Free Software Foundation
 

Please consider adding [email protected] to your address book, which will ensure that our messages reach you and not your spam box.

Read and share online: https://www.fsf.org/blogs/community/parents-domestic-violence-victims-lawyers-read-about-people-who-protect-their-privacy-with-free-software

Dear Free Software Supporter,

In the previous installment of our privacy series, we heard from people who have to fight for their rights and who protect their privacy by using free software. Maybe you live in a democratic country where citizens enjoy legal certainty and therefore deem government oppression far away. Maybe you trust your government to never fail (and I sincerely hope you will never be disappointed). Why should you care about privacy and use free software to protect it? The following people can tell you from their own experiences.

Meet people who use free software to protect privacy

Ina Johnson is a domestic violence victim who lives in the United States. Her husband tracks her online activity in real time, selectively blocks her access to websites, attempts to steal her account credentials, deletes data from her devices, and violates her right to privacy in a multitude of ways. In a survey conducted by the Tor Project, Johnson says, "I started using Tor to protect my privacy […] If not for Tor, I would not have another option for online privacy."

Tor is a browser and online anonymity network that improves privacy on the Internet. It uses encryption and IP address obfuscation to make web traffic untraceable and private. Tor, as well as all the projects and software we present in this article, is free software, which is the only type of software that can guarantee true privacy. While free software doesn't guarantee privacy, only free software allows us to guarantee true privacy.

Going back to the topic of why privacy in general is important, let's do a thought experiment. Let's assume you trust your spouse, all the people around you, and your government. Take a moment to think about whether you also trust big tech giants like Google and Meta to the same degree. Consider whether you trust them, for example, to responsibly handle sensitive information of your children's health and other data. George Sanchez would answer that question with a decided no. His reasons are simple, he wants to protect his children in today's technological environment. In the Tor survey, he says, "I am a father of two teenagers. […] I try to be up to date with research, information, and details if anything arises. I use Tor to do the research to basically avoid telling Google (and others) that my children have […] issues." Similarly, James Taylor explains, "I use Tor as my everyday browser. Especially, when I research doctors and other very personal stuff, it feels better, 'cause hopefully there won't be data for sale, telling the world about my assumed medical condition."

Micky Metts, LibrePlanet keynote speaker and worker/owner of Agaric Technology Collective uses free software because it grants her the right to study how the software that holds her data is working and lets her control who has access to her information. She states:

Personal information has been used to deny people healthcare and to deny employment based on medical conditions or political beliefs. […] Some corporations buy data in bulk to learn more about their employees. A good example would be that your employer finds out you may be pregnant because you bought a pregnancy test at a pharmacy that sells their data […] and then terminates you immediately.

Next, let's meet doctor Steven White. Sanchez, Taylor, Metts, and all the rest of us can only hope that our doctor is as thoughtful with our medical information as Dr. White, who goes out of his way to protect his patients' privacy, and does so with free software. Dr. White has politicians as patients whose legislation made them big enemies in the telecom, social media, and search engine industries. When he does research on diseases and treatment, he has to ensure that his search histories can't be correlated to patient visits nor leak information about their health, families, and personal lives.

Unfortunately, we see more and more people use proprietary software, such as what runs on devices like the Apple Watch, to monitor their health. In our fall FSF Bulletin article on privacy, you can read how proprietary period tracking apps send the health data about its users to surveillance capitalism tech giants like Meta.

Healthcare is one example of an area with especially sensitive information. There are other areas with similar concerns, like education or law. If you ever need a lawyer, you should check that they will handle what you tell them as carefully as Alper Atmaca, a lawyer in Turkey, or Neil Brown from decoded.legal, a virtual English law firm. Both exclusively use free software to communicate with their clients. When Atmaca offers a videoconference on Jitsi Meet, he is often confronted with resistance in the beginning. Many clients want to stick to a program by the tech giants that they know. However, after some explanation, his clients soon come to understand that the delicate topics they are talking about with their attorney will only stay confidential if they communicate via software that respects their privacy. "In the end, most of them are amazed what a self-hosted Jitsi has to offer," says Atmaca.

Jitsi Meet offers end-to-end encryption for conversations between two people and encryption at the network level for videoconferencing between more people, which is why the FSF provides a fully free Jitsi Meet server to all associate members as a member benefit. The service notably does not use any third party servers for network initialization. Hosting own instances of services is the fastest way to controlling software privacy. To help others, we published the source code of the FSF's customizations of Jitsi Meet.

Finally, let's hear from Neil Brown, who also thinks that communicating securely is important. He, too, uses Jitsi for videoconferences and, if a client requests it, encrypts his emails. "Whether you are communicating with your lawyer or your lover, it's important that what you say stays with you and the person you are communicating with only and that no one else can alter it!" The same is true for client-identifiable information. Brown therefore encrypts files with Cryptomator before syncing them to a free, decentralized file storage platform called Nextcloud. If someone accesses the system remotely they will only see encrypted files. In addition, Brown encrypts his disks in case his computer gets lost or stolen. Brown is keen to point out that valuing freedom does not mean compromising on quality. He says, "there's a wealth of amazing free software, offering both quality and freedom -- you don't need to settle for just one or the other."

Protecting our privacy is not a crime, it's a fundamental right

There are countless reasons why we should protect our privacy using end-to-end encryption. Nevertheless, some still draw a foregone conclusion that the mere use of encryption is in itself sufficient evidence of criminal actions. Unfortunately, this is also the case in the investigations of the so-called "8 December" case, in which seven people were accused of being part of a terrorist conspiracy. The defendants adamantly deny the charge of terrorism. Their trial is set to be held in October 2023.

La Quadrature du Net revealed that the investigation cites the use of encrypted communication and privacy tools such as VPN or Tor as proof of so-called "clandestine behavior," which is considered to reinforce the charge of terrorism. The following quote of the conclusion by the Parquet National Antiterroriste (National Antiterrorist Prosecution Office) on the 8 December case shows this paradigmatically:

The protagonists of the case were all characterized by their cult of secrecy and obsession with discretion, both in their exchanges and in their Internet browsing habits. The encrypted application Signal was used by all of the accused, some of whom communicated exclusively [highlighted in the original text] through it.

It's a popular misconception that someone who encrypts their communication or protects their browsing from prying eyes is hiding a crime. Misconceptions like this make it even more important that people who use encryption tell their story and let the world know how free software encryption helps protect our privacy, and why that is so important. Because we have everything to protect from snoops. What we write, where we browse, and who we are belongs to us and only to us. No one else should be allowed to see it without our permission. Privacy is not a crime; it's our fundamental right.

Tell your own story

Let us and the world know why you use free software to protect your privacy. Tell your story on social media starting your statement with "I use #freesoftware to protect my #privacy because […]"

Read more on privacy and free software

Visit the website of the FSF's anti-surveillance campaign to learn more about privacy and free software.

Discover why privacy and security depend on free software.

Check out the FSF's Email Self-Defense Guide which is available in eight different languages.

Take action! Protect free software that respects our privacy against legislative attempts to install a backdoor.

In freedom,

Miriam Bastian
Program Manager

Editorial note: Names have been changed to protect the privacy of the people whose stories are told in this article.

Illustration Copyright © 2014, Johannes Landin. Licensed under Creative Commons Attribution-Share Alike 3.0 Unported International license.