Ask a hacker: Top four anti-surveillance apps

Summary:After a week of leaks of NSA citizen surveillance and Internet company denials, Violet Blue reports which mobile apps are best for privacy.

Did they or didn't they? That's the question at the end of this week's ground-shaking news that two highly classified programs reveal the U.S. government has been spying on its citizens behind closed doors for years, made public in leaks as reported by Guardian U.K.

One NSA program brought to light this week harvests phone records via Verizon . The second program is called Prism, in which the NSA data-mines user information directly from nine Internet giants , including Apple, Facebook, Google, Microsoft and Skype.

No one has contested the Verizon data/surveillance exchange deal. President Obama today confirmed the existence of both NSA programs and acknowledges Prism, tech companies Google and Facebook issued carefully-worded statements with each company saying it had never head of Prism.

If the NSA is getting their intel without our knowledge or consent straight from the tap, there's nothing we can do to protect ourselves. Except maybe yell at them really loud. Just like in a classic scary movie, the calls are actually coming from inside the house.

Add to this the element of outside information seekers: data dealers who work to make a buck by scraping sites, exploiting security holes, or making direct data sales with the very same companies alleged to be part of Prism. Now we can extend the horror film analogy, where we find out (always too late!) that the serial killer is also the babysitter.

Even against odds, I felt that at the very least we can make someone's job a little bit harder.

Hence the title of this post. I asked not just one, but several hackers who work professionally in high-level security environments what the best anti-surveillance, pro-privacy phone apps are. What is on their phones? What should be on mine?

After they finished laughing at my question (especially in light of the Prism revelations), I got solid answers. You can tell me what I left out in the comments, but I only wanted to post apps that were tested and in use by people whose jobs (or more) depend on personal communication security.

Keep in mind that the sudden activation of encryption tools can draw attention to you, when before there might have been none.

However, now might be a good time to take advantage of the fact that in the middle of this news storm, suddenly lots of people are going to be trying out anti-surveillance software.

Most recommended: Text Secure and Red Phone by Whisper Systems (Android only; iOS in development).

Both apps are free and open source, "enabling anyone to verify its security by auditing the code."

1. Text Secure (play.google.com)

text secure nsa

TextSecure encrypts your text messages over the air and on your phone. It's almost identical to the normal text messaging application, and is just as easy to use. 

TextSecure provides a secure and private replacement for the default text messaging app. All messages are encrypted locally, so if your phone is lost or stolen, your messages will be safe.

Messages to other TextSecure users are encrypted over the air, protecting your communication in transit. TextSecure is the only Android private SMS/MMS messenger replacement that uses open source peer-reviewed cryptographic protocols to keep your messages safe.

Rather than simply pretending to hide your texts by putting them in another place, TextSecure uses cryptography to ensure that they remain truly secure.

2. Red Phone (play.google.com)

red phone

RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.

RedPhone uses your normal phone number to make and receive calls, so you don't need yet another identifier. Use the default system dialer and contacts apps to make calls as you normally would.

RedPhone will give you the opportunity to upgrade to encrypted calls whenever the person you're calling also has RedPhone installed.

RedPhone calls are encrypted end-to-end, but function just like you're used to. Uses wifi or data, not your plan's voice minutes.

Second place must-haves: Tor apps Onion Browser (Apple iOS) and Orbot (Android), or running your own VPN.

Both Onion Browser and Orbot make use of the Tor Project, but they each function slightly differently (with privacy protection limitations falling on the Apple side of the tree due to the closed nature of iOS).

3. Onion Browser (Apple iTunes)

onion

Onion Browser is a minimal web browser that encrypts and tunnels web traffic through the Tor onion router network and provides other tools to help browse the internet while maintaining privacy.

Websites do not see your real IP address. Your connection is encrypted before it leaves your device, providing protection against snooping by ISPs or people who share a WiFi connection with you.

Tunnel bypasses restrictive firewalls: you can access the entire Internet from behind ISPs or corporate connections, or when inside countries that practice online censorship. Access websites on the "dark net" of anonymous .onion web sites, only accessible in the Tor network.

User-Agent spoofing: hides the fact that you are using an iPhone/iPad from websites you visit. Ability to block third party cookies or all cookies. Can change IP address and clear cookies/history/cache in one button.

CHINA/IRAN NOTE: Due to online censorship techniques using deep-packet inspection (DPI), this app does NOT currently function in China or Iran.

4. Orbot (play.google.com)

orbot

Orbot is a "proxy app that empowers other apps to use the internet more securely. It uses Tor to encrypt Internet traffic and hide it by basically bouncing through a series of computers around the world; it is the official version of the Tor onion routing service for Android.

(...) instead of connecting you directly like VPNs and proxies. This process takes a little longer, but the strongest privacy and identity protection available is worth the wait.

Use with Orweb, the most anonymous way to access any website, even if it’s normally blocked, monitored, or on the hidden web. Use Gibberbot with Orbot to chat confidentially with anyone, anywhere for free.

Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you want to use through Tor.

Any installed app can use Tor if it has a proxy feature, using the settings found here. Check out our fun, interactive walkthrough.

The thing to know about Tor-based projects is that they will slow down your response times, and for many — privacy or not — this is a dealbreaker.

To Tor or not to Tor, everyone agreed that running a VPN (Virtual Private Network) of some kind is a smart thing to do. Read Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs).

Yes, there is so much more you can do.

A good place to start is The Electronic Frontier Foundation (EFF) Surveillance Self-Defense Guide. If you're low on time to read it all, skip to What Can I Do To Protect Myself?

The EFF now has a two-click form — Massive Spying Program Exposed — where visitors can instantly send emails to their representatives calling for a full Congressional investigation saying, "It's time for a full accounting of America's secret spying programs—and an end to unconstitutional surveillance."

Update Saturday, June 8, 2:34am PST to include footnote: These apps are good to protect you from many types of invasive attacks, but they won't protect against skilled attackers (such as powerful, unethical governments with unrestrained technical access). It's important to know that mobile devices - in this instance mobile phones, specifically - are generally weak platforms. If you're a person who's at-risk, don't bet your life on any app - or any phone.

Topics: Mobility, Apple, Apps, Google, Government : US, Mobile OS, Security

About

Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that inclu... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.