Despite Snowden Leaks, Internet use is Largely Unchanged

Thanks to the Snowden documents, first covered by The Guardian and The Washington Post, the world learned about the Prism program, which allegedly gave the NSA access to communications from nine tech companies, including Yahoo and Google. At the time, it was also revealed that the NSA systematically collected the telephone records of millions of U.S. customers of Verizon Communication.

 pew_internet_american_life_logo.jpg   
Since then, some Internet users worried about protecting their privacy have made basic changes to their online activities, like adjusting their privacy settings or deleting rogue apps. But most people have carried on as usual, uninterested in using encryption or identity-cloaking browsers like Tor, according to a study carried out by the Pew Research Centre. Roughly a third of respondents didn't even know what Tor is.
    
The Pew survey, conducted online between this past November and January, is the research center's first look at how people have changed their online behaviors to avoid government surveillance. In a related study late last year, Pew researchers found that the majority of Americans felt they had lost control of their personal data.
    
Some people have taken action. Roughly 30 percent of respondents said they had taken at least one step to hide or shield information from the government, according to the study's findings, which were based on a survey of 475 American adults. For example, among those who said they were aware of government surveillance programs, 17 percent said they have changed their privacy settings on social media. Thirteen percent said they have uninstalled certain apps since the Snowden leaks. Twenty-five percent said they now use more complex passwords.
    
    Some 15 percent said they now use social media less often, while 11 percent have refrained from using certain terms in search engines they thought would trigger scrutiny.
    
But many more responded by saying they have not made wholesale changes to their online activities, or said they were not aware of other tools for more comprehensive online privacy. For example, among those who said they were aware of government surveillance programs, 40 percent said they have not used or considered using anonymity software like Tor.
    
Nearly half said they have not used email encryption technology like PGP (Pretty Good Privacy), which scrambles people's messages either en route or while at rest on company servers. Nearly a third said they did not know that technology existed. Over the past couple of years, more messaging apps like WhatsApp have baked encryption into their products, while others like Google and now Yahoo have released source code for encrypted messaging.
    
Fewer than half of respondents said they have used or considered using a search engine that doesn't keep logs of users' search history. (DuckDuckGo, for example, is a privacy-oriented search engine that does save searches, but not people's IP addresses or other unique identifiers.)
    
More than 40 percent said they have not used or were not aware of browser plugins like Privacy Badger for blocking tracking.
    
Overall, the majority of respondents said it would be difficult to find tools or implement strategies to help them be more private. The findings show that activists and companies making privacy-oriented products still have much to do in educating consumers about the strongest ways to secure their digital communications.
    
Or, the results may show that some people just don't care.

    zd net http://ow.ly/KILT8

    zdnet  http://ow.ly/KIM3i

    computerworld  http://ow.ly/KIM73

« Anonymous and Security Agencies: Bedfellows for Good Against ISIS?
Internet of Lousy Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.