as Google Chat‘s option to “Go off the record”; you’ll need extra software to get end-to-end encryption.
Encrypt as much communications as you can. Even if you can’t do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF’s HTTPS Everywhere browser add on for Chrome or Firefox, you can maximize the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you’re on a network you don’t trust, like a cybercafe.
Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it’s bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password — at least you’ll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at diceware.com.
Use Tor. “Tor Stinks”, this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You’ll also be showing that Tor is used by everyone, not just the “terrorists” that GCHQ claims.
Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it’s not available, tell the company you want it.
Don’t click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it’s really from them.
Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we’re still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it’s still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.
Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.
Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you’ve learned, and explain to them why it’s important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.
Well here's one way to stymie the NSA: in a couple of years, much if not most of the open web will be encrypted by default. Following recent discussions between the big browser makers, standards-setters and other industry folks, the World Wide Web Consortium's (W3C) HTTP Working Group announced on Wednesday that the upcoming second version of the HTTP protocol will only work with secure "https" web addresses.
The distillation of one human life into a few hundred pages is a task herculean enough to trip up even seasoned biographers. Expanding that to include four co-founders and a company with as explosive a history as Twitter’s is begging for disaster.
A new book called Hatching Twitter: A True Story Of Money, Power, Friendship and Betrayal, from New York Times reporter Nick Bilton attempts to do just that.
Amen to that! The lazy liberals have less incentive to work for what they want.
Hell, if they can get things without working for it, why would they choose to work? Then they try to justify taking other people’s hard earned money by saying that it is not hurting anyone.
In truth, it is! It is hurting the hard working taxpayers, that choose to work for what they want, and the small businesses trying to survive.
Instead of “feeding them fish”, we need to teach them “how to fish”!!
Anyone collecting welfare should have to be drug tested, and do some kind of work in exchange for it. We need to teach people that you do not get something for nothing.
If you are NOT an American or sick, elderly, or disabled, then you should not be collecting taxpayers money.
Give a man a fish, and you feed him for a day; show him how to catch fish, and you feed him for a lifetime.
A proverbial saying which suggests that the ability to work is of greater benefit than a one-off handout.
This proverb has fallen foul of the spurious etymological rule: ‘if you don’t know the origin of an enigmatic proverb, say it is ancient Chinese‘. May you live in interesting times and a picture is worth a thousand words suffer the same fate. There’s no evidence to link ‘Give a man a fish…’ with China. A further confusion over the origin is that the authoritative and generally trustworthy Oxford Dictionary of Quotations says it is of mid-20th century origin.
The expression actually originated in Britain in the mid 19th century.
Anne Isabella Ritchie, the daughter of William Makepeace Thackeray, (who, if her photograph is any guide, was a studious young woman) wrote a story titled Mrs. Dymond, sometime in the 1880′s and it includes this line.
“He certainly doesn’t practise his precepts, but I suppose the patron meant that if you give a man a fish he is hungry again in an hour; if you teach him to catch a fish you do him a good turn.”
The book was published in 1890 but the story was put into print a few years earlier. The American magazine Littell’s Living Ageprinted the story in its September 1885 issue and it was taken from an earlier but undated issue of the British Macmillan’s Magazine.
So, the proverb dates from 1885 or shortly before and there’s every reason to suppose that it was coined by Anne Ritchie.
…the Chinese axiom “Give a man a fish, and you have fed him once. Teach him how to fish and you have fed him for a lifetime.”
Publications of that sort were what brought the proverb into general use but, as we have seen, weren’t the actual source.
- Give a man a fish… (voxstarnation.wordpress.com)
- Give a man a fish… http://www.phrases.org.uk/meanings/give-a-man-a-fish.html