How to maintain Cellular, Mobile Privacy & Anonymity while becoming a Digital Ghost?
Updated: Jul 5
Your privacy is more than just keeping a secret from others. It’s more than criminals conducting their business out of the view of the authorities. Digital privacy and security reaches to the very fabric of society and can help foster change for the greater good.
By denying this mobile and digital privacy, through the removal of end to end encrypted communication, places the power over the many into the hands of the few.
If we apply the same logic to all your digital communication and personal data, it is clear that, although you may not be doing anything wrong, you should still be able to keep your privacy from everyone else, including governments and law enforcement agencies.
However, there are still those, in particular governments and law enforcement agencies, that continue to push to remove the end to end encryption of communications in order for them to be able to access people’s mobile communications. They state that this would only be required for the criminals using the system.
Let’s look in a bit more detail about what it is that’s actually being said by Edward Snowden.
Firstly, it needs to be understood that there is a difference between hiding something and being private. We all have aspects of our lives that we like to keep private. Real privacy allows you to control the aspects of your life which you are happy to share with others. It means, you choose what and when to share rather than being forced to share.
For example, if you decide to take a shower or a bath, would you want everyone to be able to watch you undress and wash? Chances are the answer is no, as you value your privacy, but you’re not actually hiding from anyone.
LEAVE NO TRACE
The same principle applies to a lot of what you do digitally. For another example, if you decide to take an intimate picture of yourself to send to your loved one, would you want everyone to be able to view it? Again, the answer is probably no, and again it’s down to digital and mobile privacy rather than hiding something.
Digital and mobile privacy has long been debated, with most people using the well-worn phrase “I have nothing to hide, so why do I care about surveillance?”.
To quote Edward Snowden “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." "When you say, 'I have nothing to hide,' you're saying, 'I don't care about this right’”.
Mobile phone encryption and security has hit the headlines again both in the UK and the US as law enforcement agencies seek ways to break the phone’s encryption in order to access data and information.
But where does this take us with regards to mobile security and privacy in the future? Will manufacturers be required to create “backdoors” to provide access without the need of passwords or pin numbers? What will it mean if they do create the backdoor access points to a mobile phone? There are so many questions, so here we’d like to discuss these points and you can decide which you feel is the best way forward.
What is an encryption backdoor? Essentially the backdoor is a software entry point that bypasses the mobile phone's encryption and security allowing access to all the mobile phone or tablet’s data and information. It is highly contentious as many security experts believe that such an access point dramatically weakens the strength of mobile security and privacy and therefore could be used not only by law enforcement agencies but also by criminals. On the flip side, some believe that offering a mobile device that cannot be hacked, provides a safe haven to the criminals as they can communicate without fear of disclosure.