Activists are fighting back with high-tech civil disobedience, entrepreneurs want to cash in on privacy concerns, Internet users want to keep snoops out of their computers and lawmakers want to establish stricter parameters.
Some of the tactics are more effective than others. For example, Flagger, a program that adds words like "blow up" and "pressure cooker" to web addresses that users visit, is probably more of a political statement than actually confounding intelligence agents.
Developer Jeff Lyon in Santa Clara, Calif., said he's delighted if it generates social awareness, and that 2,000 users have installed it to date. He said, "The goal here is to get a critical mass of people flooding the Internet with noise and make a statement of civil disobedience."
University of Auckland associate professor Gehan Gunasekara said he's received "overwhelming support" for his proposal to "lead the spooks in a merry dance," visiting radical websites, setting up multiple online identities and making up hypothetical "friends."
And "pretty soon everyone in New Zealand will have to be under surveillance," he said.
Electronic Frontier Foundation activist Parker Higgins in San Francisco has a more direct strategy: by using encrypted email and browsers, he creates more smoke screens for the NSA. "Encryption loses its' value as an indicator of possible malfeasance if everyone is using it," he said.
And there are now plenty of encryption programs, many new, and of varying quality.
"This whole field has been made exponentially more mainstream," said Cryptocat private instant messaging developer Nadim Kobeissi.
This week, researchers at Carnegie Mellon University released a smartphone app called SafeSlinger they say encrypts text messages so they cannot be read by cell carriers, Internet providers, employers "or anyone else."
CryptoParties are springing up around the world as well. They are small gatherings where hosts teach attendees, who bring their digital devices, how to download and use encrypted email and secure Internet browsers.
"Honestly, it doesn't matter who you are or what you are doing, if the NSA wants to find information, they will," said organizer Joshua Smith. "But we don't have to make it easy for them."
Apparently plenty agree, as encryption providers have seen a surge in interest.
Pretty Good Privacy, or PGP, a free encryption service was being loaded about 600 times a day in the month before Snowden's revelations broke. Two months later, that had more than doubled to 1,380, according to a running tally maintained by programmer Kristian Fiskerstrand.
Andrew Lewman, executive director of TOR, short for The Onion Router, said they don't track downloads of their program that helps make online traffic anonymous by bouncing it through a convoluted network of routers to protect the privacy of their users.
But, he said, they have seen an uptick.