Advice on mobile chat apps
This commit is contained in:
parent
84c336528b
commit
2a9f449460
|
@ -25,6 +25,7 @@
|
|||
| [[Why can't I access my .onion site with a Tor browser?]] |
|
||||
| [[What is the best hardware to run this system on?]] |
|
||||
| [[Can I add more users to the system?]] |
|
||||
| [[What is the most secure chat app to use on mobile?]] |
|
||||
| [[How do I remove a user from the system?]] |
|
||||
| [[How do I reset the tripwire?]] |
|
||||
| [[Is metadata protected?]] |
|
||||
|
@ -43,7 +44,7 @@
|
|||
* I don't have a static IP address. Can I still install this system?
|
||||
Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
|
||||
|
||||
The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]], which supports a variety of dynamic DNS providers.
|
||||
The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]] , which supports a variety of dynamic DNS providers.
|
||||
* Why not support building images for Raspberry Pi?
|
||||
The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
|
||||
|
||||
|
@ -65,29 +66,35 @@ It was originally designed to run on the Beaglebone Black, but that should be re
|
|||
* Can I add more users to the system?
|
||||
Yes. Freedombone can support a small number of users, for a "/friends and family/" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
|
||||
|
||||
Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
|
||||
|
||||
Another point is that Freedombone installations are not intended to support many users (maybe ten at most). Large numbers of users may make the system unstable, and the more users you have on one system the more it becomes a single point of failure and also perhaps a honeypot from the standpoint of adversaries. Think of what happened with Lavabit and the moral dilemma which an administrator can be faced with (comply with threats and betray the trust of your users or don't comply and suffer other consequences). Ideally, you never want to put yourself into a situation where you can be forced to betray others.
|
||||
* What is the most secure chat app to use on mobile?
|
||||
On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
|
||||
|
||||
The current safest way to chat is to use [[https://conversations.im][Conversations]] together with [[https://guardianproject.info/apps/orbot/][Orbot]] - both of which can be installed from [[https://f-droid.org/][F-droid]]. You may need to enable the [[https://guardianproject.info/][Guardian Project]] repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
|
||||
|
||||
There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a /complete social graph/ of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
|
||||
* How do I remove a user from the system?
|
||||
To remove a user:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
|
||||
* How do I reset the tripwire?
|
||||
The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomain -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
|
||||
* Is metadata protected?
|
||||
|
@ -99,9 +106,9 @@ Select /Administrator controls/ then "reset tripwire" using cursors and space ba
|
|||
|
||||
Even when using Freedombone metadata analysis by third parties is still possible. This can be mitigated by accessing your blog, or other web services, via their /onion addresses/, rather than via more conventional domain names. In that case your ISP and any government which they might be compelled to report back to will know when your system is being accessed, but not necessarily /which/ services are being accessed /or by whom/. So for instance using a Tor browser and the onion address people may be able to safely read your blog or wiki and be reasonably confident that metadata isn't being gathered about what they read (or more concisely the metadata which can be gathered by a third party may just not be very useful or personally identifiable). On the other hand if you access the system via conventional domain names and dynamic DNS then it's safe to assume that metadata can and will be collected by third parties.
|
||||
* How do I create email processing rules?
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@domainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
|
||||
|
||||
|
@ -116,13 +123,13 @@ Spamassassin is also available and within Mutt you can use the S (shift+s) key t
|
|||
* Why isn't dynamic DNS working?
|
||||
If you run the command:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
service inadyn status
|
||||
#+END_SRC
|
||||
#+begin_src bash
|
||||
systemctl status inadyn
|
||||
#+end_src
|
||||
|
||||
And see some error related to checking for changes in the IP address then you can try other external IP services. Edit */etc/inadyn.conf* and change the domain for the *checkip-url* parameter. Possible sites are:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src text
|
||||
https://check.torproject.org/
|
||||
https://www.whatsmydns.net/whats-my-ip-address.html
|
||||
https://www.privateinternetaccess.com/pages/whats-my-ip/
|
||||
|
@ -169,14 +176,14 @@ http://www.infosniper.net/
|
|||
http://wtfismyip.com/
|
||||
http://ipinfo.io/
|
||||
http://httpbin.org/ip
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
* How do I change my encryption settings?
|
||||
Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh myusername@mydomain -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
|
||||
* How do I get a domain name?
|
||||
|
@ -184,12 +191,12 @@ Suppose that you have bought a domain name (rather than using a free subdomain o
|
|||
|
||||
Remove any existing nameservers for your domain (or select "custom" nameservers), then add:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src text
|
||||
NS1.AFRAID.ORG
|
||||
NS2.AFRAID.ORG
|
||||
NS3.AFRAID.ORG
|
||||
NS4.AFRAID.ORG
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
It might take a few minutes for the above change to take effect. Within freedns click on "Domains" and add your domains (this might only be available to paid members). Make sure that they're marked as "private".
|
||||
|
||||
|
@ -197,34 +204,34 @@ Select "Subdomains" from the menu on the left then select the MX entry for your
|
|||
|
||||
To route email to one of your freedns domains:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
editor /etc/mailname
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Add any extra domains which you own, then save and exit.
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
editor /etc/exim4/update-exim4.conf.conf
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Within dc_other_hostnames add your extra domain names, separated by a colon ':' character.
|
||||
|
||||
Save and exit, then restart exim.
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
update-exim4.conf.template -r
|
||||
update-exim4.conf
|
||||
service exim4 restart
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
You should now be able to send an email from /postmaster@mynewdomainname/ and it should arrive in your inbox.
|
||||
|
||||
* How do I get a "real" SSL/TLS/HTTPS certificate?
|
||||
If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
|
||||
|
||||
|
@ -234,17 +241,17 @@ Normally certificates will be automatically renewed once per month, so you don't
|
|||
|
||||
If you need to manually renew a certificate:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
|
||||
* I tried to renew a Let's Encrypt certificate and it failed. What should I do?
|
||||
Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
|
||||
* Why use self-signed certificates?
|
||||
|
@ -258,15 +265,15 @@ Despite the hype, security of web sites on the internet is still a somewhat unso
|
|||
|
||||
For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok.
|
||||
* Why not use the services of $company instead? They took the Seppuku pledge
|
||||
[[http://seppuku.cryptostorm.org][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
|
||||
[[https://cryptostorm.org/viewtopic.php?f=63&t=2954&sid=7de2d1e699cfde2f574e6a7f6ea5a173][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
|
||||
* Why does my email keep getting rejected as spam by Gmail/etc?
|
||||
Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
|
||||
|
||||
Often ISPs will run their own SMTP mail server which you can use for proxying, typically called /mail.ISPdomain/. On the administrator control panel there is an option to set the details for outgoing email from the Mutt client.
|
||||
|
||||
#+BEGIN_SRC bash
|
||||
#+begin_src bash
|
||||
ssh username@mydomainname -p 2222
|
||||
#+END_SRC
|
||||
#+end_src
|
||||
|
||||
Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
|
||||
|
||||
|
|
|
@ -74,7 +74,7 @@ The most secure way to access email is via an ssh connection and shell interface
|
|||
This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
|
||||
|
||||
* Services
|
||||
For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]].
|
||||
For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]]. Also see advice on chat apps in the [[file:./faq.html][FAQ]].
|
||||
|
||||
* Battery preservation
|
||||
Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<!-- 2016-04-06 Wed 18:58 -->
|
||||
<!-- 2016-05-06 Fri 21:38 -->
|
||||
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<title></title>
|
||||
|
@ -171,15 +171,15 @@ for the JavaScript code in this tag.
|
|||
</colgroup>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline1">I don't have a static IP address. Can I still install this system?</a></td>
|
||||
<td class="org-left"><a href="#orgb121a4d">I don't have a static IP address. Can I still install this system?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline2">Why not support building images for Raspberry Pi?</a></td>
|
||||
<td class="org-left"><a href="#orgf010a5a">Why not support building images for Raspberry Pi?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline3">Why use Github?</a></td>
|
||||
<td class="org-left"><a href="#org1aa1408">Why use Github?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
|
@ -187,87 +187,91 @@ for the JavaScript code in this tag.
|
|||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline4">Why can't I access my .onion site with a Tor browser?</a></td>
|
||||
<td class="org-left"><a href="#org100d598">Why can't I access my .onion site with a Tor browser?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline5">What is the best hardware to run this system on?</a></td>
|
||||
<td class="org-left"><a href="#orga3487a7">What is the best hardware to run this system on?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline6">Can I add more users to the system?</a></td>
|
||||
<td class="org-left"><a href="#orgd298dbb">Can I add more users to the system?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline7">How do I remove a user from the system?</a></td>
|
||||
<td class="org-left"><a href="#orgef8453">What is the most secure chat app to use on mobile?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline8">How do I reset the tripwire?</a></td>
|
||||
<td class="org-left"><a href="#org6c7f74">How do I remove a user from the system?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline9">Is metadata protected?</a></td>
|
||||
<td class="org-left"><a href="#org9551764">How do I reset the tripwire?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline10">How do I create email processing rules?</a></td>
|
||||
<td class="org-left"><a href="#org1a2b83f">Is metadata protected?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline11">Why isn't dynamic DNS working?</a></td>
|
||||
<td class="org-left"><a href="#org88df6a0">How do I create email processing rules?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline12">How do I change my encryption settings?</a></td>
|
||||
<td class="org-left"><a href="#org844e5d1">Why isn't dynamic DNS working?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline13">How do I get a domain name?</a></td>
|
||||
<td class="org-left"><a href="#org577cd3b">How do I change my encryption settings?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
|
||||
<td class="org-left"><a href="#org23cc852">How do I get a domain name?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline15">How do I renew a Let's Encrypt certificate?</a></td>
|
||||
<td class="org-left"><a href="#orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
|
||||
<td class="org-left"><a href="#org2d4283">How do I renew a Let's Encrypt certificate?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline17">Why use self-signed certificates?</a></td>
|
||||
<td class="org-left"><a href="#org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
|
||||
<td class="org-left"><a href="#orgfc78066">Why use self-signed certificates?</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
|
||||
<td class="org-left"><a href="#org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline1" class="outline-2">
|
||||
<h2 id="orgheadline1">I don't have a static IP address. Can I still install this system?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline1">
|
||||
<div id="outline-container-orgb121a4d" class="outline-2">
|
||||
<h2 id="orgb121a4d">I don't have a static IP address. Can I still install this system?</h2>
|
||||
<div class="outline-text-2" id="text-orgb121a4d">
|
||||
<p>
|
||||
Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a>, which supports a variety of dynamic DNS providers.
|
||||
The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a> , which supports a variety of dynamic DNS providers.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline2" class="outline-2">
|
||||
<h2 id="orgheadline2">Why not support building images for Raspberry Pi?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline2">
|
||||
<div id="outline-container-orgf010a5a" class="outline-2">
|
||||
<h2 id="orgf010a5a">Why not support building images for Raspberry Pi?</h2>
|
||||
<div class="outline-text-2" id="text-orgf010a5a">
|
||||
<p>
|
||||
The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
|
||||
</p>
|
||||
|
@ -277,9 +281,9 @@ So although the Raspberry Pi is cheap and hugely popular it's not supported by t
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline3" class="outline-2">
|
||||
<h2 id="orgheadline3">Why use Github?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline3">
|
||||
<div id="outline-container-org1aa1408" class="outline-2">
|
||||
<h2 id="org1aa1408">Why use Github?</h2>
|
||||
<div class="outline-text-2" id="text-org1aa1408">
|
||||
<p>
|
||||
Github is paradoxically a centralized, closed and proprietary system which happens to mostly host free and open source projects. Up until now it has been relatively benign, but at some point in the name of "growth" it will likely start becoming more evil, or just become like SourceForge - which was also once much loved by FOSS developers, but turned into a den of malvertizing.
|
||||
</p>
|
||||
|
@ -297,17 +301,17 @@ Currently many of the repositories used for applications which are not yet packa
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline4" class="outline-2">
|
||||
<h2 id="orgheadline4">Why can't I access my .onion site with a Tor browser?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline4">
|
||||
<div id="outline-container-org100d598" class="outline-2">
|
||||
<h2 id="org100d598">Why can't I access my .onion site with a Tor browser?</h2>
|
||||
<div class="outline-text-2" id="text-org100d598">
|
||||
<p>
|
||||
Probably you need to add the site to the NoScript whitelist. Typically click/press on the noscript icon (or select from the menu on mobile) then select <i>whitelist</i> and add the site URL. You may also need to disable HTTPS Everywhere when using onion addresses, which don't use https.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline5" class="outline-2">
|
||||
<h2 id="orgheadline5">What is the best hardware to run this system on?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline5">
|
||||
<div id="outline-container-orga3487a7" class="outline-2">
|
||||
<h2 id="orga3487a7">What is the best hardware to run this system on?</h2>
|
||||
<div class="outline-text-2" id="text-orga3487a7">
|
||||
<p>
|
||||
It was originally designed to run on the Beaglebone Black, but that should be regarded as the most minimal system, because it's single core and has by today's standards a small amount of memory. Obviously the more powerful the hardware is the faster things like web pages (blog, social networking, etc) will be served but the more electricity such a system will require if you're running it 24/7. A good compromise between performance and energy consumption is something like an old netbook. The battery of an old netbook or laptop even gives you <a href="https://en.wikipedia.org/wiki/Uninterruptible_power_supply">UPS capability</a> to keep the system going during brief power outages or cable re-arrangements, and that means using full disk encryption on the server also becomes more practical.
|
||||
</p>
|
||||
|
@ -317,9 +321,9 @@ It was originally designed to run on the Beaglebone Black, but that should be re
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline6" class="outline-2">
|
||||
<h2 id="orgheadline6">Can I add more users to the system?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline6">
|
||||
<div id="outline-container-orgd298dbb" class="outline-2">
|
||||
<h2 id="orgd298dbb">Can I add more users to the system?</h2>
|
||||
<div class="outline-text-2" id="text-orgd298dbb">
|
||||
<p>
|
||||
Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
|
||||
</p>
|
||||
|
@ -343,9 +347,25 @@ Another point is that Freedombone installations are not intended to support many
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline7" class="outline-2">
|
||||
<h2 id="orgheadline7">How do I remove a user from the system?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline7">
|
||||
<div id="outline-container-orgef8453" class="outline-2">
|
||||
<h2 id="orgef8453">What is the most secure chat app to use on mobile?</h2>
|
||||
<div class="outline-text-2" id="text-orgef8453">
|
||||
<p>
|
||||
On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
The current safest way to chat is to use <a href="https://conversations.im/">Conversations</a> together with <a href="https://guardianproject.info/apps/orbot/">Orbot</a> - both of which can be installed from <a href="https://f-droid.org/">F-droid</a>. You may need to enable the <a href="https://guardianproject.info/">Guardian Project</a> repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a <i>complete social graph</i> of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org6c7f74" class="outline-2">
|
||||
<h2 id="org6c7f74">How do I remove a user from the system?</h2>
|
||||
<div class="outline-text-2" id="text-org6c7f74">
|
||||
<p>
|
||||
To remove a user:
|
||||
</p>
|
||||
|
@ -361,9 +381,9 @@ Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Delete
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline8" class="outline-2">
|
||||
<h2 id="orgheadline8">How do I reset the tripwire?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline8">
|
||||
<div id="outline-container-org9551764" class="outline-2">
|
||||
<h2 id="org9551764">How do I reset the tripwire?</h2>
|
||||
<div class="outline-text-2" id="text-org9551764">
|
||||
<p>
|
||||
The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
|
||||
</p>
|
||||
|
@ -379,9 +399,9 @@ Select <i>Administrator controls</i> then "reset tripwire" using cursors and spa
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline9" class="outline-2">
|
||||
<h2 id="orgheadline9">Is metadata protected?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline9">
|
||||
<div id="outline-container-org1a2b83f" class="outline-2">
|
||||
<h2 id="org1a2b83f">Is metadata protected?</h2>
|
||||
<div class="outline-text-2" id="text-org1a2b83f">
|
||||
<blockquote>
|
||||
<p>
|
||||
"<i>We kill people based on metadata</i>"
|
||||
|
@ -397,9 +417,9 @@ Even when using Freedombone metadata analysis by third parties is still possible
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline10" class="outline-2">
|
||||
<h2 id="orgheadline10">How do I create email processing rules?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline10">
|
||||
<div id="outline-container-org88df6a0" class="outline-2">
|
||||
<h2 id="org88df6a0">How do I create email processing rules?</h2>
|
||||
<div class="outline-text-2" id="text-org88df6a0">
|
||||
<div class="org-src-container">
|
||||
|
||||
<pre class="src src-bash">ssh username@domainname -p 2222
|
||||
|
@ -456,16 +476,16 @@ Spamassassin is also available and within Mutt you can use the S (shift+s) key t
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline11" class="outline-2">
|
||||
<h2 id="orgheadline11">Why isn't dynamic DNS working?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline11">
|
||||
<div id="outline-container-org844e5d1" class="outline-2">
|
||||
<h2 id="org844e5d1">Why isn't dynamic DNS working?</h2>
|
||||
<div class="outline-text-2" id="text-org844e5d1">
|
||||
<p>
|
||||
If you run the command:
|
||||
</p>
|
||||
|
||||
<div class="org-src-container">
|
||||
|
||||
<pre class="src src-bash">service inadyn status
|
||||
<pre class="src src-bash">systemctl status inadyn
|
||||
</pre>
|
||||
</div>
|
||||
|
||||
|
@ -475,7 +495,7 @@ And see some error related to checking for changes in the IP address then you ca
|
|||
|
||||
<div class="org-src-container">
|
||||
|
||||
<pre class="src src-bash">https://check.torproject.org/
|
||||
<pre class="src src-text">https://check.torproject.org/
|
||||
https://www.whatsmydns.net/whats-my-ip-address.html
|
||||
https://www.privateinternetaccess.com/pages/whats-my-ip/
|
||||
http://checkip.two-dns.de
|
||||
|
@ -526,9 +546,9 @@ http://httpbin.org/ip
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline12" class="outline-2">
|
||||
<h2 id="orgheadline12">How do I change my encryption settings?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline12">
|
||||
<div id="outline-container-org577cd3b" class="outline-2">
|
||||
<h2 id="org577cd3b">How do I change my encryption settings?</h2>
|
||||
<div class="outline-text-2" id="text-org577cd3b">
|
||||
<p>
|
||||
Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
|
||||
</p>
|
||||
|
@ -544,9 +564,9 @@ Select <i>Administrator controls</i> then select <i>Security Settings</i>. You w
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline13" class="outline-2">
|
||||
<h2 id="orgheadline13">How do I get a domain name?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline13">
|
||||
<div id="outline-container-org23cc852" class="outline-2">
|
||||
<h2 id="org23cc852">How do I get a domain name?</h2>
|
||||
<div class="outline-text-2" id="text-org23cc852">
|
||||
<p>
|
||||
Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
|
||||
</p>
|
||||
|
@ -557,7 +577,7 @@ Remove any existing nameservers for your domain (or select "custom" nameservers)
|
|||
|
||||
<div class="org-src-container">
|
||||
|
||||
<pre class="src src-bash">NS1.AFRAID.ORG
|
||||
<pre class="src src-text">NS1.AFRAID.ORG
|
||||
NS2.AFRAID.ORG
|
||||
NS3.AFRAID.ORG
|
||||
NS4.AFRAID.ORG
|
||||
|
@ -614,9 +634,9 @@ You should now be able to send an email from <i>postmaster@mynewdomainname</i> a
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline14" class="outline-2">
|
||||
<h2 id="orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline14">
|
||||
<div id="outline-container-orgc277e1a" class="outline-2">
|
||||
<h2 id="orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
|
||||
<div class="outline-text-2" id="text-orgc277e1a">
|
||||
<p>
|
||||
If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
|
||||
</p>
|
||||
|
@ -636,9 +656,9 @@ One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline15" class="outline-2">
|
||||
<h2 id="orgheadline15">How do I renew a Let's Encrypt certificate?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline15">
|
||||
<div id="outline-container-org2d4283" class="outline-2">
|
||||
<h2 id="org2d4283">How do I renew a Let's Encrypt certificate?</h2>
|
||||
<div class="outline-text-2" id="text-org2d4283">
|
||||
<p>
|
||||
Normally certificates will be automatically renewed once per month, so you don't need to be concerned about it. If anything goes wrong with the automatic renewal then you should receive a warning email.
|
||||
</p>
|
||||
|
@ -658,9 +678,9 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Renew
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline16" class="outline-2">
|
||||
<h2 id="orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline16">
|
||||
<div id="outline-container-org4e3be95" class="outline-2">
|
||||
<h2 id="org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
|
||||
<div class="outline-text-2" id="text-org4e3be95">
|
||||
<p>
|
||||
Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
|
||||
</p>
|
||||
|
@ -676,9 +696,9 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Creat
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline17" class="outline-2">
|
||||
<h2 id="orgheadline17">Why use self-signed certificates?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline17">
|
||||
<div id="outline-container-orgfc78066" class="outline-2">
|
||||
<h2 id="orgfc78066">Why use self-signed certificates?</h2>
|
||||
<div class="outline-text-2" id="text-orgfc78066">
|
||||
<p>
|
||||
Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up <i>scary-scary looking</i> browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is <i>no certainty about who that connection is with</i>.
|
||||
</p>
|
||||
|
@ -700,17 +720,17 @@ For now a self-signed certificate will probably in most cases protect your commu
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline18" class="outline-2">
|
||||
<h2 id="orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline18">
|
||||
<div id="outline-container-org56ed697" class="outline-2">
|
||||
<h2 id="org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</h2>
|
||||
<div class="outline-text-2" id="text-org56ed697">
|
||||
<p>
|
||||
<a href="http://seppuku.cryptostorm.org/">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
|
||||
<a href="https://cryptostorm.org/viewtopic.php?f=63&t=2954&sid=7de2d1e699cfde2f574e6a7f6ea5a173">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgheadline19" class="outline-2">
|
||||
<h2 id="orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline19">
|
||||
<div id="outline-container-org1d00f37" class="outline-2">
|
||||
<h2 id="org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
|
||||
<div class="outline-text-2" id="text-org1d00f37">
|
||||
<p>
|
||||
Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
|
||||
</p>
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<!-- 2016-04-26 Tue 19:03 -->
|
||||
<!-- 2016-05-06 Fri 20:43 -->
|
||||
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<title></title>
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<!-- 2016-04-19 Tue 18:40 -->
|
||||
<!-- 2016-05-06 Fri 20:04 -->
|
||||
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<title></title>
|
||||
|
@ -186,9 +186,9 @@ Mobile phones are insecure devices, but they're regarded as being so essential t
|
|||
</table>
|
||||
</center>
|
||||
|
||||
<div id="outline-container-orgheadline1" class="outline-2">
|
||||
<h2 id="orgheadline1">Open</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline1">
|
||||
<div id="outline-container-orgc988f00" class="outline-2">
|
||||
<h2 id="orgc988f00">Open</h2>
|
||||
<div class="outline-text-2" id="text-orgc988f00">
|
||||
<p>
|
||||
Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
|
||||
</p>
|
||||
|
@ -199,45 +199,45 @@ Why is it so important to run Linux on a phone? Aren't <i>iThings</i> supposed t
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline2" class="outline-2">
|
||||
<h2 id="orgheadline2">Remove</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline2">
|
||||
<div id="outline-container-org6812923" class="outline-2">
|
||||
<h2 id="org6812923">Remove</h2>
|
||||
<div class="outline-text-2" id="text-org6812923">
|
||||
<p>
|
||||
So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline3" class="outline-2">
|
||||
<h2 id="orgheadline3">Encrypt</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline3">
|
||||
<div id="outline-container-orge0fcdf4" class="outline-2">
|
||||
<h2 id="orge0fcdf4">Encrypt</h2>
|
||||
<div class="outline-text-2" id="text-orge0fcdf4">
|
||||
<p>
|
||||
Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline4" class="outline-2">
|
||||
<h2 id="orgheadline4">Apps</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline4">
|
||||
<div id="outline-container-org87c1781" class="outline-2">
|
||||
<h2 id="org87c1781">Apps</h2>
|
||||
<div class="outline-text-2" id="text-org87c1781">
|
||||
<p>
|
||||
Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline5" class="outline-2">
|
||||
<h2 id="orgheadline5">Lock</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline5">
|
||||
<div id="outline-container-orgaca6fdb" class="outline-2">
|
||||
<h2 id="orgaca6fdb">Lock</h2>
|
||||
<div class="outline-text-2" id="text-orgaca6fdb">
|
||||
<p>
|
||||
Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline6" class="outline-2">
|
||||
<h2 id="orgheadline6">Onion</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline6">
|
||||
<div id="outline-container-org8852762" class="outline-2">
|
||||
<h2 id="org8852762">Onion</h2>
|
||||
<div class="outline-text-2" id="text-org8852762">
|
||||
<p>
|
||||
Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
|
||||
</p>
|
||||
|
@ -248,9 +248,9 @@ In F-droid under the <b>repositories</b> menu you can enable the <b>guardian pro
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline7" class="outline-2">
|
||||
<h2 id="orgheadline7">ssh</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline7">
|
||||
<div id="outline-container-org3c8b1c0" class="outline-2">
|
||||
<h2 id="org3c8b1c0">ssh</h2>
|
||||
<div class="outline-text-2" id="text-org3c8b1c0">
|
||||
<p>
|
||||
The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
|
||||
</p>
|
||||
|
@ -261,18 +261,18 @@ This is a <i>defense in depth</i> approach in which there are multiple hurdles w
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline8" class="outline-2">
|
||||
<h2 id="orgheadline8">Services</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline8">
|
||||
<div id="outline-container-org9fad5e1" class="outline-2">
|
||||
<h2 id="org9fad5e1">Services</h2>
|
||||
<div class="outline-text-2" id="text-org9fad5e1">
|
||||
<p>
|
||||
For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>.
|
||||
For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>. Also see advice on chat apps in the <a href="./faq.html">FAQ</a>.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgheadline9" class="outline-2">
|
||||
<h2 id="orgheadline9">Battery preservation</h2>
|
||||
<div class="outline-text-2" id="text-orgheadline9">
|
||||
<div id="outline-container-org27ba21c" class="outline-2">
|
||||
<h2 id="org27ba21c">Battery preservation</h2>
|
||||
<div class="outline-text-2" id="text-org27ba21c">
|
||||
<p>
|
||||
Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
|
||||
</p>
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<!-- 2016-05-04 Wed 20:18 -->
|
||||
<!-- 2016-05-06 Fri 21:02 -->
|
||||
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<title></title>
|
||||
|
@ -170,15 +170,15 @@ for the JavaScript code in this tag.
|
|||
</colgroup>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orge3b8b7">Readme</a></td>
|
||||
<td class="org-left"><a href="#orgba9a28a">Readme</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org2605adf">Improving ssh security</a></td>
|
||||
<td class="org-left"><a href="#orgc3327a3">Improving ssh security</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org9bac184">Administrating the system via an onion address (Tor)</a></td>
|
||||
<td class="org-left"><a href="#org659f155">Administrating the system via an onion address (Tor)</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
|
@ -190,38 +190,38 @@ for the JavaScript code in this tag.
|
|||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org6129962">Syncing to the Cloud</a></td>
|
||||
<td class="org-left"><a href="#orgc94b7c1">Syncing to the Cloud</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgbfe6921">Play Music</a></td>
|
||||
<td class="org-left"><a href="#org6eb6c9c">Play Music</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgeb2748f">Microblogging (GNU Social)</a></td>
|
||||
<td class="org-left"><a href="#org5ea1548">Microblogging (GNU Social)</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org1cef6c2">Social Network</a></td>
|
||||
<td class="org-left"><a href="#org69e0391">Social Network</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgf363d07">Chat Services</a></td>
|
||||
<td class="org-left"><a href="#orgd9f317a">Chat Services</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#orgb67222f">RSS Reader</a></td>
|
||||
<td class="org-left"><a href="#org6a436c8">RSS Reader</a></td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td class="org-left"><a href="#org6f25e8a">Adding or removing users</a></td>
|
||||
<td class="org-left"><a href="#orgeecbd40">Adding or removing users</a></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
<div id="outline-container-orge3b8b7" class="outline-2">
|
||||
<h2 id="orge3b8b7">Readme</h2>
|
||||
<div class="outline-text-2" id="text-orge3b8b7">
|
||||
<div id="outline-container-orgba9a28a" class="outline-2">
|
||||
<h2 id="orgba9a28a">Readme</h2>
|
||||
<div class="outline-text-2" id="text-orgba9a28a">
|
||||
<p>
|
||||
After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
|
||||
</p>
|
||||
|
@ -242,9 +242,9 @@ To exit you can either just close the terminal or use <b>CTRL-x CTRL-c</b> follo
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org2605adf" class="outline-2">
|
||||
<h2 id="org2605adf">Improving ssh security</h2>
|
||||
<div class="outline-text-2" id="text-org2605adf">
|
||||
<div id="outline-container-orgc3327a3" class="outline-2">
|
||||
<h2 id="orgc3327a3">Improving ssh security</h2>
|
||||
<div class="outline-text-2" id="text-orgc3327a3">
|
||||
<p>
|
||||
To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
|
||||
</p>
|
||||
|
@ -297,9 +297,9 @@ If you wish to only use ssh keys then log in to the Freedombone, become the root
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-org9bac184" class="outline-2">
|
||||
<h2 id="org9bac184">Administrating the system via an onion address (Tor)</h2>
|
||||
<div class="outline-text-2" id="text-org9bac184">
|
||||
<div id="outline-container-org659f155" class="outline-2">
|
||||
<h2 id="org659f155">Administrating the system via an onion address (Tor)</h2>
|
||||
<div class="outline-text-2" id="text-org659f155">
|
||||
<p>
|
||||
You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
|
||||
</p>
|
||||
|
@ -345,9 +345,9 @@ Subsequently even if dynamic DNS isn't working you may still be able to administ
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org6129962" class="outline-2">
|
||||
<h2 id="org6129962">Syncing to the Cloud</h2>
|
||||
<div class="outline-text-2" id="text-org6129962">
|
||||
<div id="outline-container-orgc94b7c1" class="outline-2">
|
||||
<h2 id="orgc94b7c1">Syncing to the Cloud</h2>
|
||||
<div class="outline-text-2" id="text-orgc94b7c1">
|
||||
<p>
|
||||
<a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
|
||||
</p>
|
||||
|
@ -357,9 +357,9 @@ Freedombone provides Syncthing shared directories for each user on the system, p
|
|||
</p>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-org964db8e" class="outline-3">
|
||||
<h3 id="org964db8e">On a laptop</h3>
|
||||
<div class="outline-text-3" id="text-org964db8e">
|
||||
<div id="outline-container-org90059f7" class="outline-3">
|
||||
<h3 id="org90059f7">On a laptop</h3>
|
||||
<div class="outline-text-3" id="text-org90059f7">
|
||||
<p>
|
||||
Install syncthing:
|
||||
</p>
|
||||
|
@ -414,9 +414,9 @@ Now wait for a few minutes. Eventually you will see two messages appear within t
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org68dbe71" class="outline-3">
|
||||
<h3 id="org68dbe71">On Android</h3>
|
||||
<div class="outline-text-3" id="text-org68dbe71">
|
||||
<div id="outline-container-org1dc3b2f" class="outline-3">
|
||||
<h3 id="org1dc3b2f">On Android</h3>
|
||||
<div class="outline-text-3" id="text-org1dc3b2f">
|
||||
<p>
|
||||
Install Syncthing and Connectbot from F-droid.
|
||||
</p>
|
||||
|
@ -447,12 +447,12 @@ Now wait for a few minutes or more. Eventually you should receive two notificati
|
|||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgbfe6921" class="outline-2">
|
||||
<h2 id="orgbfe6921">Play Music</h2>
|
||||
<div class="outline-text-2" id="text-orgbfe6921">
|
||||
</div><div id="outline-container-orgdf44d93" class="outline-3">
|
||||
<h3 id="orgdf44d93">With the DLNA service</h3>
|
||||
<div class="outline-text-3" id="text-orgdf44d93">
|
||||
<div id="outline-container-org6eb6c9c" class="outline-2">
|
||||
<h2 id="org6eb6c9c">Play Music</h2>
|
||||
<div class="outline-text-2" id="text-org6eb6c9c">
|
||||
</div><div id="outline-container-orgaf474b4" class="outline-3">
|
||||
<h3 id="orgaf474b4">With the DLNA service</h3>
|
||||
<div class="outline-text-3" id="text-orgaf474b4">
|
||||
<p>
|
||||
An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
|
||||
</p>
|
||||
|
@ -493,9 +493,9 @@ The DLNA service will only work within your local home network, and isn't remote
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgeb2748f" class="outline-2">
|
||||
<h2 id="orgeb2748f">Microblogging (GNU Social)</h2>
|
||||
<div class="outline-text-2" id="text-orgeb2748f">
|
||||
<div id="outline-container-org5ea1548" class="outline-2">
|
||||
<h2 id="org5ea1548">Microblogging (GNU Social)</h2>
|
||||
<div class="outline-text-2" id="text-org5ea1548">
|
||||
<p>
|
||||
To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
|
||||
</p>
|
||||
|
@ -524,20 +524,20 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-org1cef6c2" class="outline-2">
|
||||
<h2 id="org1cef6c2">Social Network</h2>
|
||||
<div class="outline-text-2" id="text-org1cef6c2">
|
||||
</div><div id="outline-container-orgb06d3d5" class="outline-3">
|
||||
<h3 id="orgb06d3d5">Domains</h3>
|
||||
<div class="outline-text-3" id="text-orgb06d3d5">
|
||||
<div id="outline-container-org69e0391" class="outline-2">
|
||||
<h2 id="org69e0391">Social Network</h2>
|
||||
<div class="outline-text-2" id="text-org69e0391">
|
||||
</div><div id="outline-container-org5bf4b36" class="outline-3">
|
||||
<h3 id="org5bf4b36">Domains</h3>
|
||||
<div class="outline-text-3" id="text-org5bf4b36">
|
||||
<p>
|
||||
Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgacecd43" class="outline-3">
|
||||
<h3 id="orgacecd43">Initial install</h3>
|
||||
<div class="outline-text-3" id="text-orgacecd43">
|
||||
<div id="outline-container-org302aa5f" class="outline-3">
|
||||
<h3 id="org302aa5f">Initial install</h3>
|
||||
<div class="outline-text-3" id="text-org302aa5f">
|
||||
<p>
|
||||
On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
|
||||
</p>
|
||||
|
@ -551,19 +551,19 @@ On first visiting your Hubzilla site you'll see the login screen. The first thin
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgf363d07" class="outline-2">
|
||||
<h2 id="orgf363d07">Chat Services</h2>
|
||||
<div class="outline-text-2" id="text-orgf363d07">
|
||||
</div><div id="outline-container-org3279b5e" class="outline-3">
|
||||
<h3 id="org3279b5e">IRC</h3>
|
||||
<div class="outline-text-3" id="text-org3279b5e">
|
||||
<div id="outline-container-orgd9f317a" class="outline-2">
|
||||
<h2 id="orgd9f317a">Chat Services</h2>
|
||||
<div class="outline-text-2" id="text-orgd9f317a">
|
||||
</div><div id="outline-container-org3ec44f8" class="outline-3">
|
||||
<h3 id="org3ec44f8">IRC</h3>
|
||||
<div class="outline-text-3" id="text-org3ec44f8">
|
||||
<p>
|
||||
IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
|
||||
</p>
|
||||
</div>
|
||||
<div id="outline-container-orgeee7519" class="outline-4">
|
||||
<h4 id="orgeee7519">Irssi</h4>
|
||||
<div class="outline-text-4" id="text-orgeee7519">
|
||||
<div id="outline-container-orgd48562" class="outline-4">
|
||||
<h4 id="orgd48562">Irssi</h4>
|
||||
<div class="outline-text-4" id="text-orgd48562">
|
||||
<p>
|
||||
The easiest way to use irssi is to connect to your system, like this:
|
||||
</p>
|
||||
|
@ -579,9 +579,9 @@ Then select <b>IRC</b> from the menu. However, other than via this method using
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org9672d7" class="outline-4">
|
||||
<h4 id="org9672d7">HexChat</h4>
|
||||
<div class="outline-text-4" id="text-org9672d7">
|
||||
<div id="outline-container-orgf572812" class="outline-4">
|
||||
<h4 id="orgf572812">HexChat</h4>
|
||||
<div class="outline-text-4" id="text-orgf572812">
|
||||
<p>
|
||||
HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
|
||||
</p>
|
||||
|
@ -759,9 +759,9 @@ Click <b>close</b> and then <b>connect</b>.
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-org4cd3e8f" class="outline-4">
|
||||
<h4 id="org4cd3e8f">Emacs</h4>
|
||||
<div class="outline-text-4" id="text-org4cd3e8f">
|
||||
<div id="outline-container-org41ad30c" class="outline-4">
|
||||
<h4 id="org41ad30c">Emacs</h4>
|
||||
<div class="outline-text-4" id="text-org41ad30c">
|
||||
<p>
|
||||
If you are an Emacs user then you can also connect to your IRC server via Emacs.
|
||||
</p>
|
||||
|
@ -794,9 +794,9 @@ Add the following to your Emacs configuration file:
|
|||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org37e8802" class="outline-4">
|
||||
<h4 id="org37e8802">Changing or removing the IRC password</h4>
|
||||
<div class="outline-text-4" id="text-org37e8802">
|
||||
<div id="outline-container-org75ef2ca" class="outline-4">
|
||||
<h4 id="org75ef2ca">Changing or removing the IRC password</h4>
|
||||
<div class="outline-text-4" id="text-org75ef2ca">
|
||||
<p>
|
||||
By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
|
||||
</p>
|
||||
|
@ -814,12 +814,12 @@ Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the pa
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orge57f18c" class="outline-3">
|
||||
<h3 id="orge57f18c">XMPP/Jabber</h3>
|
||||
<div class="outline-text-3" id="text-orge57f18c">
|
||||
</div><div id="outline-container-org37e1fc5" class="outline-4">
|
||||
<h4 id="org37e1fc5">Using with Profanity</h4>
|
||||
<div class="outline-text-4" id="text-org37e1fc5">
|
||||
<div id="outline-container-orgb9d1b40" class="outline-3">
|
||||
<h3 id="orgb9d1b40">XMPP/Jabber</h3>
|
||||
<div class="outline-text-3" id="text-orgb9d1b40">
|
||||
</div><div id="outline-container-orgf48f420" class="outline-4">
|
||||
<h4 id="orgf48f420">Using with Profanity</h4>
|
||||
<div class="outline-text-4" id="text-orgf48f420">
|
||||
<p>
|
||||
The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
|
||||
</p>
|
||||
|
@ -909,9 +909,9 @@ When accessed via the user control panel the client is automatically routed thro
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgf29929d" class="outline-4">
|
||||
<h4 id="orgf29929d">Using with Jitsi</h4>
|
||||
<div class="outline-text-4" id="text-orgf29929d">
|
||||
<div id="outline-container-org7a19a8b" class="outline-4">
|
||||
<h4 id="org7a19a8b">Using with Jitsi</h4>
|
||||
<div class="outline-text-4" id="text-org7a19a8b">
|
||||
<p>
|
||||
Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
|
||||
</p>
|
||||
|
@ -941,9 +941,9 @@ You can also <a href="https://www.youtube.com/watch?v=vgx7VSrDGjk">see this vide
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org9715ca0" class="outline-4">
|
||||
<h4 id="org9715ca0">Using with Ubuntu</h4>
|
||||
<div class="outline-text-4" id="text-org9715ca0">
|
||||
<div id="outline-container-orgb774289" class="outline-4">
|
||||
<h4 id="orgb774289">Using with Ubuntu</h4>
|
||||
<div class="outline-text-4" id="text-orgb774289">
|
||||
<p>
|
||||
The default XMPP client in Ubuntu is Empathy. Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
|
||||
</p>
|
||||
|
@ -961,17 +961,17 @@ Click on <b>Advanced</b> and make sure that <b>Encryption required</b> and <b>Ig
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org2b79a3a" class="outline-4">
|
||||
<h4 id="org2b79a3a">Using Tor Messenger</h4>
|
||||
<div class="outline-text-4" id="text-org2b79a3a">
|
||||
<div id="outline-container-org2052a77" class="outline-4">
|
||||
<h4 id="org2052a77">Using Tor Messenger</h4>
|
||||
<div class="outline-text-4" id="text-org2052a77">
|
||||
<p>
|
||||
Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org244a79d" class="outline-4">
|
||||
<h4 id="org244a79d">Using with Android</h4>
|
||||
<div class="outline-text-4" id="text-org244a79d">
|
||||
<div id="outline-container-orgfa1cd5e" class="outline-4">
|
||||
<h4 id="orgfa1cd5e">Using with Android</h4>
|
||||
<div class="outline-text-4" id="text-orgfa1cd5e">
|
||||
<p>
|
||||
Install <a href="https://f-droid.org/">F-Droid</a>
|
||||
</p>
|
||||
|
@ -1007,16 +1007,16 @@ Then select <b>Next</b>. When chatting you can use the lock icon to encrypt your
|
|||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org690ba89" class="outline-3">
|
||||
<h3 id="org690ba89">Tox</h3>
|
||||
<div class="outline-text-3" id="text-org690ba89">
|
||||
<div id="outline-container-orgbae2a03" class="outline-3">
|
||||
<h3 id="orgbae2a03">Tox</h3>
|
||||
<div class="outline-text-3" id="text-orgbae2a03">
|
||||
<p>
|
||||
Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
|
||||
</p>
|
||||
</div>
|
||||
<div id="outline-container-org5a004a8" class="outline-4">
|
||||
<h4 id="org5a004a8">Using the Toxic client</h4>
|
||||
<div class="outline-text-4" id="text-org5a004a8">
|
||||
<div id="outline-container-orga66ac79" class="outline-4">
|
||||
<h4 id="orga66ac79">Using the Toxic client</h4>
|
||||
<div class="outline-text-4" id="text-orga66ac79">
|
||||
<p>
|
||||
Log into your system with:
|
||||
</p>
|
||||
|
@ -1040,12 +1040,12 @@ Then from the menu select <b>Tox Chat</b>. Tox is encrypted by default and also
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-org21caf2" class="outline-3">
|
||||
<h3 id="org21caf2">VoIP (Voice chat)</h3>
|
||||
<div class="outline-text-3" id="text-org21caf2">
|
||||
</div><div id="outline-container-orgeed8246" class="outline-4">
|
||||
<h4 id="orgeed8246">Using with Ubuntu</h4>
|
||||
<div class="outline-text-4" id="text-orgeed8246">
|
||||
<div id="outline-container-org64c2fbd" class="outline-3">
|
||||
<h3 id="org64c2fbd">VoIP (Voice chat)</h3>
|
||||
<div class="outline-text-3" id="text-org64c2fbd">
|
||||
</div><div id="outline-container-org7933c24" class="outline-4">
|
||||
<h4 id="org7933c24">Using with Ubuntu</h4>
|
||||
<div class="outline-text-4" id="text-org7933c24">
|
||||
<p>
|
||||
Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
|
||||
</p>
|
||||
|
@ -1059,9 +1059,9 @@ Click on "add new" to add a new server and enter the default domain name for the
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgc647f97" class="outline-4">
|
||||
<h4 id="orgc647f97">Using with Android</h4>
|
||||
<div class="outline-text-4" id="text-orgc647f97">
|
||||
<div id="outline-container-org6b891bc" class="outline-4">
|
||||
<h4 id="org6b891bc">Using with Android</h4>
|
||||
<div class="outline-text-4" id="text-org6b891bc">
|
||||
<p>
|
||||
Install <a href="https://f-droid.org/">F-Droid</a>
|
||||
</p>
|
||||
|
@ -1088,24 +1088,24 @@ Selecting the server by pressing on it then connects you to the server so that y
|
|||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org9beba01" class="outline-3">
|
||||
<h3 id="org9beba01">SIP phones</h3>
|
||||
<div class="outline-text-3" id="text-org9beba01">
|
||||
<div id="outline-container-orge8fb5bd" class="outline-3">
|
||||
<h3 id="orge8fb5bd">SIP phones</h3>
|
||||
<div class="outline-text-3" id="text-orge8fb5bd">
|
||||
<p>
|
||||
Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
|
||||
</p>
|
||||
</div>
|
||||
<div id="outline-container-orgadcf55e" class="outline-4">
|
||||
<h4 id="orgadcf55e">About ZRTP</h4>
|
||||
<div class="outline-text-4" id="text-orgadcf55e">
|
||||
<div id="outline-container-orgeaa3a07" class="outline-4">
|
||||
<h4 id="orgeaa3a07">About ZRTP</h4>
|
||||
<div class="outline-text-4" id="text-orgeaa3a07">
|
||||
<p>
|
||||
<a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orgbc591b0" class="outline-4">
|
||||
<h4 id="orgbc591b0">Using with CSIPSimple</h4>
|
||||
<div class="outline-text-4" id="text-orgbc591b0">
|
||||
<div id="outline-container-org18183d5" class="outline-4">
|
||||
<h4 id="org18183d5">Using with CSIPSimple</h4>
|
||||
<div class="outline-text-4" id="text-org18183d5">
|
||||
<p>
|
||||
Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
|
||||
</p>
|
||||
|
@ -1161,9 +1161,9 @@ If everything is working the account should appear in green with a status of <b>
|
|||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-orga274b04" class="outline-4">
|
||||
<h4 id="orga274b04">Using with Ring</h4>
|
||||
<div class="outline-text-4" id="text-orga274b04">
|
||||
<div id="outline-container-org1099c7a" class="outline-4">
|
||||
<h4 id="org1099c7a">Using with Ring</h4>
|
||||
<div class="outline-text-4" id="text-org1099c7a">
|
||||
<p>
|
||||
From the menu select <b>Manage accounts</b>.
|
||||
</p>
|
||||
|
@ -1216,9 +1216,9 @@ Select the <b>Security</b> tab. Under <b>SRTP Key Exchange</b> select <b>ZRTP</b
|
|||
</div>
|
||||
</div>
|
||||
|
||||
<div id="outline-container-orgb67222f" class="outline-2">
|
||||
<h2 id="orgb67222f">RSS Reader</h2>
|
||||
<div class="outline-text-2" id="text-orgb67222f">
|
||||
<div id="outline-container-org6a436c8" class="outline-2">
|
||||
<h2 id="org6a436c8">RSS Reader</h2>
|
||||
<div class="outline-text-2" id="text-org6a436c8">
|
||||
<p>
|
||||
The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
|
||||
</p>
|
||||
|
@ -1262,9 +1262,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
|
|||
</blockquote>
|
||||
</div>
|
||||
</div>
|
||||
<div id="outline-container-org6f25e8a" class="outline-2">
|
||||
<h2 id="org6f25e8a">Adding or removing users</h2>
|
||||
<div class="outline-text-2" id="text-org6f25e8a">
|
||||
<div id="outline-container-orgeecbd40" class="outline-2">
|
||||
<h2 id="orgeecbd40">Adding or removing users</h2>
|
||||
<div class="outline-text-2" id="text-orgeecbd40">
|
||||
<p>
|
||||
Log into the system with:
|
||||
</p>
|
||||
|
|
Loading…
Reference in New Issue