Antropologiske betraktninger om pelshvaldrift

Month: December 2016

New year next year?

Looking back, the wonderful 2013 documentary Inequality for all, in which Professor Robert Reich humorously and with endless patience explained a few very basic economic facts about what is absolutely vital for a healthy capitalist society, seems prophetic indeed. Many of the US citizens he interviewed for the film spoke their mind back then, and have presumably cast their votes now.

Those that did not vote for Mr Trump, should have paid better attention when the film was released. Or maybe the US media, as opposed to The Guardian (review), did not inform the US electorate about it?

The non-Trump media scathingly refers to Trump voters as, at best, victims of “populism”. The word populism is generally used in a pejorative sense, but I shall quote a definition I found in Wikipedia today. Interestingly, it is not pejorative.

Populism is a political style of action that mobilizes a large alienated element of population against a government seen as controlled by an out-of-touch closed elite that acts on behalf of its own interests. The underlying ideology of the Populists can be left, right, or middle. Its goal is to unite the uncorrupt and the unsophisticated (the ‘little man’) against the corrupt dominant elites (usually the orthodox politicians) and their camp followers (usually the rich and the intellectuals). It is guided by the belief that political and social goals are best achieved by the direct actions of the masses. Although it comes into being where mainstream political institutions fail to deliver, there is no identifiable economic or social set of conditions that give rise to it, and it is not confined to any particular social class.

On the basis of that definition, I’d say people would do well to vote populist.

However, assuming, as most of us do over here, that Mr Trump is even more corrupt (if possible) than the average US politician, and even less concerned (if possible) with the plight of “der kleine Mann”, I’d say the problem lies not with the voters, but with the fact that his voters actually believed that Mr Trump cared about them. And why did they do that, I ask? My question is rhetorical, of course, because I know the answer, as do you, I hope, so I won’t spell it out.

I too am worried about what havoc the dangerously reckless and ignorant Mr Trump will wreck after 20 January. But above all, it saddens me that far too few have understood the lesson to be learnt from his victory. It is not, repeat – NOT – that the majority of US voters are more fundamentally racist, misogynist and sexist than voters in other countries. Nor are they more stupid and easily duped.

The lesson to be learnt is not really very difficult. The problem is that neither on this side or on your side of the Atlantic do people want to learn it. It hurts. It’s like finding out that Father Christmas is just a fairytale.

I can only repeat: Start by watching Inequality for All, and pay close attention.

We must all hope that as many as possible of us will live to see next year’s New Year.

Encryption when sharing information

This post is indented as a sequel to the previous one, which I believe should apply to everyone. I repeat: If we all look after our digital privacy, as we look after our health, say, we shall be protecting the social scientists and journalists who are sticking their neck out to tell us what we need to know.

This post, however, will be for those who are actually at risk, i.e. the social scientists, journalists and non-violent political activists who provoke the political powers that be.

***

To send a file to somebody else, when you want to be sure that only the intended recipient can read it, you could of course simply password protect it, but passwords can easily be cracked. Besides you would have to send the password, and the message in which you send it could be intercepted.

An alternative is to use 7zip  – which is available to  all major operating systems. With 7zip you can encrypt the file. You would do this if you want to transfer a large file, or several files, via your cloud service. You would still have to convey the password though.

The most commonly used way to protect the privacy of email is with PGP (Pretty Good Privacy). The program PGP itself is not free, but there is a free alternative, based on the so-called OpenPGP standard.

Now if you use an email client that provides PGP support — and yours may very well do so, although you do not know it — you should study its documentation. If not, you should consider changing your email client. 

Wikipedia has an article comparing email clients. Search on the page for PGP and you will find a table that might be useful to you. If you normally only use Webmail, you might consider starting to use a dedicated email program (“email client”).

PGP’s alternative to the issue of passwords is a set of “keys”: One “private key” which only the sender possesses, and one “public key”, which can be published openly on the net yes, on the net! The sender AND the recipient must know each other’s public keys, and this is where your software comes in.

Your software should  be able to generate both keys and store them. It imports and stores also the public keys of people with whom you want to communicate, and keeps track of what messages are to be sent to or received by whom. Finally it should check incoming keys, and encrypt and decrypt as needed.

The hitch is obviously that the recipient must also be using PGP encryption. But PGP has grown pretty universal, cross-platform and is inherent in many application. However, as with all software, new versions tend to be incomprehensible to older ones. (Compatibility issues can often be solved by altering settings.)

Most of us are not yet used to using PGP for email, though, so though it can easily be handled by our email programs, it may take a while before we all catch on.

At any rate, do not be discouraged, because once you have your keys properly stored and have understood how to use them, encrypting your stuff (with the proper software) is not difficult at all!

Encryption

To me, the word “encryption” sounded sinister until very recently, when I realised I’d have to take the consequences of what we are seeing these days. And guess what: digital protection – even encryption – isn’t difficult at all. There are programs that do it all for us. I believe that what I am proposing in this and the following post need not even make a dent in anybody’s wallet.

In view of the medieval state of race relations in the US, and bearing in mind Mr Trump’s penchant for decisive action, I think we should not place too much trust in the rule of law in the US, for instance. It’s a good idea to be prepared.

In general, in a world that is increasingly being governed by individuals who label political opponents as “criminals” or even “terrorists”, we should think of the consequences of such labels, not necessarily for ourselves – at least not yet – but for reasons that I will return to a few paragraphs further down.

Many of our rulers are willing to resort to what we in the west recently (i.e. pre-Snowden) considered “the unthinkable”, to stay in power and, in many cases, to improve their financial leverage.

There is also a rising number of people who are learning the tricks of cybercrime. For all you know, your next-door neighbour might be one of them, in which case he or she may be particularly interested in your WIFI network.

Most of us are not terrorists or criminals, although we might be leftist or Moslem or environmentalist or black or even Mexican. We might, however, be deeply dissatisfied with our rulers, and we might even be organised, say in an activist civil rights group. Organised opposition has always been regarded as a threat, or at least a nuisance, by the powers that be, and is now becoming increasingly risky. In many countries, of course, it has always been deadly dangerous. What’s new is that the number and potency of tools to penetrate people’s private (digital) worlds have grown exponentially over the past years.

What’s new, too, is that year by year, in all countries, law enforcement and secret services are being given wider powers to use these tools. This is quite understandable because, after all, there is a real threat of terrorism, and there is a real and growing threat of serious cybercrime.

Meanwhile, political improvement is contingent on our all understanding as much as possible of what goes on. Some journalists, social scientists and whistle blowers are putting their necks out to protect us by uncovering the crooked acts of cynical rulers and magnates. By doing so, they risk their lives in many countries, and in others, including mine, they risk finding themselves without a job.

We need them. We desperately need them! Only by knowing what is actually going on, by being able to dismiss false rumours, libel and “post-truth” propaganda (see Oxford Dictionaries’ Word of the Year), do we have any chance of improving the world we live in. They – the journalists and social scientists – hopefully know how to protect themselves, but by doing so, they will inevitably seem suspicious: “Why is NN encrypting his stuff? Why is that woman using a VPN server? Are they terrorists?”

Since they are trying to protect us, the least we can do is to try to protect them, in essence by protecting ourselves.

If only to protect our bank account information, password lists, copies of passport and driving licence, intimate letters and pictures etc., we should start thinking about digital personal protection. When we started using email, in my case in the late eighties, it seemed very difficult. We had to put a lot of effort into it. These days, it’s all so easy that kids are social media experts before they can add and subtract. Did we think this was the way it would always be? If so, our thinking was flawed: Sic transit gloria mundi.

Sooner or later, the alternative to using only pen-and-paper may well be to encrypt everything; computers, phone calls, email, social networking – the lot!

Meanwhile, there are a few very basic steps we should take, apart from everything we hear every day (e.g. being wary of links in emails and on websites). The measures cost us a few extra seconds, but then again – let us not forget how very, very much more time-consuming everything was, just ten years ago.

  • Text messaging encryption. Thanks to Edward Snowden, Signal has become quite a hit. It’s so seamless that once you’ve installed it, you won’t notice you are no longer using your phone’s stock SMS app, except that it’s faster and doesn’t hang.
  • Wifi router protection
    Wifi routers must be new enough to yield so-called WPA2 protection (at least).
  • “Anti-virus” software
    You should not rely entirely on Defender, if you are using Windows. There are several excellent and powerful anti-virus protection schemes that are free.
  • VPN (Virtual Private Network)
    If privacy protection is an issue for you — and to my mind it should be, if only for the reasons given above  conceal your IP address.  This is probably one of the most important steps to take if you are a fact-hunting dissident. Many services provide access to VPN servers in various countries, and competition is fierce. Most of the best services are no entirely free, though, or rather, those that are tend to plague you with adds or restrict your bandwidth. On the bright side, most of them now require no technical know-how, just that you press a button. There are numerous lists of “best VPN” services, free and non-free.
  •  
  • Storage on external drives
    Store as little as possible on computers, tablets and smartphones. (Plug in your external drive and move private stuff to it, then remove the external drive at once.) If you don’t use cloud storage, this should do (assuming your computer doesn’t have digital parasites lodged in its entrails, your external hard drive is securely stored and never leaves the house, and the house never burns down).

Cloud storage

Most people use cloud services these days, if only to transfer files. Besides, people are often more or less unwittingly constantly connected to their operating systems’ “Store”, storage spaces, sharing services, etc.and to social services.

  • TLS/SSL protocol
    Respectable cloud storage services use a TLS/SSL protocol for data transfer (HTTPS://). That isn’t much, but better than nothing.
  • Encryption
    Some services encrypt your stuff already before it leaves your computer. They say that you risk nothing and that they have “zero-knowledge” (about you and your stuff). This sort of service is used by companies. But why not do your own encryption before uploading anything to your cloud. with good software, it’s a cinch! So:

     

    • What is good software? Since good encryption depends not on your software, but on the algorithm used by the software, the software you want will depend on whether it is easy to use, can relate to your operating system and serves your needs in other respects. Leading encryption programs all use basically the same algorithms, the best known of which is AES (developed some 20 years ago).
    • Veracrypt is one such (free) cross-platform program (i.e. for Mac, Windows, Linux, but not for mobile systems). I am mentioning it not least as it is the program used in the following link which I am including to demonstrate how very easy it is to encrypt whatever files you want to keep out of any private or public eye: encouraging demonstration

Phones and tablets

Being an open system, Android is more vulnerable to malware attacks than are IOS devices. Over the past two years or so Android has been rocked by some pretty serious security issues, e.g. “Stagefright”. So serious were they, in fact, that phones that come with Marshmellow (or newer) installed are supposedly encrypted by default (!) Yes, you read correctly, by default. In other words, Android is not taking any chance, nor should you, so encrypt!

  • Encryption
    Older phones, with Android versions from Gingerbread up, can optionally be encrypted. Details about how to do this may vary depending on your phone and version, but  this guide gives an idea.
    IOS phones have been encrypted by default for a while. Older phones can also easily be encrypted.

Flash drives

Some people will want to encrypt their entire computer. If so, they will probably have used their operating system’s tools for doing this. (BitLocker on Windows, and FileVault on MACs). Encrypting flash drives is, if anything, all the more important since they tend to get lost or forgotten.

  • The same tools as for computers
    BitLocker (Windows), FleVault (Mac)and, again, Veracrypt, can encrypt flash drives (USB sticks).
    Here is one of many guides.

In my next post I shall touch upon sharing (most importantly by email) with PGP.

 

 

© 2025 Pelshval

Theme by Anders NorénUp ↑