Indian Government can not recruit high end brains is a good point but there is no reason to feel that Indian Government employees are morons. Highly intelligent crook may fake as moron. Proof Does Not Exist By Certain IT Habits Decrease the Chance of Hacker Intrusion. Exactly Like the Era Before Edward Snowden in America, it is Not Possible To Proof That Your Data is Stolen. Here is How to Decrease the Chance of Data Theft Via Indian Government. Via means where Indian Governmental System is not directly selling data. As the persons who works as employees or are third parties, they can simply deliberately keep backdoor to help the hacker. Your data has value as your future generation can earn significant and their security is important. It is good habit to keep an eye on Richard Stallman’s personal website (stallman.org
) and official websites of Free Software Foundation (FSF) and GNU. Their sayings, methods will be perfect than that of ours. Principle of security is increasing difficulty to retrieve data to trace back. Indians still have some ways to avoid mass surveillance, data theft which Americans possibly does not have. There are zillion of articles on possible mass surveillance procedures by Indian Government :
1 2 3 | https://en.wikipedia.org/wiki/Mass_surveillance_in_India https://www.quora.com/What-is-the-status-of-government-surveillance-in-India https://www.ibtimes.co.uk/indias-proposed-mass-surveillance-programme-seen-blow-internet-freedom-1605802 |
It is not our opinion that Indian Government can act to help data theft, mass surveillance, the ideas are nothing new and published on notable websites.
How to Decrease the Chance of Data Theft Via Indian Government
Many a times we suggest to restrict usage of non-Free Software and Non-Libre/Non Open Source Hardware. Minimize using all listed suspected American companies related to PRISM and listed by Richard Stallman :
---
1 | https://stallman.org/ |
Avoid using smartphone running Android, specially do not roam with a Smartphone. Google can have relationship with American Government to supply your movement and co-share your data with Indian Government. It is normal to have an itching to use navigation Google Maps with car. You can use just an image map and Open Source hardware made GPS to find your location. Navigation with Google Maps is better restricted to risky places like trekking.
Avoid using all possible digital payments and use cash to pay. Prefer real life purchase over online shops. When you are purchasing a product with whatever digital way, your location data and habit of purchase can be recorded. There are agents who works to pay your bills, it is convenient and confusing to data collection system when you work via agents. You can withdraw money from your bank using demand draft or cheque to pay the agents.
In order to increase your data security, you need to spend more, your apparent convenience becoming lesser.
Most important way of mass surveillance is packet sniffing via internet service provider. You have these vulnerable layers :
- ISP
- JavaScript on websites and Apps
- Your computer hardware
- Your computer operating system
- The software you are using
To make the security higher, we need public Wi-Fi or internet in some way which does not trace back to who is paying. It is difficult work to find such way.
To avoid JavaScript on website, we can use command line tools like wget
, curl
to download a webpage and read offline. There are also some text based browsers which are Free Software, we talked about Links browser. You should avoid downloading images unless there is need – we can track images from CDN.
Using really working VPN costs higher and very difficult to setup. Suppose, if our connection from ISP is to server in America via SSH, then from that server connection is to server in Sweden, then from Sweden the connection uses a VPN, the connection becomes slower but becomes costly to trace back. Of course, you have to chance the server providers and servers regularly else whole month’s data will be easy to trace out.
It is beyond doubt that using a safer GNU/Linux provides security. Hardware backdoor is worst enemies of security which open source hardware breaks down to easy ways.
Tor provides safety, but safety is only when the above basic security protocols are followed.
Avoid bigger shopping malls with surveillance cameras. If you purchase good number of items from a wholesale dealer, normally you’ll get rebate. 50-70% discount exists only for older stock and defective items.
Do not keep huge money on “wallets”. Laws of succession of those are not easy. If you suddenly die, it will be difficult to get back those money.
If you use smartphone for various payments, use from one location only, try to use fake locations. It is good if you have multiple houses – of course it is not safe to pay in the house you live.
How to increase savings? There are peoples who buy certified gold coin. You can buy from them with original receipt and packaging. They makes profit with long term investment. Ornamental gold is not of bullion grade and invariably there will be lesser return of investment. Gold and land are always great as long term investment.
How Black Hat Hacker Decrease the Chance of Data Theft
They are experts of networking and electronics. They can run Man-in-the-Middle Attack on various Government servers and use them as their servers to protect identity. It is not possible for general work to use their ways which they employ for defacing Government websites. If few military servers used in that way, it becomes very difficult to retrieve data to find out person. Hackers exploit human nature of suspiciousness. It is funny to watch defacing of Governmental websites but it is not funny if they find a backdoor of a financial institution and empty your account.
Why Governments Are Running Behind to Steal Data?
These Governments are not of good monarchs who won war with sword fight. These Governments are not families but persons. Some persons can have immediate intention to supply data for marketing analysis. Long term target can be watching a family for their lands, gold. Some family virtually become free of successors after a time, after many natural deaths. Those families worked in Government can watch those families for many generation to somehow get grip on their properties. We are seeing only one person of a family in a post. We can not calculate about their forefathers & their dangerous distant relatives. It is not possible to think out all ways for a gentleman. They will say that Donald Trump’s forefathers whipped humans to earn huge, they need “democracy”. Their target is Donald Trump’s forefathers wealth.
Conclusion
Neither we have intention to make the readers apprehensive psychotic nor fuel them to take gun. Our essential work is to warn you of “bad technologies”, “risk technologies” which may potentially abused. It is quite risky to publish these kind of articles. Few years back an Indian newspaper reporter made contact with author (he is Wikipedia admin of a regional language Wikipedia) followed by email from US Senate for “informal tea meeting” with consulate general to discuss impact of social network. US Government actually read the articles published on this website against mass surveillance by NSA. We told you how they try to analyze persons.
We are amazed to watch that general Indian citizens has increased awareness of data theft. Government is publishing “Aadhaar is safe” is pathetic idea to broadcast that some peoples has doubt of data of finger print & eye scan :
1 | https://www.businesstoday.in/current/economy-politics/aadhaar-uidai-face-authentication-id-safety-feature-july-1/story/268085.html |
As next steps of awareness, citizens should know about Richard Stallman, Edward Snowden, Free Software, Open Source Hardware to silently fight. It is unforgettable how Facebook, Google denied of supplying data to US Government in PRISM the day before Edward Snowden’s information was made public.