Source files of fsfe.org, pdfreaders.org, freeyourandroid.org, ilovefs.org, drm.info, and test.fsfe.org. Contribute: https://fsfe.org/contribute/web/ https://fsfe.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

news-20130712-01.en.xhtml 3.5KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <html newsdate="2013-07-12">
  3. <head>
  4. <title>New Snowden leak: Storing your data at Microsoft is negligent</title>
  5. </head>
  6. <body>
  7. <h1>New Snowden leak: Storing your data at Microsoft is negligent</h1>
  8. <p newsteaser="yes">In an <a
  9. href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data/">article
  10. published today, The Guardian</a> describes how Microsoft is actively
  11. cooperating with the NSA. According to the article, Microsoft is providing
  12. the NSA with broad access to the communications of anyone using the
  13. company's services:</p>
  14. <ul>
  15. <li>Microsoft gives the NSA access to encrypted mails on Hotmail, Live.com and Outlook.com, as well as web chat messages.</li>
  16. <li>Microsoft provides the NSA with easy access to its SkyDrive storage service, which currently has 250 million users worldwide.</li>
  17. <li>Microsoft makes it possible for the NSA to monitor audio and video calls on the Skype service which it acquired in 2011.</li>
  18. </ul>
  19. <blockquote><p>"This makes it clear that trusting Microsoft with your
  20. critical company data is downright negligent," says Karsten Gerloff,
  21. President of the Free Software Foundation Europe. "In both the public and
  22. the private sector, those responsible for security and data protection
  23. urgently need to take action to protect their organisations, customers
  24. and clients."</p></blockquote>
  25. <p>While it is difficult or impossible to entirely escape surveillance,
  26. there are ways to minimise the risk that sensitive data, such as
  27. confidential product data or patient records, is intercepted by a third
  28. party. Free Software solutions for groupware, office products and operating
  29. systems are fully auditable, and often data security a priority. End-to-end
  30. encryption with Free Software products such as <a
  31. href="http://gnupg.org">GnuPG</a> and <a
  32. href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">
  33. off-the-record messaging (OTR)</a> protects data in transit. Products
  34. providing secure audio, video and chat communications, such as <a
  35. href="https://jitsi.org/">Jitsi</a>, go a long way towards replacing
  36. Skype.</p>
  37. <blockquote><p>"We advise companies and all other organisations that wish
  38. to protect their data to use Free Software solutions, to store data
  39. in-house wherever possible, and to cooperate only with providers whom
  40. they trust to protect their customers' data," says Gerloff. "Such
  41. providers will often use strong encryption, and minimise the amount of
  42. data they store. Using smaller providers instead of global IT companies
  43. makes it somewhat less likely that customers' data will be caught in the
  44. NSA's dragnet."</p></blockquote>
  45. <p>Users should actively take control of their data and communications. One
  46. way to do so is to support the developers of Free Software encryption
  47. technologies, so they can continue to provide these important products.
  48. "Now is a good time to <a
  49. href="http://g10code.com/gnupg-donation.html">donate to the Free Software
  50. PGP implementation GNU Privacy Guard (GnuPG)</a>!", says Matthias
  51. Kirschner, FSFE's Head of Public Awareness.</p>
  52. </body>
  53. <tags>
  54. <tag>front-page</tag>
  55. <tag>Encryption</tag>
  56. <tag>GnuPG</tag>
  57. <tag>Microsoft</tag>
  58. </tags>
  59. <timestamp></timestamp>
  60. </html>
  61. <!--
  62. Local Variables: ***
  63. mode: xml ***
  64. End: ***
  65. -->