03 Online Privacy: How to Disappear
As details of American snooping(窥探)spread, sales of “1984”, George Orwell's fable of an ever-watching state, rocketed. So did traffic to websites run by Tactical Technology Collective, a 1 that teaches journalists and activists how to evade online spies. "It can be hard to persuade people accept surveillance(监视) 2 to them," admits Stephanie Hankey, a co-founder. Apparently not any more.
Opponents have always trying to take 3 to cover compromising communications. But computers now mark suspicious patterns in daily activities too. People need greater alertness and face three challenges to keep secrets.
The first is stopping the nosy(爱管闲事的)sniffing communications in transit. Unencrypted(未加密的)e-mails are as 4 as postcards, warns Ben Wagner, an Internet specialist at the European University Institute. Pretty Good Privacy (PGP), scrambling(打乱)software that works with several web clients, can prevent such snooping.
Another task is to stop spies sucking data from wherever it is 5 . That means withdrawing from services, such as social networks and search engines, that must pass data to governments—or 6 out alternatives in untouchable territories. A battered desktop with free software makes a secure e-mail server.
It is 7 to escape from systems that record whether communications have taken place. "Using a mobile is the worst thing you can do," says Marek Tuszynski at Tactical Technology. The call logs(通话记录)kept by telecoms firms are difficult to avoid. Internet users have more security. Free software such as Tor can hide their identity by 8 routing their requests.
But staying under the radar is boring and hard to keep up. Clueless contacts can blow your cover. Even technophiles(技术爱好者)may compromise themselves by 9 means.
Ms Hankey would prefer laws, not just technology, to preserve people's 10 . She wants governments in Europe and elsewhere to boost alternatives to America's "digital monopolies".
A)charity E)matters I)posted M)stored
B)cleverly F)meaningless J)privacy N)trickier
C)clinic G)measures K)seeking O)unconsciously
D)hopefully H)open L)simpler
选项分析
[名词]charity慈善团体 clinic诊所 measures措施 privacy隐私
[动词]matters关系重大 posted张贴 seeking寻求 stored储存
[形容词]meaningless无意义的 open公开的 simpler更简单的 trickier更棘手的
[副词]cleverly巧妙地 hopefully有希望地 unconsciously无意识地
长难句点睛
1.So did traffic to websites run by Tactical Technology Collective, a charity that teaches journalists and activists how to evade online spies. (Line 2, Para. 1)
[解析]句子的主干为So did traffic to websites。本句为So引导的倒装句,表示前句所述的情况也适用于该句中的traffic to websites run by Tactical Technology Collective,即Tactical Technology Collective组织所经营的网站的访问量也迅速增加。run by...为过去分词短语作websites的后置定语。后半句中的a charity that teaches journalists and activists how to evade online spies为Tactical Technology Collective的同位语。
[译文]Tactical Technology Collective组织所经营的网站的访问量也迅速增加。该组织是一家慈善机构,主要教授记者以及活跃分子们如何规避网络间谍。
2.That means withdrawing from services, such as social networks and search engines, that must pass data to governments—or seeking out alternatives in untouchable territories. (Line 1, Para. 4)
[解析]句子的主干为That means withdrawing...or seeking。此处的means为动词,意为“意味着”,其后可以接名词、动名词和that从句。such as social networks and search engines是对前面提到的services进行举例,相当于插入语,不影响句子的结构。that must pass data to governments修饰services。连接词or引导的内容和withdrawing from services一样,均为means的宾语。
[译文]这意味着需要放弃一些必须将数据传给政府的服务项目,比如社交网络以及搜索引擎,或者在不可触及的领域中寻求替代品。
答案精解
1.A charity
[快速解题]名词辨义题。根据空格前的不定冠词a和空格后的that可以判断,此处需要填入一个名词的单数形式。备选词汇中clinic意为“诊所”,显然不符合句意,因而只有charity“慈善团体”符合此处语境,故选A。
2.E matters
[快速解题]动词辨义题。根据空格前的to persuade people accept surveillance和空格后的to them可以判断,此处需要填入一个动词的第三人称单数形式。备选词汇中只有matters“关系重大”符合此处语境,故选E。
3.G measures
[快速解题]名词辨义题。根据空格前的take和空格后的to cover可以判断,此处需要填入一个名词,且需能够与take搭配使用。备选词汇中只有measures“措施”符合此处语境,故选G。
4.H open
[快速解题]形容词辨义题。根据空格前的are as和空格后的as postcards可以判断,此处需要填入一个形容词。由于空格所在的段落讲述的是如何阻止传输过程中的通信信息窃取活动,可以推知该句是要论述未加密邮件的不安全性。备选词汇中只有open“公开的”符合此处语境,故选H。
5.M stored
[快速解题]动词辨义题。根据空格前的wherever it is可以判断,此处需要填入一个动词的过去分词形式。由于空格所在句子讲述的是防止间谍窃取数据,因而排除备选词汇中的posted“张贴”,只有stored“储存”符合此处语境,故选M。
6.K seeking
[快速解题]动词辨义题。根据空格处所在的句子结构分析,空格处所填词汇应和withdrawing并列,可判断此处需要填入一个动名词,且能和out搭配使用。备选词汇中只有seeking“寻求”符合此处语境,seek out意为“找到,追寻到”,故选K。
7.N trickier
[快速解题]形容词辨义题。根据空格前的It is和空格后的to escape from可以判断,此处需要填入一个形容词。根据上下文可以推知,空格所在的句子讲述的是很难避开记录通信信息的系统。备选词汇中只有trickier“更棘手的”符合此处语境,故选N。
8.B cleverly
[快速解题]副词辨义题。根据空格前的by和空格后的routing their requests可以判断,此处需要填入一个副词,以修饰动名词routing。routing their requests意为“按指定路线发送请求”,故而备选词汇中只有cleverly“巧妙地”符合此处语境,故选B。
9.L simpler
[快速解题]形容词辨义题。根据空格前的by和空格后的名词means可以判断,此处需要填入一个形容词,以修饰means。根据上下文,备选词汇中只有simpler“更简单的”符合此处语境,故选L。
10.J privacy
[快速解题]名词辨义题。根据空格前的people's可以判断,此处需要填入一个名词。由于全文围绕保护人们的隐私展开,不难推断此处应该填入的是privacy“隐私”,故选J。
重难点词汇
fable[ˈfeɪbl] n.寓言
rocket[ˈrɒkɪt] v. 迅速增加
evade[ɪˈveɪd] v. 规避
compromising[ˈkɒmprəmaɪzɪŋ] a.不宜泄露的
suspicious[səˈspɪʃəs] a.可疑的
sniff[snɪf] v. 嗅探
route[ruːt] v. 按指定路线发送
under the radar 低调神秘,不引人注目
boost[buːst] v. 增加
monopoly[məˈnɒpəli] n.垄断
全文译文
网络隐私:如何抹去上网痕迹
随着美国“监控门”的细节不断传播,《1984》的销量也直线上升。该书是乔治·奥威尔所写的一部寓言,讲的是一个一直都在进行监控活动的国家。Tactical Technology Collective组织所经营的网站的访问量也迅速增加。该组织是一家慈善机构,主要教授记者以及活跃分子们如何规避网络间谍。“劝说人们接受和自己切身利益相关的监视很难。”集团的共同创立者之一斯蒂芬妮·汉基承认这一点。显然,现在不再困难了。
反对者一直以来都尝试掩藏其不宜泄露的通信。但是,现在的电脑也会标记日常活动中的可疑事件。人们需要更多的警觉。要想保守住秘密,人们现在面临着三大挑战。
第一大挑战是停止传输过程中爱管闲事的嗅探通信。欧洲大学研究所的本·瓦格纳警告说,没有加密的电子邮件就像明信片一样公开透明。一款叫做“完美隐私”的软件(PGP)可以对与网络客户合作的软件进行干扰,防止这样的窥探活动。
另一大挑战是,阻止间谍从数据存储处窃取数据。这意味着需要放弃一些必须将数据传给政府的服务项目,比如社交网络以及搜索引擎,或者在不可触及的领域中寻求替代品。一台装有免费软件的破旧电脑就可以成为一个非常安全的电子邮件服务器。
避开记录通信信息的系统是一个更加棘手的挑战。Tactical Technology Collective组织的马雷克·图申斯基说:“使用手机是最糟糕的一件事情。”很难避免通信公司做电话通信记录。互联网用户更安全一些。像Tor一样的免费软件可以巧妙地按指定路线发送请求,从而达到隐藏身份的目的。
但是,始终保持隐私是一件无聊又困难的事。愚蠢的联系人可能会泄露你的身份。即使是技术爱好者,也可能很容易地暴露自己。
汉基女士认为,要保护人们的隐私,不仅需要技术,还需要法律。她希望欧洲和其他地区的政府能够鼓励发展美国“数字垄断”的替代品。