GPG4WIN: The Edward Snowden guide to encryption – Video
The Edward Snowden guide to encryption: 12-minute homemade video ahead of leaks explaining how to avoid NSA from tracking emails
Edward Snowden made this video to teach a reporter how to speak with him securely
It explains how to use Public Key Encryption to scramble online messages
Privacy campaigners call on ordinary people to learn how to use the method
Ordinary people must learn to scramble their emails, privacy campaigners said today, as an encryption how-to video made by Edward Snowden was made public for the first time.
The former NSA employee who blew the whistle on the agency’s all-pervasive online surveillance made the video to teach reporters how to communicate with him in secret.
The 12-minute clip, in which Mr Snowden has used software to distort his voiceover, explains how to use free software to scramble messages using a technique called Public Key Encryption (PKE).
The video’s description on Vimeo says: ‘By following these instructions, you’ll allow any potential source in the world to send you a powerfully encrypted message that ONLY YOU can read even if the two of you have never met or exchanged contact information.’
Mr Snowden made the video last year for Glenn Greenwald in an effort to get the then-Guardian reporter to communicate securely with him online so he could send over documents he wanted to leak.
Viewers may find the video difficult to follow. Mr Greenwald himself admitted he wasn’t able to finish it. It took him seven weeks and help from experts to finally gather the expertise to get back to Snowden.
The video’s publication comes as more and more internet users are adopting encryption techniques after the alarm caused by Mr Snowden’s revelations about communications surveillance.
He leaked documents which showed the NSA and its UK counterpart GCHQ were able to spy on virtually anybody’s communications and internet usage, monitor social network activity in real time, and track and record the locations of billions of mobile devices.
Alternatively encrypt the data with GPG, then use a VPN to transmit the data. This provides “layered encryption”.
IVPN – Deletes Router logs every 10 minutes (a thousand times every week)