How to Encrypt Your Entire Life in Less Than an Hour
How to Encrypt Your Entire Life in Less Than an Hour
“Connected with the Past” by Federico Uribe. 2012. Electric cables on canvas.
By Quincy Larson / medium.freecodecamp.com
Nov 17, 2016
“Only the paranoid survive.” — Andy Grove

Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease.

When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams.

But you obey the law. What do you have to worry about? As the motto of the United Kingdom’s surveillance program reminds us, “If you’ve got nothing to hide, you’ve got nothing to fear.”

Well, law-abiding citizens do have reason to fear. They do have reasons to secure their devices, their files, and their communications with loved ones.

“If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641

In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. In a single sitting, you can make great strides toward securing your privacy.

Common sense security for everyone

To be clear, everything I recommend here is 100% free and 100% legal. If you bother locking your doors at night, you should bother using encryption.

“Be prepared” — The Scout Motto

Let’s get prepared.

First, a couple definitions. When I use the term “attacker” I mean anyone trying to access your data whom you haven’t given express permission to — whether it’s a hacker, a corporation, or even a government.

And when I use the terms “private” or “secure”, I mean reasonably so. The reality is that — as long as humans are involved — no system will ever be 100% private or 100% secure.

As long as your phone, computers, and accounts are sufficiently protected, their contents will remain an “encrypted lump” and there’s not much anyone — regardless of how powerful they are — can do about it.

Tip #1: Use two-factor authentication on your inbox

Your inbox is the skeleton key to your life. If an attacker compromises it, they can not only read your emails, they can use it to reset your passwords for pretty much anything. This includes social media accounts and even bank accounts.

The simplest thing you can do to dramatically improve your personal security is to turn on two-factor authentication on your inbox.

Basically, two-factor authentication is a second layer of security when signing in. It usually involves receiving a text message with a special code whenever you sign into your account.

Two-factor authentication substantially reduces the likelihood of your inbox getting hacked.

If you use Gmail, you should activate two-factor auth here.

Now.

Seriously.

I’ll still be here when you get back.

Tip #2: Encrypt your hard drive

Both Windows and MacOS have built-in full-disk encryption. You just need to turn it on.

Tip #3: Turn on your phone’s password protection

Thumbprint identification is better than nothing, but it’s often not enough.

The fifth amendment (against self-incrimination) allows you to keep your password secret. But a court can compel you to unlock your phone with your thumbprint.

Also, you can’t exactly change your thumbprint after an attacker gets ahold of it.

An attacker will usually get 10 tries before your phone will completely lock them out. So if your 4-digit password is one of these common ones, change it.

1234  
9999
1111  
3333
0000  
5555
1212  
6666
7777  
1122
1004  
1313
2000  
8888
4444  
4321
2222  
2001
6969  
1010

Pro Tip: if you insist on enabling thumbprint identification for convenience’s sake, and are ever arrested, immediately power off your phone. When the authorities turn your phone back on, they won’t be able to unlock it without your password.

Tip #4: Use different passwords for each service.

Passwords are inherently insecure.

Mark Zuckerberg used the password “dadada” on his LinkedIn account. Earlier this year, when hackers released 117 million email-password combinations, his was among them. Hackers were then able to use his email and password to gain access to his Twitter and Pinterest accounts.

So don’t use the same password more than one place.

Of course, remembering a ton of passwords is a hassle, so use a password manager.

Tip #5: Send private text messages with Signal

Signal is a popular messaging service that got a perfect score from the Electronic Frontier Foundation. You can do all the things you would normally do through text messages, like have group messages and send photos and videos. Except that everything’s encrypted.

Signal is free, open source, and available in iOS and Android app stores. I was able to set it up and start messaging securely with friends and family in less than 5 minutes.

Step #1: Install Signal

Step #2: Invite friends to install it

Step #3: Send messages

Congratulations — you can now talk with your friends and family about whatever you want, and it will be practically impossible for anyone to spy on your conversation.

You can also use Signal to make secure phone calls.

Tip #6: Your browser’s incognito mode isn’t private enough

Even if you use Chrome’s “Incognito Mode” or Firefox’s “Private Browsing”, the following parties will still be able to snoop in on your network activity:

  • Internet service providers
  • System administrators in charge of the network at your school, workplace, or wherever get online
  • Google, or whoever made your browser

Internet Explorer, Safari, Opera, and other browsers are no more private.

If you want reasonably private browsing (no system can ever be 100% secure), you should use Tor.

Tip #7: Browse in private with Tor

Tor stands for “The Onion Router” which is a reference to its use of many onion-like layers to mask network activity. It’s free, open source, and reasonably easy to use.

Step #1: Download the Orbot

Step #2: Download the Orfox browser

Step #3: Open Orbot

Step #4: Open Orfox

Step #5: Verify it worked

Visit check.torproject.org to verify everything worked. Congratulations — you can now use the internet with peace of mind that it would be extremely difficult for anyone to track you.

Tip #8: Search in private

If Tor isn’t convenient enough for you, you can at least search privately using DuckDuckGo, the search engine that doesn’t track you.

DuckDuckGo doesn’t have all the thousands of engineer-years poured into its search engine that Google has, but it does have a shortcut to get encrypted Google searches when you need them. You just need to prefix your search with !google

If you want to learn more about cryptography and information security, check out this deep yet accessible book:

Cybersecurity and Cyberwar: What Everyone Needs to Know


Quincy Larson is teacher at FreeCodeCamp.com

3.5 ·
1
Trending Today
How a Lack of Touch Is Destroying Men
Mark Green · 4,879 views today · Why Men Need More Platonic Touch in their Lives
How Comedy Can Disarm Bullies
3 min · 3,057 views today · As long as you're funny, it can get you out of almost anything - even getting mugged, as co-founder of Between Two Ferns Scott Aukerman recounts. Unfortunately, not everyone...
Globalization Makes No Sense
Chris Agnos · 2,523 views today · When I lived in San Francisco, I often would marvel at the movement of goods through the ports across the bay in Oakland. Full container ships would enter the bay one after...
Immigrants For Sale (2015)
33 min · 2,336 views today · The detention of migrants has become a multi-billion dollar industry in which immigrants are sold to the highest bidder and traded like mere products. The Corrections...
Proof of Evolution That You Can Find on Your Body
4 min · 1,903 views today · Vestigial structures are evolution's leftovers — body parts that, through inheritance, have outlived the context in which they arose. Some of the most delightful reminders of...
Your Lifestyle Has Already Been Designed (The Real Reason For The Forty-Hour Workweek)
David Cain · 1,664 views today · Well I’m in the working world again. I’ve found myself a well-paying gig in the engineering industry, and life finally feels like it’s returning to normal after my nine months...
John Lennon's "Imagine," Made Into a Comic Strip
John Lennon. Art by Pablo Stanley · 1,071 views today · This is easily the best comic strip ever made.  Pabl
Compassion, the Antidote
Martin Doblmeier · 1,045 views today · Thich Nhat Hanh has published nearly 100 books and is one of the best-known teachers of Zen Buddhism in the world today. In the early 1960s his practice of what he termed...
A Hauntingly Beautiful Short Film About Life and Death
5 min · 926 views today · The Life of Death is a touching handdrawn animation about the day Death fell in love with Life.
Today I Rise: This Beautiful Short Film Is Like a Love Poem For Your Heart and Soul
4 min · 835 views today · "The world is missing what I am ready to give: My Wisdom, My Sweetness, My Love and My hunger for Peace." "Where are you? Where are you, little girl with broken wings but full...
Without Saying a Word This 6 Minute Clip From Samsara Will Make You Speechless
6 min · 774 views today · Can you put this video into words? It's a clip from the phenomenal documentary Samsara, directed by Ron Fricke, who also made Baraka.  If you're interested in watching...
Those That Did Not Seek Revenge
Dr. Ann Russo · 758 views today · Dr. Ann Russo on violence, healing, and transforming justice.
How Wolves Change Rivers
4 min · 712 views today · When wolves were reintroduced to Yellowstone National Park in the United States after being absent nearly 70 years, the most remarkable "trophic cascade" occurred. What is a...
Touch Isolation: How Homophobia Has Robbed All Men Of Touch
Mark Greene · 660 views today · Homophobic prohibitions against male touch are hurting straight men as well.
Stunning Small Homes Form Part of a Communal Compound for Best Friends
Lighter Side · 644 views today · If you’re lucky enough to have longtime friends even as an adult, then you know probably already know how much it means to be able to spend time together. Maybe you even have a...
DAPL Opponents Vow to 'Rise' From Ashes of Oceti Sakowin and Keep Fighting
Lauren McCauley · 636 views today · 'They cannot extinguish the fire that Standing Rock started,' Dallas Goldtooth declared
The Foiled Bomb Plot in Kansas That Didn't Make Trump's Terror List
5 min · 555 views today · When a plot by a pro-white militia to bomb a Somali mosque in Kansas was foiled by the FBI last October, the aborted conspiracy received little national coverage - nor did it...
Where the Term "Redneck" Came From
15 min · 508 views today · If you don't know this story, you'll never look at the word the same again.  This is just a window into the sometimes shocking, subversive and untold history of the United...
10 Words Every Girl Should Learn
Soraya Chemaly · 356 views today · "Stop interrupting me."  "I just said that." "No explanation needed." In fifth grade, I won the school courtesy prize. In other words, I won an award for being polite. My...
The Most Astounding Fact about the Universe
3 min · 238 views today · This is Neil Degrasse Tyson's response when asked to describe the most astounding fact about the universe. Background music is the cinematic orchestra - To build a home.
Load More
What's Next
Like us on Facebook?
How to Encrypt Your Entire Life in Less Than an Hour