Despite Snowden Leaks, Internet use is Largely Unchanged

Thanks to the Snowden documents, first covered by The Guardian and The Washington Post, the world learned about the Prism program, which allegedly gave the NSA access to communications from nine tech companies, including Yahoo and Google. At the time, it was also revealed that the NSA systematically collected the telephone records of millions of U.S. customers of Verizon Communication.

 pew_internet_american_life_logo.jpg   
Since then, some Internet users worried about protecting their privacy have made basic changes to their online activities, like adjusting their privacy settings or deleting rogue apps. But most people have carried on as usual, uninterested in using encryption or identity-cloaking browsers like Tor, according to a study carried out by the Pew Research Centre. Roughly a third of respondents didn't even know what Tor is.
    
The Pew survey, conducted online between this past November and January, is the research center's first look at how people have changed their online behaviors to avoid government surveillance. In a related study late last year, Pew researchers found that the majority of Americans felt they had lost control of their personal data.
    
Some people have taken action. Roughly 30 percent of respondents said they had taken at least one step to hide or shield information from the government, according to the study's findings, which were based on a survey of 475 American adults. For example, among those who said they were aware of government surveillance programs, 17 percent said they have changed their privacy settings on social media. Thirteen percent said they have uninstalled certain apps since the Snowden leaks. Twenty-five percent said they now use more complex passwords.
    
    Some 15 percent said they now use social media less often, while 11 percent have refrained from using certain terms in search engines they thought would trigger scrutiny.
    
But many more responded by saying they have not made wholesale changes to their online activities, or said they were not aware of other tools for more comprehensive online privacy. For example, among those who said they were aware of government surveillance programs, 40 percent said they have not used or considered using anonymity software like Tor.
    
Nearly half said they have not used email encryption technology like PGP (Pretty Good Privacy), which scrambles people's messages either en route or while at rest on company servers. Nearly a third said they did not know that technology existed. Over the past couple of years, more messaging apps like WhatsApp have baked encryption into their products, while others like Google and now Yahoo have released source code for encrypted messaging.
    
Fewer than half of respondents said they have used or considered using a search engine that doesn't keep logs of users' search history. (DuckDuckGo, for example, is a privacy-oriented search engine that does save searches, but not people's IP addresses or other unique identifiers.)
    
More than 40 percent said they have not used or were not aware of browser plugins like Privacy Badger for blocking tracking.
    
Overall, the majority of respondents said it would be difficult to find tools or implement strategies to help them be more private. The findings show that activists and companies making privacy-oriented products still have much to do in educating consumers about the strongest ways to secure their digital communications.
    
Or, the results may show that some people just don't care.

    zd net http://ow.ly/KILT8

    zdnet  http://ow.ly/KIM3i

    computerworld  http://ow.ly/KIM73

« Anonymous and Security Agencies: Bedfellows for Good Against ISIS?
Internet of Lousy Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.