Despite Snowden Leaks, Internet use is Largely Unchanged

Thanks to the Snowden documents, first covered by The Guardian and The Washington Post, the world learned about the Prism program, which allegedly gave the NSA access to communications from nine tech companies, including Yahoo and Google. At the time, it was also revealed that the NSA systematically collected the telephone records of millions of U.S. customers of Verizon Communication.

 pew_internet_american_life_logo.jpg   
Since then, some Internet users worried about protecting their privacy have made basic changes to their online activities, like adjusting their privacy settings or deleting rogue apps. But most people have carried on as usual, uninterested in using encryption or identity-cloaking browsers like Tor, according to a study carried out by the Pew Research Centre. Roughly a third of respondents didn't even know what Tor is.
    
The Pew survey, conducted online between this past November and January, is the research center's first look at how people have changed their online behaviors to avoid government surveillance. In a related study late last year, Pew researchers found that the majority of Americans felt they had lost control of their personal data.
    
Some people have taken action. Roughly 30 percent of respondents said they had taken at least one step to hide or shield information from the government, according to the study's findings, which were based on a survey of 475 American adults. For example, among those who said they were aware of government surveillance programs, 17 percent said they have changed their privacy settings on social media. Thirteen percent said they have uninstalled certain apps since the Snowden leaks. Twenty-five percent said they now use more complex passwords.
    
    Some 15 percent said they now use social media less often, while 11 percent have refrained from using certain terms in search engines they thought would trigger scrutiny.
    
But many more responded by saying they have not made wholesale changes to their online activities, or said they were not aware of other tools for more comprehensive online privacy. For example, among those who said they were aware of government surveillance programs, 40 percent said they have not used or considered using anonymity software like Tor.
    
Nearly half said they have not used email encryption technology like PGP (Pretty Good Privacy), which scrambles people's messages either en route or while at rest on company servers. Nearly a third said they did not know that technology existed. Over the past couple of years, more messaging apps like WhatsApp have baked encryption into their products, while others like Google and now Yahoo have released source code for encrypted messaging.
    
Fewer than half of respondents said they have used or considered using a search engine that doesn't keep logs of users' search history. (DuckDuckGo, for example, is a privacy-oriented search engine that does save searches, but not people's IP addresses or other unique identifiers.)
    
More than 40 percent said they have not used or were not aware of browser plugins like Privacy Badger for blocking tracking.
    
Overall, the majority of respondents said it would be difficult to find tools or implement strategies to help them be more private. The findings show that activists and companies making privacy-oriented products still have much to do in educating consumers about the strongest ways to secure their digital communications.
    
Or, the results may show that some people just don't care.

    zd net http://ow.ly/KILT8

    zdnet  http://ow.ly/KIM3i

    computerworld  http://ow.ly/KIM73

« Anonymous and Security Agencies: Bedfellows for Good Against ISIS?
Internet of Lousy Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.