SMC Black Paper: How to Secure Your Digital Life (Part II)

Sovereign Confidential

Black paper

It happened again. 

Another day, another leak: the Internet is full of reports of large data breaches, this time in the form of military-grade malware purchased from NSO Group, an Israeli-based hacker-for-hire group.

The software infects phones and enables operators to extract messages, photos, and emails, plus record calls and secretly activate microphones and cameras.

Among the 50,000 contacts on the list are French leader Emmanuel Macron (who then promptly ditched his phone and changed his number), plus an estimated 1,000 dissidents and human-rights journalists around the world.

Pegasus isn’t the only one peering in. Just last week, the Democratic National Committee made headlines by reportedly urging SMS carriers to censor private text messages with COVID-19 “misinformation.” 

Think about that for a moment...

Look, we’re in an age where, as we keep saying, privacy has gone the way of the dodo bird. 

And protecting your privacy from the government, from a political party, or from privately developed, commercial spyware sold to military, intelligence and law enforcement agencies, is a pipe dream.

We all must go about our business assuming that our iPhones and Androids, our home security systems and our laptops, all are compromised. 

But there are still steps we can take to mitigate our privacy from being sold to everyone else. Privacy is still important. 

And that’s why we wrote this Black Paper on Securing Your Digital Life, a follow-up to Part One. Here, we’ll focus on phone, enterprise, and offline solutions.

It may seem futile to take these steps amid such headlines, but there is still much you can do to take back control of at least some of your more critical information. Be informed. Know the threats. And be proactive.

It happened again.  Another day, another leak: the Internet is full of reports of large data breaches, this time in the form of military-grade malware purchased from NSO Group, an Israeli-based hacker-for-hire group. The software infects phones and enables operators to extract messages, photos, and emails, plus record calls and secretly activate microphones and cameras.…

- Members Only Content -
You need to be a member of Sovereign Confidential to access this content.

Neither this document, nor any content presented by our organization, is intended to provide personal tax or financial advice. This information is intended to be used and must be used for information purposes only. We are not investment or tax advisors, and this should not be considered advice. It is very important to do your own analysis before making any investment or employing any tax strategy. You should consider your own personal circumstances and speak with professional advisors before making any investment. The information contained in this report is based on our own research, opinions, as well as representations made by company management. We believe the information presented in this report to be true and accurate at the time of publication but do not guarantee the accuracy of every statement, nor guarantee that the information will not change in the future. It is important that you independently research any information that you wish to rely upon, whether for the purpose of making an investment or tax decision, or otherwise. No content on the website (SchiffSovereign.com) or related sites, nor any content in this email, report, or related content, constitutes, nor should be understood as constituting, a recommendation to enter into any securities transactions or to engage in any of the investment strategies presented here, nor an offer of securities. Schiff Sovereign employees, officers, and directors may participate in any investment described in this content when legally permissible, and do so on the same investment terms as subscribers. Schiff Sovereign employees, officers, and directors receive NO fundraising commissions from companies who appear in this report.