GPG Tools Logo

GPG Suite for Mac – Privacy for People

The GPG Suite for Mac provides everything you need to get started with secure communication and encrypting files in one simple package.  While no longer free unless you compile the code yourself, it is still worth the cost  ($24 per major relase) untill Apple builds encryption into Mac Mail.  
 

Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG without too much hassle.

One shouldn't need to set up sophisticated encryption tools to protect their private mail, documents and records.  Amendment IV to the U. S,. Constitution reads:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
 
 

 

mystic2

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

 

NSA tracking cellphone locations worldwide, . Wht Can’t the NSA do the Health Exchange App?

The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.  FULL ARTICLE

 

Slide from material released by Edward Snowden

How Microsoft handed the NSA access to encrypted messages

• Secret files show scale of Silicon Valley co-operation on Prism 
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply

By , ,  and