Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
Mass-scale surveillance like PRISM is disturbing, but is an unsurprising effect of how centralized the Web is today. For years, people have been trusting more and more of their data to remotely hosted systems. Users are also giving up control of their computing to Service as a Software Substitute (SaaSS), remotely-hosted programs that exchange data with users to do computing that they could do on their own machines. In both cases, there's no way to see what these servers are doing with your data, so you have to take the host's word for it that they are being responsible. But these companies submit to governments when they ask for your information, whether it's ostensibly to fight terrorism or to stop unauthorized copying.
If we want to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom." The good news is that the seeds of such a network are already out there; as we wrote in our statement on PRISM, ethical developers have been working for years on free software social media, communication, publishing, and more. Being decentralized means that these programs don't concentrate everyone's data into a honeypot to attract snooping corporations and governments. Being free software means that it's harder for them to keep secrets from users, and that anyone can modify them to remove features they aren't comfortable with. In fact, those interested in surveillance have been known to require people to use proprietary programs to make it easier to keep tabs on them.
We have the tools to build a better Internet. All that's missing is for a large number of people to leave the systems and services that make us vulnerable and put their energy and passion to work. The more of us who get on board with safer platforms and modes of communication, the stronger we all become.
What you can do
- Use encryption to encode your electronic communication so that nobody but the intended recipients can read it. Get started at Email Self-Defense, the FSF's beginner guide to use email encryption with free software. Encrypt everything you can: if you only encrypt sensitive communication, those messages raise extra suspicion from surveillance programs.
- Don't use Service as a Software Substitute.
- Close your accounts with systems that can't be trusted with your data. Switch to free, safer replacements like the ones listed in the PRISM collection on the Free Software Directory and prism-break.org. Bring your friends with you!
- Donate to the teams working on free software systems that protect your privacy or to the FSF.
- Start using encryption to make your communication harder to snoop. GPG for email and OTR for instant messaging are great places to start.
- Hang our "Privacy is impossible without free software" poster in your home, workplace, or local hangout.
Learn more about privacy and freedom on the Web
Free software against surveillance
- We have nothing to hide, only everything to protect
- Take action! Protect end-to-end encryption
- From pro-democracy activists to minorities: Why people use Tor and encrypted chats
- Parents, domestic violence victims, lawyers: Read about people who protect their privacy with free software
- Privacy and freedom should be the legacy we leave, not the opposite
- Unjust algorithms
- EARN-IT threatens encryption and therefore user freedom
- January 2018: Oppose renewal of FISA Section 702
- July 2016: Resist mass cracking by US law enforcement
- "How free software can protect us from surveillance" by Zak Rogoff
- "Who does that server really serve?" by Richard Stallman
- "How to block the NSA from your friends list," a Slate article co-authored by FSF campaigns manager Libby Reinish
How mass surveillance works, socially and technically
- John Sullivan on Surveillance & Privacy
- "How Much Surveillance Can Democracy Withstand?" by Richard Stallman
- Security expert Bruce Schneier on "Government secrets and the need for whistle-blowers"
- Interactive timeline of information about government surveillance leaked by Edward Snowden, a former NSA contractor
- TAO, the NSA's internal cracking unit
- Tools used by the NSA for surveillance
- British intelligence agency spies on Yahoo Web cam images
- The FBI's unfinished mass facial recognition system produces many false positives
- Edward Snowden interview: 'Smartphones can be taken over'
Related work by the FSF
- Reform Corporate Surveillance: While major technology companies voice their support for legislative changes they think will address the problem, they continue to drive technology which is on face damaging to everyone's privacy, freedom, and security.
- FSF's response to Microsoft's privacy and encryption announcement: If the NSA revelations have taught us anything, it is that journalists, governments, schools, advocacy organizations, companies, and individuals, must be using operating systems whose code can be reviewed and modified without Microsoft or any other third party's blessing.
- FSF's call to action to protect free software that respects our privacy against legislative attempts to install a backdoor