How to get around the new laws of Australia metadata

Today, telecommunications companies of Australia in accordance with the law, to start two storage in the amount of your private journal metadata.

This means that each text message or e-mail you send, every phone call you make or receive, as well as the IP-address will be recorded and filed on the servers in your Telco within two years.

Although the actual content of the phone calls will not be stored, your location at the time of those calls will be recorded, as well as call duration, and the identities and locations of both parties at either end of the telephone line.

same applies to the content of your e-mail, and while the sites you visit will not be saved, your IP-address will be stored so that law enforcement can track the illegal activities with you – it’s like like giving police their records of fingerprints before any crime has been committed

With the new storage laws that were in place, governments can now get access to all. Your personal information without your permission, and potentially even without a warrant.

Of course, you are probably not the culprit, so why should it bother you? Well, the funny thing about privacy is that you not appreciate it until it was gone – a few European Union countries have introduced similar laws metadata in recent years, and some, including Germany, have since declined to legislation Based on the fact that it is unconstitutional.

There are also issues that will have access to data, whether it is stored or from the shore, and it will be encrypted.

Most of the countries with the laws of conservation of data will be performed only on the metadata within six months to a year, as opposed to two years in the Australian version of the bill. As more data is collected, the greater the risk to the security of a private life, which he represents.

With all these things in mind, here are some ways for you to protect your privacy, go ahead.

Get VPN services


Using VPN (or virtual private network) is not only a great way to gain access to the foreign version of Netflix – it is also a way to ensure that all data packets sent and received computers and smart devices pass through an encrypted tunnel. Even if someone has access to one of these packages, they are not able to read the encrypted data inside.

Virtual private networks allow you to connect to servers in different parts of the world, which makes it seem like the physical location of your computer is in another country completely -. VPNs also replace the IP-address of one of the virtual location, which makes it almost impossible to trace back to you

There are many services VPN, to choose from on the Internet, some tailored to Australian users. Most will set you back about $ 10 to $ 15 a month.

Make sure that your chosen VPN service provides encryption and do not store the metadata by all, as those who may ultimately bow to legal pressure and give your information to the authorities – Service HideMyAss VPN did, leading the arrest of LulzSec hacker Cody Kretsinger in 2012

Of course, he got what was coming to him, but this example does highlight as a VPN is not really private, if it is not one that does not store metadata

If all this sounds too complicated, do not worry -. we received a detailed guide to to install and maintain a VPN .

browse anonymously using Tor


Thor (abbreviated Onion Router) is a system of protocols that prevent IP- traced the address of the Internet that allows you to effectively browse anonymously.

Although it is often used for nefarious deeds, Thor is also useful for fine vertical people who want their personality, communication and web browsing habits a secret.

these people include activists and whistleblowers, journalists and their sources, and even people who live in oppressive regimes.

Thor runs routing your Internet traffic through a series of Tor relays, effectively giving your anonymity multiple levels of security using the middle relays, relay output, and bridges.

Internet traffic is routed through the switch, your incoming and outgoing data in various parts of the world.

However, it slows down your browsing considerably, but most people will not need to use Tor every time.

Run Tor as easy as loading , and install the software Tor Browser, although its settings can be customized extensively to enhance anonymity.

This is a detailed guide on how to increase your online privacy with Tor .

Use personal software messenger


Now that our laws metadata will monitor our emails and text messages, it is important to use a messenger application that destroys any traces of your communications gear.

Although our Prime Minister Malcolm Turnbull led the attack on the laws of the metadata that are currently introduced in Australia, it was recently found that the former Minister of Communications is quite indifferent to the encrypted messenger of application Wickr ( Hey, if he is good enough to keep a secret message the Prime Minister, it’s good enough for us).

Wickr ad hoc network uses encryption to send messages created with randomly generated keys, one-time, that immediately after the destroyed read.

The Company is not responsible for user data at all, so you do not have to worry about your location, or someone you refer – .. Posts just have devices they were sent to

Wickr available on iOS and Devices Android, as well as Windows, OS X Mac and Linux computers

If you do not Wickr, there are other options such as Bleep , from the creators of the protocol BitTorrent, which cuts metadata average person c using the same P2P technology is used for torrenting send direct messages to users without any stops along the way

Bleep also allows users to send self-destruct messages mission :. Impossible-style, so you never have to worry about your friend hanging on them, or manually remove them yourself.

Bleep is available devices by IOS and Android, as well as Windows and Mac OS X.