Privacy Protection Tips

Here at the Radical Agenda, we’ve learned that standing up for what is righteous in a society run by filthy degenerates carries significant consequences. Our enemies resort to legal and illegal methods to gather information about upstanding folks and disseminate that information to criminals, governments, and the public to incite harassment against people, make bogus legal claims against them, and target them with violence. They call this “doxxing” and combined with their proven willingness to engage in violence and lie in court, it can have very severe consequences.

Privacy Protection Tips
Privacy Protection Tips

For these reasons and others, it is worth taking steps to protect your identity online. I’m going to outline a few of them here for you today.

VPN

A Virtual Private Network (VPN) service provides a great deal of benefit for the privacy conscious user. Normally when you connect to the Internet, which let’s face it, is pretty much 24/7 for most of us at this point, your device is assigned an Internet Protocol address (IP). That address provides some information about you to anyone who is able to obtain it. Such as, at a minimum, a rough geographic location, and your service provider. Every website you visit is given your IP as a technical requirement for the connection to complete. So, for example, if you leave a comment on this website, I know the IP address of the person who left that comment. I can then use this to ban commenters who create multiple accounts to troll my comments section, and I have done this repeatedly.

Were I lacking in ethics the way our enemies are, I could also use that information to run a port scanner or hack tool against the address, looking for vulnerabilities in the system to try and gain unauthorized access.

A VPN service stands between you and the sites you visit, so the service you are connecting to sees the IP address of the VPN instead of your home or wireless connection’s IP address. This has obvious and not so obvious benefits. It not only provides you with the ability to obfuscate your identity, but you can also choose where you want to be seen as connecting from. If for example, you wanted to use a Bitcoin exchange that did not serve users from your country, you could simply connect to a VPN server in a country that the service did serve (though you would of course want to make sure this was legal first).

In addition to obfuscating your IP address, a VPN connection encrypts all of your traffic between you and the VPN provider. This helps to prevent your Internet Service Provider (Cable company, or phone service, for example) from monitoring what websites you visit, and what you communicate with those websites, information often readily available to them absent the service. Same thing if you are connecting to wifi at a friend’s house or public place. When you connect to the VPN, all traffic between you and the websites you visit is first tunneled through the VPN, so anyone (be it your ISP, a wifi hacker, or the government) who might be monitoring your connection, will only see the encrypted tunnel between you and the VPN provider. This information is pretty much useless to them.

Not all VPN services are created equal. There are many providers out there, all with varying levels of service and expense. I personally recommend Private Internet Access (PIA), and this isn’t just because I get a cut of the sale when you buy through my link. I actually use PIA every single day. My phone, home computers, and laptops all connect to this service when I power them on, automatically.

The service is so fast that I can stream the Radical Agenda to two different video streaming platforms, and one audio streaming platform, all while taking calls on the air over Skype with very little latency, and very high audio/video quality.

They also take extra measures to protect your privacy that other providers do not. They keep no traffic logs, and we know they are telling the truth about this because it was put to the test by a recent FBI investigation. When the Russian government required that VPN providers operating in that country keep logs, they simply stopped operating in that country. You can even pay with Bitcoin or gift cards, to keep your more traditional payment methods completely separate from your account with the service provider.

While not the most important detail, the price also just so happens to be very low too. You can get the service for as little as $2.91/month if you pay for two years up front at $69.95. At $39.95 per year it works out to $3.33/mo. Or you can always go monthly at just $6.95/mo. They even offer a 7 day money back guarantee.

Sign up here.

Signal (SMS and Voice Call Encryption)

Signal is an app for Android, iPhone, and Windows that encrypts SMS messages and phone calls from end to end using your devices data connection. It has been endorsed by such famous names as Edward Snowden, and Bruce Schneier, because the encryption it uses is open source, tried, and true. The developers of Signal cannot decrypt your messages, so they cannot help governments or any other prying eyes who may try to coerce them into doing so, not even under court order.

You can have it replace your phone’s existing SMS app (that’s what I did) or you can use it only for encrypted messages. One of the nice features about this system is that lots of people already use it. You might be surprised to find out that many of your friends and family already have it installed, and you don’t have to do anything special to communicate securely with them. If you are using Signal and you send a text message to another Signal user, the message is encrypted automatically.

Voice calls can also be encrypted, completely eliminating any concern of your phone calls being listened to at the carrier level, though I suppose it is not outside the realm of possibility for malware on your device to capture conversations at the hardware level.

This app is free and open source and contains no ads. It is incredibly easy to use. You have no excuses, install this app today.

ProtonMail (Encrypted Email, Hosted in Switzerland)

ProtonMail is a secure email service that utilizes open source software, and encrypts your data from end to end. In fact, ProtonMail is so secure that it can’t recover your emails if you forget your password. The decryption happens when you log on, so they don’t have access to a means of decrypting your emails without your password or a recovery account on file.

You have the option of providing an alternative email address to handle password resets, and depending on your desired level of security, you may find that option appealing, but no alternative email address or other personal information is required to do so, at least not for a free account. They don’t even log your IP address by default.

Two Factor Authentication (2FA) is also available using Authy or Google Authenticator or other such application.

The downside of ProtonMail is that the free account has considerable limitations in terms of storage (500MB), and if you’re the type of person to send more than 150 emails a day you’ll find that send limit a challenge. For just $4/month though, you can upgrade to Plus and get up to 1,000 emails a day and 5GB of storage, which you can upgrade for a nominal fee anytime. Sadly, they only accept PayPal and Credit Cards at this time, but a feature request to accept Monero as payment has garnered a lot of support, 6,905 upvotes and 247 comments at the time of this writing.

UPDATE: As it turns out, you can pay with Bitcoin, but you have to first sign up for a free account, and then upgrade.

Though the technology should be sufficient to keep prying eyes away from your communications, it helps that the system is hosted in Switzerland. Switzerland is outside of US and EU jurisdiction. Unless you host your servers on a boat in international waters, you will need to be under some legal jurisdiction and in the post-Lavabit environment, this choice is particularly important. There are no such things as National Security Letters in Switzerland, and all surveillance requests MUST go through Swiss courts. Furthermore, while Switzerland is party to international assistance treaties, such requests for information must hold up under Swiss law which has much stricter privacy provisions than the US or EU.

I just signed up today, and I know a lot of other people who trust their lives to this service.

Lifewire has a helpful comparison between ProtonMail and several other encrypted email services here.

PGP (Public/Private Key Message Encryption, especially for email)

PGP Stands for “Pretty Good Privacy” and was originally in 1991 by Phil Zimmerman. Zimmermann had been a long-time anti-nuclear activist, and created PGP encryption so that similarly inclined people might securely use BBSs and securely store messages and files.

Shortly after its release, PGP encryption found its way outside the United States, and in February 1993 Zimmermann became the formal target of a criminal investigation by the US Government for “munitions export without a license”. Cryptosystems using keys larger than 40 bits were then considered munitions within the definition of the US export regulations; PGP has never used keys smaller than 128 bits, so it qualified at that time. Penalties for violation, if found guilty, were substantial. After several years, the investigation of Zimmermann was closed without filing criminal charges against him or anyone else.

Zimmermann challenged these regulations in an imaginative way. He published the entire source code of PGP in a hardback book. The claimed principle was simple: export of munitions—guns, bombs, planes, and software—was (and remains) restricted; but the export of books is protected by the First Amendment.

PGP uses cryptographic key pairs to facilitate the transmission of encrypted messages and files between parties over systems that are not themselves encrypted. The public key can be made available to anyone, and is used to encrypt a message that only the recipient can decrypt using the private key. Additionally, messages can be cryptographically signed using the private key, and verified using the public key.

Let’s say you use GMail, but I don’t trust Google very much (a likely scenario). If you give me your public key, or post it on your website, I can send a message to you that nobody at Google, nor any government they might be cooperating with, can read. The only way to decrypt the message is with the private key, which you were surely smart enough to keep away from Google.

It shows up in your inbox looking like this

—–BEGIN PGP MESSAGE—–

hQEMA5qq0tKv20BNAQf9Et4L73TrGPQi4t/3D69HVynxKfRyXWy1G3J+mb1yO1eX
UCWquNj7ob/10ROwu0HHIZz52COoMHgyGYc4b+vacPfKfd7nhOhBfIev9tTTeTel
xLNSyb5KaVk+ZirGipBAm5L0Rj3LYHNkf6fIJm3evsS1Yt2K2HVxiQg+VaC0GnID
FXk8l9/NFyp76FALkjxImNAc9HpYgf4ANI5qV4DrP2ibdsB3Bl6OPSid6WU5bFU4
Dl9jkk9ngjYXgNpC2cKJ8kWgL9qpeyd2FKv/v/2KLARwXWYdNjkN2QAqRIjoPmH5
TC50D5+VRXDg/J+0TN2ausLMj3w9ATRLn+26TXCg9dJZAZANQApzLXBH5RjOEMlZ
5Yr7fNGkmirmUcucf2jZ055L1yXqSeDUfbvNO+s1VPj34gzHFJuuu9EWATzwx09+
Ph56pYManEoPcl41hNN2LELWiXDL9sSuVxc=
=6EoR
—–END PGP MESSAGE—–

You copy that text to your clipboard, and using another application you decrypt it using your private key. All Google stores is the gobbledygook encrypted message. Even if your GMail account gets hacked, so long as the private key remains out of enemy hands, the message is safe.

DeepDotWeb has a helpful tutorial here

GPG4Win makes use of the system relatively painless on Windows

Other services you should familiarize yourself with, which I’ll write more about in the coming days include;

Tor (A decentralized anonymization platform on which the “Dark Web” operates)
IDBazar (Photoshop templates for “novelty” IDs)