All products featured on WIRED are independently selected by our editors. However, we may receive compensation from retailers and/or from purchases of products through these links.
This article was taken from the September 2013 issue of Wired magazine. Be the first to read Wired's articles in print before they're posted online, and get your hands on loads of additional content by <span class="s1">subscribing online.
Recent leaks from US National Security Agency contractor Edward Snowden, and US court records, have revealed the US government's appetite for data surveillance, and that of the British intelligence agency GCHQ, which intercepted senior foreign politicians' communications during the G20 summit in 2009.
And as the Leveson Inquiry showed, journalists are no strangers to intrusive snooping.
Mikko Hypponen, chief research officer at Finnish anti-virus firm F-Secure, warns that we face three main kinds of attacks online: "Criminals, hacktivists and nation states. Of these, nation states have the greatest powers. They will tap your phone, place trojans in your computer, intercept your email. Privacy should not be up for discussion -- it's a question of freedom against control. Any rights we give away will be given away for good. Do we trust every future government for the next 50 years?" Jenny Afia, partner and privacy expert at the legal firm Schillings, explains where you currently stand: "Under English law, privacy is seen as a qualified right. There are exceptions for national security." So what can you do to keep your privacy?
The basics
There are simple steps everyone should take to keep sensitive communications safe, says David Jacoby, senior global researcher at internet-security company Kaspersky Labs. "Use complex passwords, which aren't kept on your computer," he warns. "Install protection and always update your software. Keep sensitive documents on a USB and not in Dropbox or Google Drive."
Encryption
Oliver Crofton is cofounder of Vigilante Bespoke, which helps high-profile figures protect their privacy. Crofton recommends several low-cost or free encryption services. Silent Circle began life as an encrypted VoIP service and has since expanded to include texts and email. Others are Voltage Security and open-source GnuPG.
Scrambling
Conrad Jaeger -- author of How to Defeat the NSA and Other Snoopers -- warns that encryption can be asking for trouble from security agencies. He suggests SpamMimic, which scrambles email text into badly spelled spam. Paste the message into a temporary email -- it will exist for ten minutes before vanishing without a trace.
Steganography
This is for those with time on their hands. Steganography hides data up to the size of a small book in photos (which, as John McAfee and some of Anonymous know, already carry geographical data), or in MP3 tracks on an iPod using programs such as OpenPuff and MP3Stego.
Another piece of software, Secretbook, allows simple messages to be hidden in Facebook pictures.
Anonymity networks
Tor is a network of volunteer relays that hide a user's location and activity. "The idea of complete privacy is a bit strange," says Jacob Appelbaum, a core member. "Using OTR messaging [encrypted IM protocol] and Tor together is useful. But these tools don't protect you from being compromised. We need strong cryptography and strong laws and policies. That's our only guarantee."
*Read more from our <a href="https://www.wired.co.uk/magazine/archive/2013/09/how-to/make-the-impossible-happen"
title="Make the impossible happen">Extreme How To special here</a>*
This article was originally published by WIRED UK