Skip to main content

How to hide your data from Internet snoops

Doug Gross, CNN
NSA leaker Edward Snowden says encrypting e-mail makes it unreadable by the National Security Administration.
NSA leaker Edward Snowden says encrypting e-mail makes it unreadable by the National Security Administration.
  • With reports of NSA snooping, Web security has become a focus for many
  • NSA whistleblower says encryption is an effective tool for protecting data
  • Many browsers, e-mail clients offer encrypted versions of messaging
  • Sometimes, it's as easy as adding an "S" in your URL box

Editor's note: Doug Gross covers consumer technology and the Web for Follow his updates on Twitter or add him to your Circles on Google+.

(CNN) -- Let's face it: Most of us don't e-mail, tweet, text or post anything worthy of clandestine scrutiny.

But having concerns about NSA cybersnooping doesn't mean we must surrender all privacy -- what's left of it -- in our day-to-day online activities.

It's easy to forget that we're volunteering basic information about ourselves in return for free e-mail, social networking and other digital services. And let's remember that third parties -- from government agencies to cybercriminals -- can get their hands on even more personal stuff if they're actively trying.

So, whether it's due to a vague fear of Big Brother or a more specific desire to keep your bank information out of the hands of thieves, you might be considering ways to keep your communication more secure.

Apple discloses data request numbers
Snowden: Hong Kong was easiest answer
NSA discloses foiled terror plots
NSA: Programs 'critical' for U.S.

"So much that's geo-political, so much cybercrime, so many struggles of various types are being played out in terms of information security today," said Wade Williamson, a senior security analyst at Palo Alto Networks. "It's not just that people decided to get interested in encryption all of a sudden."

CNNMoney: How to hide from the NSA

Specifically, encryption has come up a lot in recent days. For one, NSA whistleblower (some would say "traitor") Edward Snowden said Monday in an online question-and-answer session that e-mail encryption is an effective way of foiling government surveillance.

"Encryption works," he wrote. "Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it."

Encryption is a method of securing your files, including e-mail, by encoding it so that the intended recipient can read it, but anyone who may intercept the message along the way cannot.

An encryption tool turns your original message (called "plaintext") into a garbled mess (or "ciphertext") while it's flying from Point A to Point B. The system gives the approved recipient a decryption tool which makes the text readable once it arrives at its destination.

With all of the renewed interest in online privacy, we talked with Williamson about ways to help keep your data secure -- before, during and after sending it.


First things first. There are ways to make your contact with every website you visit more secure.

A "secure sockets layer" (SSL) provides a layer of security during everything from Web browsing to text messaging. Many major websites offer the option of using a secure connection all the time. Williamson and other security experts suggest doing this when given the option.

If not -- sometimes it can be as easy as tweaking "http" to "https" in your browser's address bar.

"By and large, you can just throw an 'S' into the URL and go to town," Williamson said.

There are also tools like HTTPS Everywhere, a free extension for Chrome and Firefox browsers, that encrypt your connection with most major websites.

Obama: I'm no Dick Cheney


Most major e-mail services, like Outlook and Gmail, offer some form of encryption. Check your e-mail's security settings for options.

But for people who are really worried about their e-mails being intercepted -- and that's always just an unsecured network and an eager hacker away -- Williamson suggests buying encryption software. (Note: His company focuses on network security and does not sell encryption software to individuals).

With many of the systems, customers will get digital "certificates" for themselves called private keys. Everyone with whom they want to share encrypted messages will receive public keys.

Using such a system, only someone with a private certificate could descramble a message's content.


So, your data may be secure while it's hurtling through cyberspace. But what if somebody breaks into your car, where you stupidly left your laptop, and makes off with it?

That's where disk encryption comes in.

There's some free disk encryption software floating around in the open-source community, but for most folks this, too, will cost some cash.

In effect, disk encryption scrambles everything stored to your computer, requiring a password or other approved recovery tool to decode it. So, if your computer falls into the wrong hands, all won't be lost.

To summarize, there are lots of encryption and other security options out there. Some are quick, easy and free. Others are going to cost money for specialized software, hardware or both.

To find a level of security you're comfortable with, start by poking around with security settings on your browser, e-mail client and favorite websites. Then consider whether you want professional help to get to the next level.

Do you have other favorite security tricks? Share them in the comments.

Part of complete coverage on
Data mining & privacy
June 23, 2013 -- Updated 1425 GMT (2225 HKT)
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
May 29, 2014 -- Updated 1226 GMT (2026 HKT)
Traitor or patriot? Low-level systems analyst or highly trained spy?
May 29, 2014 -- Updated 1927 GMT (0327 HKT)
What are the takeaways from Snowden's NBC interview? You might be surprised.
April 18, 2014 -- Updated 1152 GMT (1952 HKT)
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
March 12, 2014 -- Updated 1643 GMT (0043 HKT)
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
March 10, 2014 -- Updated 0044 GMT (0844 HKT)
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
March 11, 2014 -- Updated 0039 GMT (0839 HKT)
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
August 2, 2013 -- Updated 0355 GMT (1155 HKT)
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
December 10, 2013 -- Updated 1357 GMT (2157 HKT)
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
August 2, 2013 -- Updated 1139 GMT (1939 HKT)
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
August 1, 2013 -- Updated 1435 GMT (2235 HKT)
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
August 1, 2013 -- Updated 1854 GMT (0254 HKT)
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
August 18, 2013 -- Updated 1304 GMT (2104 HKT)
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
July 24, 2013 -- Updated 1854 GMT (0254 HKT)
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
July 2, 2013 -- Updated 1356 GMT (2156 HKT)
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
August 29, 2014 -- Updated 1954 GMT (0354 HKT)
Browse through a history of high-profile intelligence leaking cases.
July 2, 2013 -- Updated 1437 GMT (2237 HKT)
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
June 26, 2013 -- Updated 1304 GMT (2104 HKT)
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
June 19, 2013 -- Updated 1047 GMT (1847 HKT)
With reports of NSA snooping, many people have started wondering about their personl internet security.
August 14, 2013 -- Updated 1352 GMT (2152 HKT)
Click through our gallery to learn about other major leaks and what happened in the aftermath.
June 9, 2013 -- Updated 2002 GMT (0402 HKT)
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.