---------- Forwarded message ---------- Date: Tue, 20 Jun 2023 19:19:39 -0400 Subject: We have nothing to hide, only everything to protect *Please consider adding <info@fsf.org> to your address book, which will ensure that our messages reach you and not your spam box.* *Read and share online: <https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect>* Dear Karl Semich, "I have nothing to hide." That's what most people say when I start a conversation about privacy. Have you ever wondered why you should use software that protects your privacy and the privacy of the people you communicate with? To understand this better, I recommend watching the first talk in our LibrePlanet 2023 [lightning talk][1] series. In her five minute talk, the speaker will convince you that you are worthy of all the privacy you want and need. For people who claim that they have nothing to hide, she has a persuasive reply: "I have nothing to hide, only everything to protect." [1]: https://media.libreplanet.org/u/libreplanet/m/lightning-talks-a26f/ If you don't use free software for the sake of your own privacy, then use it to protect your loved ones; if you don't value yourself enough to make sure that information that's yours -- and only yours -- stays with you, then at least honor the privacy of the most vulnerable people in our society. History shows that even societies that are considered to be free have areas in which they struggle to exercise equal treatment and fail to guarantee human rights for everyone who lives within them. In the above-mentioned lightning talk, the speaker cites the example of the [Underground Railroad][2], a network of secret routes and safe houses that helped enslaved African Americans in the 19th century escape from slavery. The Underground Railroad would not have been possible without privacy! [2]: https://en.wikipedia.org/wiki/Underground_Railroad At a time when ongoing legislation all over the world is threatening end-to-end encryption and developers of large language models blatantly [violate privacy laws][3] to get training data for their systems, we will be publishing a series of articles to highlight the importance of privacy. In our upcoming articles, you will be introduced to people who use privacy-protecting free software and learn what you can do to counter the dangers resulting from the ongoing legislative processes. While waiting for these articles, you can read our [previous articles on privacy][4] and strengthen end-to-end encryption by using it. [3]: https://www.fsf.org/bulletin/2022/spring/unjust-algorithms/ [4]: https://www.fsf.org/campaigns/surveillance ## Strengthen end-to-end encryption by using it The more people who use end-to-end encryption in their everyday lives, the stronger the protection is for all of us. Only as a community can we withstand oppressive mass surveillance. And only by using free software can we rest assured that our privacy is protected. And, if you wonder why it has to be free software, we recommend reading our blog article "[True privacy and security depend on free software][5]." To protect your privacy, we recommend using: * [GNU Privacy Guard (GPG)][6] for encryption. The FSF's [Email Self-Defense Guide][7] will help you learn how to encrypt your emails and files; * a secure video conferencing tool like [Jitsi Meet][8] or [GNU Jami][9]. The FSF provides a fully free [Jitsi Meet server][10] to all associate members as a member benefit; * [GNU Jami][9], [XMPP][11], [Silence][12], [Matrix][13], or [Tox][14] when messaging your friends on your mobile phone or when writing colleagues about a patient, a client, or a student; * a secure browser like [GNU IceCat][15]. Read our article "[Intelligent tracking prevention][16]" if you want to learn why GNU IceCat is a better choice than many other browsers when it comes to protecting your privacy as you browse the web; * the [Tor network][17] to browse privately. With a system like [Snowflake][18], you can use the Tor network to avoid being watched by Internet censors and help others bypass censorship by operating a Snowflake proxy. On your phone, you can use Tor Browser for Android to securely browse via the Tor network and [Orbot][19] to route the data from your email client, messaging, and other apps over the Tor network. Enable the [Guardian Project's repository][20] to download Orbot from F-Droid. By using these programs, you will protect yourself as well as your loved ones. We all deserve privacy! [5]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption [6]: https://gnupg.org/ [7]: https://emailselfdefense.fsf.org/en/ [8]: https://directory.fsf.org/wiki/Jitsi-Meet [9]: https://directory.fsf.org/wiki/Jami [10]: https://www.fsf.org/associate/about-the-fsf-jitsi-meet-server [11]: https://directory.fsf.org/wiki/Category/Protocol/xmpp [12]: https://silence.im/ [13]: https://directory.fsf.org/wiki/Matrix-synapse [14]: https://directory.fsf.org/wiki/Tox [15]: https://www.gnu.org/software/gnuzilla/ [16]: https://www.fsf.org/blogs/community/intelligent-tracking-prevention-new-safa... [17]: https://directory.fsf.org/wiki/Tor [18]: https://snowflake.torproject.org/ [19]: https://support.torproject.org/glossary/orbot/ [20]: https://guardianproject.info/fdroid/ In freedom, Miriam Bastian Program Manager -- * Follow us on Mastodon at <https://hostux.social/@fsf>, GNU social at <https://status.fsf.org/fsf>, PeerTube at <https://framatube.org/accounts/fsf/video-channels>, and on Twitter at @fsf. * Read about why we use Twitter, but only with caveats: <https://www.fsf.org/twitter> * Subscribe to our RSS feeds: <https://fsf.org/blogs/RSS> * Join us as an associate member: <https://www.fsf.org/jf> * Read our Privacy Policy: <https://www.fsf.org/about/free-software-foundation-privacy-policy>