Before Edward Snowden, the National Security Agency and Prism made headlines, a group of technologists was dedicated to making the Internet more anonymous.
They were viewed mostly as paranoid, weird and potentially criminal.
Now, more than a year after revelations of the government?s mass electronic surveillance program, they are leaders in a movement heating up in Silicon Valley and abroad to create more ways for people to use the Internet while keeping private who and where they are, and what they?re doing on the Web. These include email accounts that cannot be spied on, file-sharing services that the government cannot trace, and message services that cannot be recorded and stored.
?That idea used to sound far-fetched. It doesn?t sound so crazy anymore, does it?? asked Andrew Lewman, executive director of the Tor Project, an international group of researchers and technologists who maintain an Internet network in which all users are anonymous and their locations are hidden.
Joining the effort are tech giants such as Google, Apple and Yahoo, responding to a backlash from their users over data collection; niche tech companies such as San Francisco-based BitTorrent, which builds software so Internet users can keep their identities and data hidden; and ad hoc collections of technologists from Silicon Valley to Europe. While total anonymity on the highly commercialized Internet, powered by advertising revenue and big data sales, is probably impossible, security experts and tech leaders say that, one way or another, anonymity will be a bigger part of our digital future.
?Users are more aware that what they are doing online may not be private, and they are taking steps to combat that, and they are looking to technology companies for solutions,? said Daniel Castro, a senior analyst with the Washington, D.C.-based Information Technology and Innovation Foundation.
But some question people?s conviction that they have a right to online anonymity.
?If you really want to be anonymous, stay off the Internet, pay cash and homestead in Montana,? said Paul Santinelli, a venture capitalist with Palo Alto firm North Bridge Venture Partners. ?From the day that you buy a computer with a credit card and log onto the Internet, people know who you are.?
The backbone of the Internet was created through the federally funded Defense Advanced Research Projects Agency, so ?Big Brother was watching from the get-go,? Santinelli said. ?You sign up for tracking when you use (the Internet).?
Yet in the past year, companies such as BitTorrent and Guerrilla Mail ? a Chicago-based service founded in 2006 that offers anonymous, disposable email accounts ? have won over mainstream customers after once mainly serving tech geeks and cyber rabble-rousers. BitTorrent is on the cusp of tremendous growth, with a surge in users ? and, after years of stunted revenue, the promise of more cash from two new products that target consumers worried about government spying.
?A lot of these things like Prism, I wish they weren?t true, but they are, and that?s driving demand for BitTorrent?s products, no question about it,? said Eric Klinker, BitTorrent?s president and CEO.
Tech giants ? blamed by many for the loss of privacy because of their aggressive data collection, which then was handed over to the NSA ? also have pitched in. Google recently announced new encryption tools to protect email, and Apple?s new operating system changes the way smartphone data is encrypted, making it tougher for law enforcement to collect. Yahoo also has added encryption to email services.
BitTorrent has more than 170 million monthly active users across every country and has added millions more users through two new services: Bleep, a messaging and phone call app launched publicly this month, keeps all personal information private and safe from NSA?s mass data collections, according to the company. Sync, released last year, is a file-sharing program that looks much like Dropbox, but it doesn?t use servers or third parties to store or move the data, so it?s inaccessible to everyone but the sender and receiver.
Source: MCT Information Services