We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

6 Ways to Protect Yourself from the CLOUD Act

Kristina Perunicic Managing Editor

Online privacy was dealt a major blow at the end of March 2018 when the Clarifying Lawful Overseas Use of Data (CLOUD) Act was added in the near the end of a 2,232 page budget bill.

The CLOUD Act was never voted on by the US Congress or even reviewed. Instead it was slipped into page 2,201 of a $1.3 trillion spending bill, which was voted on as a single entity.

However, the repercussions of the CLOUD Act changes the way that government officials can obtain your data. It gives the US and foreign governments the opportunity to request data without a warrant.

Fear not, all hope is not lost, at vpnMentor we have come up with a list of things you can do to help maintain your privacy and remain anonymous online.

What is the CLOUD Act?

So what exactly is this privacy harming legislation that Congress felt the need to slip into an unrelated bill in order to get it passed?

It all started several years ago, with a lawsuit involving a criminal investigation into an Irish citizen. The US government had a warrant and subpoenaed Microsoft for data that was stored on their Irish servers. Microsoft refused to hand over the information, claiming the servers weren’t based in the United States and therefore they were under no obligation to respect the warrant. The case has been dragging on for four years.

Fast forward to present day, under the new CLOUD Act, the US government no longer needs a warrant and Microsoft must comply with the request and hand over the data. Microsoft is already on record saying that there is no need to continue fighting in this case, and they will hand over the data to the authorities.

There are two main provisions in the bill:

  1. Permission is granted to any law enforcement, from local police to federal agencies, to access “the contents of a wire or electronic communication and any record or other information” regardless of where the data is stored. Provided the company is US based, they will be compelled to hand over the data, even if the server is in a foreign country.
  2. The President of the United States will be able to enter into “executive agreements” with other countries, allowing them access to data stored outside of the US, without due process. That data can then be used to implicate US citizens, even though it was collected without a warrant.

This law is scary for citizens since it violates your privacy.

Imagine a foreign government investigates one of their citizens and requests access to their data on a social network such as Facebook. Facebook will be obligated to hand over all the information, and this could include information on US citizens.

Those foreign government will then be able to just hand over all the data to their US counterparts, without any warrant needed.

You can read the entire CLOUD Act here - just scroll down to page 2,201

Congressional findings

What Can You Do?

We aren’t ready to give up on our right to privacy, and we hope you aren’t either. We gathered a list of tips that can help protect your data from different governments. This list includes alternatives to popular sites and services that we recommend you start using to help keep your activity anonymous.

  1. Always use a VPN

    The first step to protecting your privacy is to purchase a quality VPN and make sure that it’s on when you're browsing.

    Using a VPN is a crucial piece of the puzzle when it comes to protecting your online privacy because it masks your IP address, which makes you essentially invisible online. It will also use different security protocols to encrypt your data, making it next-to-impossible for the government to understand the information they might gather. You can read more about what a VPN can do for you here.

    Not all VPN’s are created equal, so make sure the VPN you use has leak protection, a strict zero logging policy, and is located in a country that is not part of the Five Eyes Alliance (or the expanded 14 eyes). We highly recommend using ExpressVPN, which is located in the British Virgin Islands, or CyberGhost VPN, which is based in Romania. Both VPN providers have great security protocols and have proven that they do not log data.

    Rank
    Provider
    Our Score
    Discount
    Visit Website
    1
    medal
    9.9 /10
    9.9 Our Score
    Save 49%!
    2
    9.7 /10
    9.7 Our Score
    Save 78%!
    3
    9.5 /10
    9.5 Our Score
    Save 83%!
  2. #DeleteFacebook

    Facebook’s credibility has taken a huge hit over the past few months as more and more details of the Cambridge Analytica scandal come out. It was recently reported that over 87 million Facebook users had their personal data improperly shared.

    Facebook data is a literal gold mine for law enforcement officials who want dirt on a potential suspect. Someone’s likes, friends, groups, chats, and posts can definitely be used as evidence, and it seems logical that investigators would turn to request data this type of data. With the passing of the CLOUD Act, acquiring that information will be quick and easy. The only solution is to leave the social media giant and delete your Facebook account as quickly as possible.

  3. Get rid of Dropbox

    DropBox may be the biggest name in the file-sharing space, but it is far from the most secure. The company has been plagued with several major security breaches over the past few years.

    If you value your privacy, then create an account at SpiderOak, which was endorsed by none other than Edward Snowden. Despite being based in the US, SpiderOak users have no reason to fear that the government will be reading their documents anytime soon. Even if they turn over their servers, the files are all encrypted and only the user controls the keys to unlock the files.

  4. Avoid Cloud Storage

    The cloud, not to be confused with the CLOUD Act, has some great features. It makes it easy to access your files anywhere and on multiple devices. The downside is that your documents, photos, or personal data, can be accessed on a number of servers. With the new CLOUD Act, any law enforcement can potentially obtain that information without requiring a warrant.

    If you have to use to the cloud, find a service like Tresorit that includes end-to-end encryption and is located outside the US and in a country that is not part of the Five Eyes alliance. If you are going to avoid the cloud, we recommend encrypting your documents with VeraCrypt, which creates encrypted backups on a local disk for you.

  5. Replace your Gmail account with ProtonMail

    Can you imagine if you receive an email from an old college friend, and because of that, all your emails are turned over to the government for some light reading. That’s what can happen if you use Gmail, Yahoo mail, or any of the other leading free email services. ProtonMail is completely anonymous; there is no personal information needed to create the account. They don’t save IP addresses, and all email address are encrypted with end-to-end encryption.

    The icing on the cake is the company is located in Switzerland and therefore protected by the strict Swiss privacy laws. The creators of ProtonMail have also developed Proton VPN which is a solid VPN that can integrate with TOR and provide a very high level of anonymity. Read our complete review of Proton VPN here.

  6. Avoid Google Search

    Google, along with Microsoft, Apple, and Facebook, are big supporters of the CLOUD Act, which means that they’ll be more than happy to turn over your data should the request arrive at their offices. Google probably knows you better than you know yourself. Who knows what crazy things you might have searched for while you were drunk one evening? Do you really want that information turned over to your local government?

    While Google definitely runs the most popular search engine, there are quality alternatives, such as StartPage which will give you Google’s results but with extra layers of security and privacy. DuckDuckGo, is another great alternatives, as they don’t store any user data, and would therefore have nothing of value to hand over should a request be made.

Protecting Privacy is Hard, But Possible

As maintaining online anonymity becomes increasingly challenging, legislations like the CLOUD Act make it even more crucial to take measures to protect your digital footprint.

We aren’t suggesting that you go off the grid completely and wear the proverbial aluminum foil cap. Just be cautious and take the necessary precautions. The first step is to get a VPN that will protect your anonymity and allow you the freedom to stay online without fear of being snooped on. Read the reviews and find the best VPN to protect your privacy.

Privacy Alert!

Your data is exposed to the websites you visit!

Your IP Address:

Your Location:

Your Internet Provider:

The information above can be used to track you, target you for ads, and monitor what you do online.

VPNs can help you hide this information from websites so that you are protected at all times. We recommend ExpressVPN — the #1 VPN out of over 350 providers we've tested. It has military-grade encryption and privacy features that will ensure your digital security, plus — it's currently offering 49% off.

Visit ExpressVPN

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize the independent, professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Kristina Perunicic is a former editor for vpnMentor. She’s a cybersecurity expert with an interest in VPNs and their importance in the digital privacy landscape.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.