PRISM: The US government is attacking the entire global online community

Privacy & Security Posted on June 7, 2013

PRISM: The US government is attacking the entire global online community

Did you need more evidence that the US government is spying on your web browsing? Well today is your lucky day. The Guardian has just published evidence of a secret program from the US government’s NSA, which proves that security agencies have direct access to the servers of major companies including Google, Facebook and Apple.

While we always suspected such a backdoor existed, the revelations are still shocking to see laid bare. The program, called PRISM, allows officials to collect your search history, the actual content of emails, file transfers and live chat sessions. This all according to 41 slide PowerPoint presentation, which the Guardian has verified as authentic.

A failure of democracy

PRISM demonstrates a complete failure in democracy and shows that citizens from every country in world are at risk from the US government’s recklessness approach to online privacy. What’s the point of debating this stuff in Congress? What’s the point of public consultations? The NSA is prepared to steam-roll the legislative process not just for American citizens, but for the entire world.  Bills like CISPA are irrelevant. The government will act like such legislation already exists. Signing it into law is a mere formality. 

PRISM once again raises serious questions about the entire internet eco-system and how we perceive the companies with which we entrust so much private data. The full list of companies working within PRISM is as follows: Microsoft, Facebook, Google, AOL, Apple and Yahoo. That covers pretty much all the major providers of social networks, search tools and email services.

There’s confusion over whether these companies are complicit in the spying or have no knowledge. Google has issued a statement denying all knowledge of PRISM and Apple says its “never heard” of the program. It’s probably safe to say these companies are lying and have the protection of the US government. After all, it’s not like Google has ever been totally honest about its surveillance activities in the past.

Fight back

It’s time to fight back. Boycott the companies mentioned in the Guardian’s report. Support search engines such as DuckDuckGo, which do not store user data. Get off Facebook and get onto social networks that respect privacy like Diaspora. Use The Onion Router, I2P, a VPN or a combination. Visit the Electronic Frontier Foundation’s website and get involved in campaigning for online freedoms. Let your government know that you take online privacy seriously.  

Privacy
We invite you to discuss this post in our Reddit community or on Twitter. You can also send your feedback to blog@ivpn.net.
IVPN News

Independent security audit concluded

By Nick Pestell

IVPN News

IVPN applications are now open source

By Viktor Vecsei

Releases

Beta IVPN Linux app released

By Viktor Vecsei

IVPN TunnelCrack vulnerability assessment Privacy & Security

IVPN TunnelCrack vulnerability assessment

Posted on September 7, 2023 by IVPN Staff

Context TunnelCrack is the combination of two independent security vulnerabilities (LocalNet attack and ServerIP attack) that affect VPN applications. The research paper detailing these vulnerabilities was published and presented on 11 August 2023. IVPN apps were not tested by the researchers, and unlike other providers, we did not receive a vulnerability disclosure.
Most people don't need a commercial VPN to work from home securely Privacy & Security

Most people don't need a commercial VPN to work from home securely

Posted on April 7, 2020 by Nick Pestell

Many small businesses and their employees are concerned about the security of their data whilst working from home during the coronavirus pandemic. We see a lot of confusion surrounding this topic, even from fairly technical folk and there is unfortunately a lot of misinformation being spread by commercial VPN providers themselves.
Spotted a mistake or have an idea on how to improve this page?
Suggest an edit on GitHub.