Hey there! If you stopped to read this, wow, you're awesome! And since you're that awesome, maybe you'd be willing to check out this super sweet, not-so-top-secret campaign to take Films For Action to the next level of awesome in our quest to change the world. All the details here. Cheers!
How to Encrypt Your Entire Life in Less Than an Hour
How to Encrypt Your Entire Life in Less Than an Hour
“Connected with the Past” by Federico Uribe. 2012. Electric cables on canvas.
By Quincy Larson / medium.freecodecamp.com
Nov 17, 2016
“Only the paranoid survive.” — Andy Grove

Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease.

When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams.

But you obey the law. What do you have to worry about? As the motto of the United Kingdom’s surveillance program reminds us, “If you’ve got nothing to hide, you’ve got nothing to fear.”

Well, law-abiding citizens do have reason to fear. They do have reasons to secure their devices, their files, and their communications with loved ones.

“If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641

In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. In a single sitting, you can make great strides toward securing your privacy.

Common sense security for everyone

To be clear, everything I recommend here is 100% free and 100% legal. If you bother locking your doors at night, you should bother using encryption.

“Be prepared” — The Scout Motto

Let’s get prepared.

First, a couple definitions. When I use the term “attacker” I mean anyone trying to access your data whom you haven’t given express permission to — whether it’s a hacker, a corporation, or even a government.

And when I use the terms “private” or “secure”, I mean reasonably so. The reality is that — as long as humans are involved — no system will ever be 100% private or 100% secure.

As long as your phone, computers, and accounts are sufficiently protected, their contents will remain an “encrypted lump” and there’s not much anyone — regardless of how powerful they are — can do about it.

Tip #1: Use two-factor authentication on your inbox

Your inbox is the skeleton key to your life. If an attacker compromises it, they can not only read your emails, they can use it to reset your passwords for pretty much anything. This includes social media accounts and even bank accounts.

The simplest thing you can do to dramatically improve your personal security is to turn on two-factor authentication on your inbox.

Basically, two-factor authentication is a second layer of security when signing in. It usually involves receiving a text message with a special code whenever you sign into your account.

Two-factor authentication substantially reduces the likelihood of your inbox getting hacked.

If you use Gmail, you should activate two-factor auth here.



I’ll still be here when you get back.

Tip #2: Encrypt your hard drive

Both Windows and MacOS have built-in full-disk encryption. You just need to turn it on.

Tip #3: Turn on your phone’s password protection

Thumbprint identification is better than nothing, but it’s often not enough.

The fifth amendment (against self-incrimination) allows you to keep your password secret. But a court can compel you to unlock your phone with your thumbprint.

Also, you can’t exactly change your thumbprint after an attacker gets ahold of it.

An attacker will usually get 10 tries before your phone will completely lock them out. So if your 4-digit password is one of these common ones, change it.


Pro Tip: if you insist on enabling thumbprint identification for convenience’s sake, and are ever arrested, immediately power off your phone. When the authorities turn your phone back on, they won’t be able to unlock it without your password.

Tip #4: Use different passwords for each service.

Passwords are inherently insecure.

Mark Zuckerberg used the password “dadada” on his LinkedIn account. Earlier this year, when hackers released 117 million email-password combinations, his was among them. Hackers were then able to use his email and password to gain access to his Twitter and Pinterest accounts.

So don’t use the same password more than one place.

Of course, remembering a ton of passwords is a hassle, so use a password manager.

Tip #5: Send private text messages with Signal

Signal is a popular messaging service that got a perfect score from the Electronic Frontier Foundation. You can do all the things you would normally do through text messages, like have group messages and send photos and videos. Except that everything’s encrypted.

Signal is free, open source, and available in iOS and Android app stores. I was able to set it up and start messaging securely with friends and family in less than 5 minutes.

Step #1: Install Signal

Step #2: Invite friends to install it

Step #3: Send messages

Congratulations — you can now talk with your friends and family about whatever you want, and it will be practically impossible for anyone to spy on your conversation.

You can also use Signal to make secure phone calls.

Tip #6: Your browser’s incognito mode isn’t private enough

Even if you use Chrome’s “Incognito Mode” or Firefox’s “Private Browsing”, the following parties will still be able to snoop in on your network activity:

  • Internet service providers
  • System administrators in charge of the network at your school, workplace, or wherever get online
  • Google, or whoever made your browser

Internet Explorer, Safari, Opera, and other browsers are no more private.

If you want reasonably private browsing (no system can ever be 100% secure), you should use Tor.

Tip #7: Browse in private with Tor

Tor stands for “The Onion Router” which is a reference to its use of many onion-like layers to mask network activity. It’s free, open source, and reasonably easy to use.

Step #1: Download the Orbot

Step #2: Download the Orfox browser

Step #3: Open Orbot

Step #4: Open Orfox

Step #5: Verify it worked

Visit check.torproject.org to verify everything worked. Congratulations — you can now use the internet with peace of mind that it would be extremely difficult for anyone to track you.

Tip #8: Search in private

If Tor isn’t convenient enough for you, you can at least search privately using DuckDuckGo, the search engine that doesn’t track you.

DuckDuckGo doesn’t have all the thousands of engineer-years poured into its search engine that Google has, but it does have a shortcut to get encrypted Google searches when you need them. You just need to prefix your search with !google

If you want to learn more about cryptography and information security, check out this deep yet accessible book:

Cybersecurity and Cyberwar: What Everyone Needs to Know

Quincy Larson is teacher at FreeCodeCamp.com

3.5 ·
Featured Films
The Staging Post: Courageous People Never Give Up! (2017)
61 min The Staging Post follows two Afghan Hazara refugees, Muzafar and Khadim. Stuck in Indonesia after Australia 'stopped the boats' and facing many years in limbo, they built a community and started the school which inspired a refugee education revolution. A real-life...
Living the Change: Inspiring Stories for a Sustainable Future (2018)
85 min Living the Change explores solutions to the global crises we face today – solutions any one of us can be part of – through the inspiring stories of people pioneering change in their own lives and in their communities in order to live in a sustainable and regenerative...
Inhabit: A Permaculture Perspective (2015)
92 min Humanity is more than ever threatened by its own actions; we hear a lot about the need to minimize footprints and to reduce our impact. But what if our footprints were beneficial? What if we could meet human needs while increasing the health and well-being of our...
Within Reach (2013)
87 min Within Reach explores one couple's pedal-powered search for a place to call home. Mandy and Ryan gave up their jobs, cars, and traditional houses to 'bike-pack' 6500 miles around the USA seeking sustainable community. Rather than looking in a traditional neighborhood, they...
Fall and Winter (2013)
102 min This stunning film takes you on a hypnotic journey, reaching to the past to understand the origins of the catastrophic environmental transitions we now face. Over two years, director Matt Anderson traveled 16,000 miles to document firsthand our modern industrial world and the...
The Economics of Happiness (2011)
65 min Economic globalization has led to a massive expansion in the scale and power of big business and banking. It has also worsened nearly every problem we face: fundamentalism and ethnic conflict; climate chaos and species extinction; financial instability and unemployment. There...
Trending Today

Love Films For Action? Become a Patron.

The goal is to go 100% ad-free by next year and become 100% member supported. Would you be willing to make a monthly pledge? A few dollars per month times the power of a few thousand awesome people will get us to where we need to be. Click here to join.

If you'd prefer to make a one-time donation, you can do that here. Many thanks!

Join us on Facebook
How to Encrypt Your Entire Life in Less Than an Hour