Survivopedia
  • HOME
  • GENERAL PREP
    • All
    • Disaster Scenarios
    • EMP
    • Natural Disasters
    • Survival News
    • Survival Skills
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    When Hope Feels Distant: Survival Lessons from Faithful Generations

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Raising Strong Kids in a Weak Culture

    Natural Anti-Inflammatories That Store for Years

    What If the Power Grid Goes Down Tomorrow?

    What If the Power Grid Goes Down Tomorrow?

    What the Ukraine War Taught Us About Civilian Survival

    What the Ukraine War Taught Us About Civilian Survival

    Bugging In vs. Bugging Out: What Historic Cultures Would Choose

    Why We Prep

    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • All
    • Cold Weapons
    • Firearms
    • Regulations
    Field Reloading

    Field Reloading

    Fully Automatic Firearms? No Thanks!

    Are Alternative Weapons Practical in a Post-Disaster World?

    How To Travel With A Firearm

    The Ultimate Survival Knife: How to Pick the Right One

    A Sharp Edge: Choosing the Best Survival Knife for Prepping and Self-Defense

    Is There a Place for “Fast Draw” in Survival?

    Indispensable Gear for your EDC Core Layer

    Best 17 silent weapons for when SHTF

    Best 17 silent weapons for when SHTF

    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • All
    • Cooking
    • Farm Animals
    • Food Storage
    • Hunting
    • Plants & Gardening
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    8 Medicinal Plants the Native Americans Used for Survival

    Catching and Preserving Fish in Survival Situations

    Herbal and Alternative Antibiotics

    Heirloom Vegetables and Seeds

    Heirloom Vegetables and Seeds

    How To Stash Water When You’re Bugging In

    How To Stash Water When You’re Bugging In

    9 Composting Mistakes – All that Stands Between You and Black Gold

    9 Composting Mistakes – All that Stands Between You and Black Gold

    This Is Why The Amish Will Not Go Hungry During A Crisis

    This Is Why The Amish Will Not Go Hungry During A Crisis

    Eating Snake Meat – The Dos and Don’ts

    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter
  • HOME
  • GENERAL PREP
    • All
    • Disaster Scenarios
    • EMP
    • Natural Disasters
    • Survival News
    • Survival Skills
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    When Hope Feels Distant: Survival Lessons from Faithful Generations

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Packing a Family Vehicle for Long-Term Bug-Out Living

    Raising Strong Kids in a Weak Culture

    Natural Anti-Inflammatories That Store for Years

    What If the Power Grid Goes Down Tomorrow?

    What If the Power Grid Goes Down Tomorrow?

    What the Ukraine War Taught Us About Civilian Survival

    What the Ukraine War Taught Us About Civilian Survival

    Bugging In vs. Bugging Out: What Historic Cultures Would Choose

    Why We Prep

    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • All
    • Cold Weapons
    • Firearms
    • Regulations
    Field Reloading

    Field Reloading

    Fully Automatic Firearms? No Thanks!

    Are Alternative Weapons Practical in a Post-Disaster World?

    How To Travel With A Firearm

    The Ultimate Survival Knife: How to Pick the Right One

    A Sharp Edge: Choosing the Best Survival Knife for Prepping and Self-Defense

    Is There a Place for “Fast Draw” in Survival?

    Indispensable Gear for your EDC Core Layer

    Best 17 silent weapons for when SHTF

    Best 17 silent weapons for when SHTF

    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • All
    • Cooking
    • Farm Animals
    • Food Storage
    • Hunting
    • Plants & Gardening
    Food Storage Methods Across Cultures

    Food Storage Methods Across Cultures

    8 Medicinal Plants the Native Americans Used for Survival

    Catching and Preserving Fish in Survival Situations

    Herbal and Alternative Antibiotics

    Heirloom Vegetables and Seeds

    Heirloom Vegetables and Seeds

    How To Stash Water When You’re Bugging In

    How To Stash Water When You’re Bugging In

    9 Composting Mistakes – All that Stands Between You and Black Gold

    9 Composting Mistakes – All that Stands Between You and Black Gold

    This Is Why The Amish Will Not Go Hungry During A Crisis

    This Is Why The Amish Will Not Go Hungry During A Crisis

    Eating Snake Meat – The Dos and Don’ts

    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter
No Result
View All Result
Survivopedia
No Result
View All Result
Home GENERAL PREP

Protecting From Spying Eyes On Your Metadata

Unless you’ve been living under a virtual rock, you’ve heard about the increasing concern over NSA’s ability to monitor the digital information of American phone calls, emails, and text messages.  It’s the first amendment right granted by the Constitution to complain about what the government does.

However, before you start microwaving your hard drive or flushing your cell phone down the toilet in fear that a government agency will use that information against you, it’s important to first get the facts straight.

What is Metadata?

Many of the headlines you’ll read regarding this issue talk about the topic of metadata, a part of everyday communications most people don’t think–or even know–about when sending digital files. When you send a letter, its delivered in two parts: the addressed envelope and the contents of the letter itself. The same applies to an email or text: you send the message itself attached to a deliverable address and, maybe, subject line.

Essentially, metadata is the part of the file that’s needed for a message to arrive at its destination.  The addressed envelope, email address and subject line, Twitter hashtag, and phone number are all forms of metadata. This differs from the message, or data, itself, especially as far as the NSA is concerned.

Everything said inside the envelope, in the body of an email, over a phone call, or on a Facebook post is the message attached to the metadata. In laymen’s terms, if you shout someone’s name across a room to get their attention, the name shout is the metadata. Whatever you say to them after you’ve made contact is the message.

Though the dividing line between the message and the metadata may seem arbitrary, it creates a problem within American law.

Due to the first amendment, privacy, and intellectual property laws, the message is typically protected by law against infringement from spying eyes. Unfortunately, the law is yet to recognize the attached metadata as warranting the same protection, even though programmers often require the input of sensitive material into the metadata.

Metadata and Your Privacy

html codeThis creates a problem when you get a situation like the Verizon court order, where it was unveiled that the NSA was collecting the phone records of millions of US users. This required Verizon, one of the largest telecommunications providers in the US, to hand over the numbers of both parties on each call, location data of the phones, call duration, and time of calls.

In other words, they were to hand over the metadata of millions of Verizon subscribers.  This may draw up the obvious question of why Verizon seeks to track this user data in the first place; and the answer seems simple.  Cell phone companies aren’t seeking to track your whereabouts or digital doings for reasons of surveillance. They do it so they can understand how cell phones work and interact and how cell towers track and transmit calls.

Furthermore, in order to continually enhance and maintain service and attract new users–partly to create those dotted color maps representing coverage across the country–the telecom companies need to track where their users are and how they move around.

For phone company purposes–the same of which apply to Facebook, Twitter, Gmail, and so on–knowing your metadata helps keep the service up and running.  These companies seems to have little interest in your personal life and information, aside from knowing your interests to further bolster advertisement streams.

However, apart from not using or carrying a phone or computer, there isn’t much you can do about keeping that information secret from your mobile phone company or Internet service.

However, the world did learn about the PRISM program thanks to one of Edward Snowden’s many Wikileaks slides.  The program unveiled that some of the biggest media and communications companies in the world, among them Microsoft, Google, Yahoo, Facebook, YouTube, Skype, and Apple, were in cahoots with the NSA to provide them with user email, video chats, photos, stored data, file transfers, login activity, and social networking details if requested.

Here’s the bad news: if you don’t want to have the NSA to have any chance of spying on your activities on these programs, your only option is avoid using them.  That’s not to say that you should stop using Facebook and Gmail right now, but you should if you are absolutely desperate to keep your information away from the NSA.

Unfortunately, these aren’t the only companies involved in PRISM, nor does there seem to be an end as to how many could come under its umbrella.

Protecting Your Metadata

PRISMFortunately, there are some things you can do to keep your metadata secure and private.  Doing so may not only keep the government’s prying eyes out of your personal life, but also any other unwanted individuals who may want to steal your identity or take advantage of your private data.

On computers and smartphones, which are basically handheld computers, the main means of protecting your personal information, both message and metadata, is through cryptography.  In its simplest terms, cryptography is a way of using a mathematic algorithm to rewrite information in a secret code.

In digital communication, cryptography uses the exchange of coded keys, or long strings of numbers that each party uses to encode and decode each other’s messages.  Like any other form of computer programming, cryptography comes in a variety of languages, including the Diffie-Hellman key exchange, public-key cryptography, and symmetric key exchange.

You don’t necessarily know how to “speak” these languages, as they are most often left up to mathematic functions that are easy for computers to create.

However, these functions are very difficult to undo, so much so that even the NSA can have difficulties circumventing some key exchange crypto codes.

The most viable and effective forms of cryptography comes in the form of end-to-end encryption.  Unlike most forms of encryption, not even the server a message passes through can look at your messages this way.  The server may still pass on the associated metadata to a third party, but will only see encrypted code as the message.  The catch:  end-to-end encryption can be difficult to use and may only be worth exploring if you’re passing along extremely sensitive information.

Fortunately, servers like Google already optimize their security efforts by using a code known as SSL to hide your information from third parties, though they pick up your metadata in the process. This is something you can’t avoid.  Google will always have your metadata, as they need it to keep the network working.  But without taking advantage of Google’s SSL, your metadata gets transmitted unencrypted.

In the meantime, there are tools that exist to help hide the content of things like email messages from any possible prying eyes.

One, called Pretty Good Privacy (PGP), offers a way for two parties to use peer-to-peer encryption so that only the sender can encode the message and only the receiver can decode it.  PGP can currently be purchased by Symantec, but offshoot programs are also available and can still be created by savvy programmers.

With these types of programs you can feel safe that your messages will pass through the web worry-free, but there is no guarantee they’ll be safe from the NSA.

Such is the underlying theme of this issue.  There are many different tools and precautions you can use to protect yourself when using the phone and Internet, but in the end no form is 100% effective.

Just like sex, drugs, and alcohol, the only way to truly protect yourself from the potential dangers are to abstain completely.

privacy01This article has been written by Cody Griffin for Survivopedia.

Tags: internet
ShareTweet
Previous Post

How To Make Your Own Vegetable Oil

Next Post

Prep Blog Review: Preparing for The Worse

Cody Griffin

Cody Griffin

Cody Griffin is do-it-yourselfer, and avid outdoorsman. He is a self-proclaimed jack-of-all-trades and his work can be found across the web on several survival, outdoor, and lifestyle blogs. You can send Cody a message at editor [at] survivopedia.com.

Related Posts

Food Storage Methods Across Cultures
Food Security

Food Storage Methods Across Cultures

September 23, 2025
Psychological Prep.

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
Packing a Family Vehicle for Long-Term Bug-Out Living
Bug Out Plan

Packing a Family Vehicle for Long-Term Bug-Out Living

September 5, 2025
GENERAL PREP

Raising Strong Kids in a Weak Culture

September 3, 2025
7 Uses for Tarps You Probably Never Considered
Equipment

7 Uses for Tarps You Probably Never Considered

September 3, 2025
Alternative Medicine

Natural Anti-Inflammatories That Store for Years

September 3, 2025
Next Post
Prep Blog Review: Preparing for The Worse

Prep Blog Review: Preparing for The Worse

Comments 6

  1. Pingback: Protecting from Spying Eyes on Your Metadata | TheSurvivalPlaceBlog
  2. Mith Radates says:
    12 years ago

    The normal definition of metadata is information about information. E.g., field sizes, formats, frequency distribution, timing, links, etc. If any “metadata” can be traded to a specific datum, it is NOT metadata, but data. If the NSA is collecting phone numbers, they are data because they can associate with a specific home or user. You are being lied to about this mess. They are already in your shorts.

    Reply
  3. Pingback: Who’s Paying For The Net Neutrality? | The Prepper Dome
  4. Pingback: Net Neutrality... Good, Bad Or In-Between? | Survival skills, survival guns, survival guide
  5. Pingback: Protect your company from the risks of metadata shadows - Security Curated
  6. Amromano David says:
    8 years ago

    Honestly is really nice to understand, but is true that the metadata can really work as it’s explain?

    Reply

Leave a Reply to Mith Radates Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

Bugging In vs. Bugging Out: What Historic Cultures Would Choose

September 12, 2025
What the Ukraine War Taught Us About Civilian Survival

What the Ukraine War Taught Us About Civilian Survival

September 3, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
Top 6 Survival Rifles And Why You Need One

Top 6 Survival Rifles And Why You Need One

428
Top 5 Bug Out Locations In The US

Top 5 Bug Out Locations In The US

257
Top 10 Vehicles For Your EMP Survival

Top 10 Vehicles For Your EMP Survival

162
10 Items You Need To Hoard

10 Items You Need To Hoard

148
Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
Packing a Family Vehicle for Long-Term Bug-Out Living

Packing a Family Vehicle for Long-Term Bug-Out Living

September 5, 2025

Raising Strong Kids in a Weak Culture

September 3, 2025











Recent Articles

Food Storage Methods Across Cultures

Food Storage Methods Across Cultures

September 23, 2025

When Hope Feels Distant: Survival Lessons from Faithful Generations

September 5, 2025
  • Privacy Policy
  • Terms&Conditions
  • Blogroll
  • Contact
  • Newsletter

© SURVIVOPEDIA.COM

No Result
View All Result
  • HOME
  • GENERAL PREP
    • SHTF SCENARIOS
      • Survival Skills
      • Disaster Scenarios
      • Natural Disasters
      • WATER
      • FINANCIAL
      • WAR & CONFLICTS
      • emp
    • EQUIPMENT
      • Bug-Out-Vehicle
      • Firearms
      • COMMUNICATION
    • ENERGY
      • ENERGY
      • Energy Sources
      • Electric Equipments
      • Consumption Control
  • WEAPONS
    • Firearms
    • Cold Weapons
    • Defense
    • Privacy & Data Protection
    • Regulations
  • FOOD
    • Food Storage
    • Cooking
    • Farm Animals
    • Hunting
    • Plants & Gardening
  • Store
  • Newsletter

© SURVIVOPEDIA.COM