Protecting From Spying Eyes On Your Metadata

Unless you’ve been living under a virtual rock, you’ve heard about the increasing concern over NSA’s ability to monitor the digital information of American phone calls, emails, and text messages.  It’s the first amendment right granted by the Constitution to complain about what the government does.

However, before you start microwaving your hard drive or flushing your cell phone down the toilet in fear that a government agency will use that information against you, it’s important to first get the facts straight.

What is Metadata?

Many of the headlines you’ll read regarding this issue talk about the topic of metadata, a part of everyday communications most people don’t think–or even know–about when sending digital files. When you send a letter, its delivered in two parts: the addressed envelope and the contents of the letter itself. The same applies to an email or text: you send the message itself attached to a deliverable address and, maybe, subject line.

Essentially, metadata is the part of the file that’s needed for a message to arrive at its destination.  The addressed envelope, email address and subject line, Twitter hashtag, and phone number are all forms of metadata. This differs from the message, or data, itself, especially as far as the NSA is concerned.

Everything said inside the envelope, in the body of an email, over a phone call, or on a Facebook post is the message attached to the metadata. In laymen’s terms, if you shout someone’s name across a room to get their attention, the name shout is the metadata. Whatever you say to them after you’ve made contact is the message.

Though the dividing line between the message and the metadata may seem arbitrary, it creates a problem within American law.

Due to the first amendment, privacy, and intellectual property laws, the message is typically protected by law against infringement from spying eyes. Unfortunately, the law is yet to recognize the attached metadata as warranting the same protection, even though programmers often require the input of sensitive material into the metadata.

Metadata and Your Privacy

html codeThis creates a problem when you get a situation like the Verizon court order, where it was unveiled that the NSA was collecting the phone records of millions of US users. This required Verizon, one of the largest telecommunications providers in the US, to hand over the numbers of both parties on each call, location data of the phones, call duration, and time of calls.

In other words, they were to hand over the metadata of millions of Verizon subscribers.  This may draw up the obvious question of why Verizon seeks to track this user data in the first place; and the answer seems simple.  Cell phone companies aren’t seeking to track your whereabouts or digital doings for reasons of surveillance. They do it so they can understand how cell phones work and interact and how cell towers track and transmit calls.

Furthermore, in order to continually enhance and maintain service and attract new users–partly to create those dotted color maps representing coverage across the country–the telecom companies need to track where their users are and how they move around.

For phone company purposes–the same of which apply to Facebook, Twitter, Gmail, and so on–knowing your metadata helps keep the service up and running.  These companies seems to have little interest in your personal life and information, aside from knowing your interests to further bolster advertisement streams.

However, apart from not using or carrying a phone or computer, there isn’t much you can do about keeping that information secret from your mobile phone company or Internet service.

However, the world did learn about the PRISM program thanks to one of Edward Snowden’s many Wikileaks slides.  The program unveiled that some of the biggest media and communications companies in the world, among them Microsoft, Google, Yahoo, Facebook, YouTube, Skype, and Apple, were in cahoots with the NSA to provide them with user email, video chats, photos, stored data, file transfers, login activity, and social networking details if requested.

Here’s the bad news: if you don’t want to have the NSA to have any chance of spying on your activities on these programs, your only option is avoid using them.  That’s not to say that you should stop using Facebook and Gmail right now, but you should if you are absolutely desperate to keep your information away from the NSA.

Unfortunately, these aren’t the only companies involved in PRISM, nor does there seem to be an end as to how many could come under its umbrella.

Protecting Your Metadata

PRISMFortunately, there are some things you can do to keep your metadata secure and private.  Doing so may not only keep the government’s prying eyes out of your personal life, but also any other unwanted individuals who may want to steal your identity or take advantage of your private data.

On computers and smartphones, which are basically handheld computers, the main means of protecting your personal information, both message and metadata, is through cryptography.  In its simplest terms, cryptography is a way of using a mathematic algorithm to rewrite information in a secret code.

In digital communication, cryptography uses the exchange of coded keys, or long strings of numbers that each party uses to encode and decode each other’s messages.  Like any other form of computer programming, cryptography comes in a variety of languages, including the Diffie-Hellman key exchange, public-key cryptography, and symmetric key exchange.

You don’t necessarily know how to “speak” these languages, as they are most often left up to mathematic functions that are easy for computers to create.

However, these functions are very difficult to undo, so much so that even the NSA can have difficulties circumventing some key exchange crypto codes.

The most viable and effective forms of cryptography comes in the form of end-to-end encryption.  Unlike most forms of encryption, not even the server a message passes through can look at your messages this way.  The server may still pass on the associated metadata to a third party, but will only see encrypted code as the message.  The catch:  end-to-end encryption can be difficult to use and may only be worth exploring if you’re passing along extremely sensitive information.

Fortunately, servers like Google already optimize their security efforts by using a code known as SSL to hide your information from third parties, though they pick up your metadata in the process. This is something you can’t avoid.  Google will always have your metadata, as they need it to keep the network working.  But without taking advantage of Google’s SSL, your metadata gets transmitted unencrypted.

In the meantime, there are tools that exist to help hide the content of things like email messages from any possible prying eyes.

One, called Pretty Good Privacy (PGP), offers a way for two parties to use peer-to-peer encryption so that only the sender can encode the message and only the receiver can decode it.  PGP can currently be purchased by Symantec, but offshoot programs are also available and can still be created by savvy programmers.

With these types of programs you can feel safe that your messages will pass through the web worry-free, but there is no guarantee they’ll be safe from the NSA.

Such is the underlying theme of this issue.  There are many different tools and precautions you can use to protect yourself when using the phone and Internet, but in the end no form is 100% effective.

Just like sex, drugs, and alcohol, the only way to truly protect yourself from the potential dangers are to abstain completely.

privacy01This article has been written by Cody Griffin for Survivopedia.

Written by

Cody Griffin is do-it-yourselfer, and avid outdoorsman. He is a self-proclaimed jack-of-all-trades and his work can be found across the web on several survival, outdoor, and lifestyle blogs. You can send Cody a message at editor [at] survivopedia.com.

Latest comments

LEAVE A COMMENT

Hacklinkbetsat
betsat
betsat
holiganbet
holiganbet
holiganbet
Jojobet giriş
Jojobet giriş
Jojobet giriş
casibom giriş
casibom giriş
casibom giriş
xbet
xbet
xbet
grandpashabet
grandpashabet
grandpashabet
tuzla evden eve nakliyat
İzmir psikoloji
creative news
Digital marketing
radio kalasin
radinongkhai
gebze escort
grandpashabet
grandpashabet
casibom güncel giriş
casibom
casibom güncel
jojobet
sultanbeyli çekici
beylikdüzü escort
setrabet
deneme bonusu veren siteler
deneme bonusu veren siteler
deneme bonusu veren siteler
deneme bonusu veren siteler
deneme bonusu veren siteler
deneme bonusu veren siteler
deneme bonusu veren siteler
instagram followers buy
grandpashabet 2198
casinolevant
casibom giriş
casibom
casibom
casibom
Meritking
meritking
deneme bonusu veren siteler 2024
casibom
deneme bonusu veren sitelerAviator oynagates of olympus democasibom girişDemo slot oynasugar rush demoSweet bonanza demoCasinoslotBahisnowdeneme bonusu veren sitelerbetovisofansifbetultrabetKalebetbetovismarsbahisdeneme bonusu veren sitelerKalebetKalebetbahiscomdeneme bonusu veren siteler 2024deneme bonusu veren siteler 2024fethiye escortfethiye escortmariobetmariobetmarsbahismarsbahisLigobetFixbetStarzbetSahabetmarsbahiscasibombankobetbankobet girişOnwinstarzbet girişgrandpashabetMeritkingmegnutt leaksahabetTipobetmatadorbetistanbul travestiAnkara Escortbetgitbetpublicbycasinoonwintipobetbetwildbetwild girişbetwoon girişbetwooncratosroyalbetcratosroyalbet girişpalacebet girişroyalbetroyalbet girişradissonbetesenyurt escorttttesenyurt escorttttesenyurt escorttttesenyurt escort
Etimesgut evden eve nakliyatEtimesgut evden eve nakliyatAnkara implant fiyatlarıtuzla nakliyatetimesgut evden eve nakliyatbeykoz evden eve nakliyatmersin parça eşya taşımamersin eşya paketlemeeskişehir ofis temizliğioran evden eve nakliyatseo fiyatlarımersin evden eve nakliyatmersin evden eve nakliyateskişehir emlakmersin evden eve nakliyatkeçiören evden eve nakliyatkaliteli replika saatlerEskişehir özel ingilizce dersiEtimesgut evden eve nakliyatdex trending botdextools trending botdextool trending servicedextools trending servicecmc trending botcoinmarketcap trending botdextools trendingtrending bothow to trending on dextoolsdextools volume botankara evden eve nakliyatetimesgut evden eve nakliyattuzla evden eve nakliyattrending on dextoolsfront runner botfront run botfront running botmev botdex sniper botpancakeswap botpancakeswap sniper botsolana sniper botsol sniper botsolana botMetafizikikinci el kitap alanlareskişehir uydu tamirtuzla evden eve nakliyatistanbul moloz taşımamersin asansörlü nakliyateskişehir emlakankara evden eve nakliyatankara şehirler arası nakliyatyeni şehir evden eve nakliyatyeni şehir evden eve nakliyatakdeniz evden eve nakliyatakdeniz evden eve nakliyatkeçiören evden eve nakliyatkeçiören evden eve nakliyateskişehir uydu servisieskişehir uydu servisituzluca evden eve nakliyatmersin evden eve nakliyattuzla asansörlü nakliyattuzla asansörlü nakliyatmersin asansörlü nakliyatmersin asansörlü nakliyatmersin evden eve nakliyatmersin evden eve nakliyattarsus evden eve nakliyattarsus evden eve nakliyatdextools trendingmersin evden eve nakliyatmersin evden eve nakliyatmersin eşya paketlememersin eşya paketlemesancaktepe evden eve nakliyatsancaktepe evden eve nakliyateskişehir güvenlik kamerasıeskişehir güvenlik kamerasıığdır evden eve nakliyatığdır evden eve nakliyatığdır şehir içi nakliyatığdır şehir içi nakliyatmalatya evden eve nakliyatmalatya evden eve nakliyatmersin evden eve nakliyatborsa robotu satın almarsbahis girişkitap alanlarkitap alanlarkitap alanlarkitap alanlarkitap alanlarAntika mobilya alanlarAntika mobilya alanlarmarsbahismarsbahismarsbahis girişcasibom girişcasibom girişmersin eşya paketlememersin eşya paketlemecasibom giriş twitterantika alım satımmarsbahis girişvozol puffpursaklar evden eve nakliyateskişehir televizyon servisieskişehir televizyon servisiığdır sigortalı nakliyatığdır sigortalı nakliyatmalatya evden eve nakliyatmalatya evden eve nakliyatmalatya evden eve nakliyatMedyumbmw repair edmontonmersin ofis taşımacılığıeskişehir uydu servisieskişehir uydu servisimalatya sigortalı nakliyatmalatya sigortalı nakliyatistanbul moloz taşımaistanbul moloz taşımamersin evden eve nakliyatmersin ofis taşımacılığımersin ofis taşımacılığımersin ofis taşımamersin ofis taşımaankara asansörlü nakliyatankara asansörlü nakliyatAntika alanlarAntika alanlarAntika alanlarAntika alanlarAntika Eşya alanlarAntika Eşya alanlarantikabatman evden eve nakliyatbatman evden eve nakliyatİzmir Medyumeskişehir televizyon tamirieskişehir televizyon tamirieskişehir ev temizliğieskişehir ev temizliğimarsbahis girişcialisistanbul evden eve nakliyatistanbul evden eve nakliyatweb sitesi yapımımarsbahiscasibom girişTwitch view botTuzla Eşya Depolamapromosyon ürünleriodunpazarı emlakEtimesgut evden eve nakliyatortodontikadıköy evden eve nakliyatmersin evden eve nakliyattekne kiralamabuy instagram auto likesbuy instagram auto likesankara evden eve nakliyatankara evden eve nakliyattarsus evden eve nakliyatığdır evden eve nakliyatistanbul moloz taşımamezitli evden eve nakliyatmezitli evden eve nakliyatmersin evden eve nakliyatmasaj salonu