If you’ve gotten to this chapter, then you’ve done better than I did back in my school days. But even after reading every single chapter, you might still have some basic questions, such as: What can I do to protect my digital privacy as well as my family’s and friends’, and to protect our basic freedoms? It’s fine to make sweeping arguments about the need for technological and legal reforms, but what about some more practical information?
But there’s a problem with practical information: It tends to change, and to change rather quickly. If your goal is to keep yourself safe while using the internet, then you’re going to have to move at the pace of the internet. This is the main burden of being a young person, in any age: The young are always living at the cutting edge.
So let me try to find a way to talk about the practical in terms other than best practices. Let me try to talk about change, because the struggle that begins with you changing your own habits must ultimately end with changes to technology, and changes to law—with change being brought to the world.
Every time you go online, you need to know the current rules of the game if you want to have any chance of controlling what happens next. You should be aware of the strengths and weaknesses of the tools you rely on to connect and protect you, along with the many ways the sites and systems on the other end intend to track and exploit you. Two organizations that I trust, the Electronic Frontier Foundation (eff.org) and the Freedom of the Press Foundation (freedom.press), publish useful guides that can get you up to speed on surveillance self-defense, from scrubbing the identifying tags invisibly hidden in your photos by your phone to encrypting your data with even better techniques than the ones I used to stand up against the NSA.
Once a solid foundation is acquired, you might want to get involved with the Open Source movement. A great way of doing that is through the Free Software Foundation (fsf.org).
To get involved in the ongoing discussions of technology’s intersections with civil liberties, you can’t do better than seeking out the ACLU (aclu.org); for technology’s intersection with climate science, I’d recommend 350.org.
When I started thinking about putting together a version of my book for younger readers, I realized that I wanted to write a final chapter directly addressing my own protocols—the steps I take to keep secure online—a subject I’m continually asked about. When I sat down to write this book, I didn’t just open up a Microsoft Word document and type in it, and then attach the document to an email to my publisher sent from an account like edwardjsnowden@gmail.com or Sys-Admin@apple.com. Instead, I wrote it in an Open Source word-processing program, LibreOffice Writer, running on a “virtual machine” that never connects to the internet. I then encrypted the finished document, transferred the encrypted copy to write-once media, which I then moved onto a different computer that goes online only through the anonymity-friendly Tor network. From there, I uploaded the encrypted file to a file-sharing site that doesn’t require a log-in, and using another virtual machine pretending to be a phone, I sent the password to the encrypted file to my publisher using the Signal messenger.
If that sounds like babble to you, remember that there was a time when none of it meant anything to me, either. Besides, sometimes you aren’t trying to beat the NSA, you’re just trying to keep your kid brother or sister out of your browsing history or a jealous ex from stalking you. You yourself may not have to go through every step of this process in order to just send an email, but maybe a single technique—whether you’re protecting your identity, your location, your contacts, or just the content of what you say and share online—will one day be of help.
In general, I think it’s important to remember that no matter how quickly the internet changes, you yourself change, too. Some of the best advice I can give is to start thinking about the future as you already think about the past: You know you’ve changed so much in the past decade, so imagine how much you will continue to change as you get older. So much of good online habits come from merely recalling this fact, and the importance of giving yourself the opportunity to reinvent who you are. This involves a significant amount of self-forgiveness, for example, forgiving yourself for past views that you expressed online but may no longer hold, but it also involves extending that forgiveness to others, who are surely going through the same process of continuous growth.
Ultimately, our privacy is collective: Yours depends on your classmates’ and friends’, and theirs depends on yours. Remember that anything you share can be reshared and eventually reach the eyes and ears of those for whom it was never originally intended. We should never make assumptions about people, least of all about what they consider public or private or secret. A good steward is a perennial good student: someone who’s never too afraid to ask, Can I share this and with whom? When and where, if and how?