Skip to main content

How to hide your data from Internet snoops

Doug Gross, CNN
NSA leaker Edward Snowden says encrypting e-mail makes it unreadable by the National Security Administration.
NSA leaker Edward Snowden says encrypting e-mail makes it unreadable by the National Security Administration.
  • With reports of NSA snooping, Web security has become a focus for many
  • NSA whistleblower says encryption is an effective tool for protecting data
  • Many browsers, e-mail clients offer encrypted versions of messaging
  • Sometimes, it's as easy as adding an "S" in your URL box

Editor's note: Doug Gross covers consumer technology and the Web for Follow his updates on Twitter or add him to your Circles on Google+.

(CNN) -- Let's face it: Most of us don't e-mail, tweet, text or post anything worthy of clandestine scrutiny.

But having concerns about NSA cybersnooping doesn't mean we must surrender all privacy -- what's left of it -- in our day-to-day online activities.

It's easy to forget that we're volunteering basic information about ourselves in return for free e-mail, social networking and other digital services. And let's remember that third parties -- from government agencies to cybercriminals -- can get their hands on even more personal stuff if they're actively trying.

So, whether it's due to a vague fear of Big Brother or a more specific desire to keep your bank information out of the hands of thieves, you might be considering ways to keep your communication more secure.

Apple discloses data request numbers
Snowden: Hong Kong was easiest answer
NSA discloses foiled terror plots
NSA: Programs 'critical' for U.S.

"So much that's geo-political, so much cybercrime, so many struggles of various types are being played out in terms of information security today," said Wade Williamson, a senior security analyst at Palo Alto Networks. "It's not just that people decided to get interested in encryption all of a sudden."

CNNMoney: How to hide from the NSA

Specifically, encryption has come up a lot in recent days. For one, NSA whistleblower (some would say "traitor") Edward Snowden said Monday in an online question-and-answer session that e-mail encryption is an effective way of foiling government surveillance.

"Encryption works," he wrote. "Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it."

Encryption is a method of securing your files, including e-mail, by encoding it so that the intended recipient can read it, but anyone who may intercept the message along the way cannot.

An encryption tool turns your original message (called "plaintext") into a garbled mess (or "ciphertext") while it's flying from Point A to Point B. The system gives the approved recipient a decryption tool which makes the text readable once it arrives at its destination.

With all of the renewed interest in online privacy, we talked with Williamson about ways to help keep your data secure -- before, during and after sending it.


First things first. There are ways to make your contact with every website you visit more secure.

A "secure sockets layer" (SSL) provides a layer of security during everything from Web browsing to text messaging. Many major websites offer the option of using a secure connection all the time. Williamson and other security experts suggest doing this when given the option.

If not -- sometimes it can be as easy as tweaking "http" to "https" in your browser's address bar.

"By and large, you can just throw an 'S' into the URL and go to town," Williamson said.

There are also tools like HTTPS Everywhere, a free extension for Chrome and Firefox browsers, that encrypt your connection with most major websites.

Obama: I'm no Dick Cheney


Most major e-mail services, like Outlook and Gmail, offer some form of encryption. Check your e-mail's security settings for options.

But for people who are really worried about their e-mails being intercepted -- and that's always just an unsecured network and an eager hacker away -- Williamson suggests buying encryption software. (Note: His company focuses on network security and does not sell encryption software to individuals).

With many of the systems, customers will get digital "certificates" for themselves called private keys. Everyone with whom they want to share encrypted messages will receive public keys.

Using such a system, only someone with a private certificate could descramble a message's content.


So, your data may be secure while it's hurtling through cyberspace. But what if somebody breaks into your car, where you stupidly left your laptop, and makes off with it?

That's where disk encryption comes in.

There's some free disk encryption software floating around in the open-source community, but for most folks this, too, will cost some cash.

In effect, disk encryption scrambles everything stored to your computer, requiring a password or other approved recovery tool to decode it. So, if your computer falls into the wrong hands, all won't be lost.

To summarize, there are lots of encryption and other security options out there. Some are quick, easy and free. Others are going to cost money for specialized software, hardware or both.

To find a level of security you're comfortable with, start by poking around with security settings on your browser, e-mail client and favorite websites. Then consider whether you want professional help to get to the next level.

Do you have other favorite security tricks? Share them in the comments.

Part of complete coverage on
Data mining & privacy
updated 10:25 AM EDT, Sun June 23, 2013
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
updated 8:26 AM EDT, Thu May 29, 2014
Traitor or patriot? Low-level systems analyst or highly trained spy?
updated 3:27 PM EDT, Thu May 29, 2014
What are the takeaways from Snowden's NBC interview? You might be surprised.
updated 7:52 AM EDT, Fri April 18, 2014
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
updated 12:43 PM EDT, Wed March 12, 2014
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
updated 8:44 PM EDT, Sun March 9, 2014
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
updated 8:39 PM EDT, Mon March 10, 2014
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
updated 11:55 PM EDT, Thu August 1, 2013
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
updated 8:57 AM EST, Tue December 10, 2013
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
updated 7:39 AM EDT, Fri August 2, 2013
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
updated 10:35 AM EDT, Thu August 1, 2013
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
updated 2:54 PM EDT, Thu August 1, 2013
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
updated 9:04 AM EDT, Sun August 18, 2013
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
updated 2:54 PM EDT, Wed July 24, 2013
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
updated 9:56 AM EDT, Tue July 2, 2013
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
updated 3:54 PM EDT, Fri August 29, 2014
Browse through a history of high-profile intelligence leaking cases.
updated 10:37 AM EDT, Tue July 2, 2013
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
updated 9:04 AM EDT, Wed June 26, 2013
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
updated 6:47 AM EDT, Wed June 19, 2013
With reports of NSA snooping, many people have started wondering about their personl internet security.
updated 9:52 AM EDT, Wed August 14, 2013
Click through our gallery to learn about other major leaks and what happened in the aftermath.
updated 4:02 PM EDT, Sun June 9, 2013
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.