With the new 'Investigatory Powers Bill' coming into effect very soon, how the fuck do I remain as anonymous as possible online? I have nothing to hide but it's still very fucking spooky
I get the feeling a simple proxy website ain't gonna cut it and I'm not a l33t in any way
Buy a VPN doesn't matter which as long as it's outside of the UK really. Just go for PIA since it's pretty much the cheapest and easiest to use. You're not a pedo I assume so you don't have any real worries.
Oliver Lewis
Install gentoo
Jason Collins
Nah I have nothing to hide. The most offensive shit I browse is probably here on Sup Forums , Sup Forums for instance.
The UK is the most intrusive nation on Earth. Its despicable.
Henry Wright
>The UK is the most intrusive nation on Earth. Its despicable.
How?
Ryan Long
how what?
Evan Green
How is the uk the most intrusive nation on earth?
Isaiah Powell
1. Use https at all times. Don't even go to websites that don't have https. 2. Don't create accounts at google, facebook, youtube, amazon, anywhere. If you already did, whoops. Don't use them. 3. Tor is your best bet for complete privacy. But it only hides information about your machine, it doesn't automatically keep secret words and information you input into your computer.
Protip: the bill merely legalised what the GCHQ was doing already. There are some positives by putting their activity into the light, but the worst parts are: 1. Politicians don't get snooped on. 2. Other government agencies can get access to the information for any purpose.
It's a mess of a bill.
Matthew Roberts
>I have nothing to hide Don't worry about it then.
Cameron Bennett
Because they have thought police.
Robert Watson
North corea and China are offended by your comment
Jaxson White
For an entity as big as the UK government, they can break https relatively trivially
Colton Gonzalez
Kek you're a moron. The NSA is currently the king of breaking https, and they can only do 1024 bit keys. Anything above that is beyond them. It takes them 2-3 months to brute force a 1024 bit key, in one of their superclusters. Now this information is a few years out of date, but key sizes grow harder exponentially. So it takes a month per 1024bit key now. Good news for us is that every browser now refuses to accept 1024 bit keys. I generally put the GCHQ's capabilities under the NSA, but the GCHQ wins at being overtly nasty with what they have.
Easton Parker
>1. Politicians don't get snooped on.
why?
do the general populace know this?
because that seems pretty fucking hypocritical to me.
Ethan Wilson
Read the wiki page: >put the Wilson Doctrine on a statutory footing for the first time as well as safeguards for other sensitive professions such as journalists, lawyers and doctors;
And now politicians. It's pretty funny, really. They admit that private information is important by doing this. Hypocrisy, but no-one gives a shit.
Logan Fisher
this is the point of projects like the HTTPS Everywhere "observatory" feature, and certificate-transparency logs. Even if a government leans on a CA to issue bogus certificates that will let them MitM people, those certificates will be seen, reported, and known to browsers quickly. A government can always compromise a CA, but we can raise the cost of using that compromise dramatically - Three-Letter Agencies would much rather have something they can use for passive eavesdropping for a long time undetected, and we can deny them the ability to do that by ensuring that if they compromise a CA, the security blogs will be talking about it within days.
Brayden Cox
> >Read the wiki page: >>put the Wilson Doctrine on a statutory footing for the first time as well as safeguards for other sensitive professions such as journalists, lawyers and doctors; >And now politicians. >It's pretty funny, really. They admit that private information is important by doing this. >Hypocrisy, but no-one gives a shit. Then the answer is becoming a journalist, doctor, lawyer or politician
The latter is the easiest one, just try to join the local council and you are a politician even if unelected
Bentley Turner
Use Tor Browser you dummy
Sebastian Foster
VPN would be fine. For low bandwidth stuff, you could use ssh xsession forwarding from a friend's computer in another country. but that's kind of overkill.