Security, the Edward Snowden Way: Page 2

Security applications recommended by Edward Snowden – who probably knows as much about Internet privacy as anyone.


You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

(Page 2 of 2)


TrueCrypt is an on-the-fly encryption product, which had a great reputation among privacy experts until it was unexpectedly and weirdly discontinued on May 28. Seemingly out of nowhere, the anonymous developers posted that TrueCrypt was “harmful and no longer secure” and users were urged to embrace Microsoft Bitlocker instead. Snowden recommended TrueCrypt before the discontinuation, and it’s not clear that he still does.


SpiderOak is for backing up, sharing and syncing data. Snowden recommended the product as an alternative to Dropbox, which he reminded his interviewer was a target for NSA surveillance as leaked by the original Prism leak. He also pointed out that former secretary of state Condoleezza Rice is on the Dropbox board, and “probably the most anti-privacy official we can imagine.”

SpiderOak, on the other hand, uses encrypted cloud storage and client-side encryption key creation for backing up user folders in a way that prevents even SpiderOak from gaining access to the files.

Whisper Systems

Whisper Systems makes security and privacy software for smartphones. The company was acquired by Twitter three years ago, but some of their software was spun out as an open source project called Open WhisperSystems, which makes TextSecure, RedPhone, TextSecure-Server, BitHub, and TextSecure-iOS -- all security and privacy software applications.

Hero or traitor, Snowden is right about the need to protect our data. And his own list of recommended products is as good a place to start as any.

So get downloading! Before it’s too late.

Photo courtesy of Shutterstock.

Page 2 of 2

Previous Page
1 2

Tags: Security Software, Security Breaches, Edward Snowden

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.