1 21d-PracticalPersonal


Previous: 21c-AppArmorSELinux.html

This is a common pattern:
https://www.reddit.com/r/ProgrammerHumor/comments/aloi5v/programmers_know_the_risks_involved/

1.1 Screencasts

1.2 How to set up a small business or personal computer securely

From the bottom up, hardware to high level:

1.3 Computer hardware, firmware, crypto-keys

Hardware in security arms race?
Hardware and higher level compromise?

1.4 BIOS, firmware-level

1.5 Choose your computer operating system

1.6 Securely obtain the image file for your distribution

1.7 Install

1.8 Update all software (if not already done)

1.9 Post-install system OS hardening and configuration

1.10 Software

* General survey of secure and/or privacy-friendly applications for personal use:
    * https://prism-break.org/en/all/
    * https://www.privacytools.io/
    * https://github.com/Lissy93/personal-security-checklist
* VirtualBox, KVM, virtual machines
    * Use snapshots to keep the updated state clean!
* Web browsing
    * Browser choice
        * https://www.mozilla.org/en-US/firefox/
        * https://www.torproject.org/download/download-easy.html.en
            * https://www.eff.org/pages/tor-and-https (infographic)
            * https://en.wikipedia.org/wiki/Onion_routing
        * https://www.whonix.org/wiki/Comparison_with_Others
    * JavaScript: https://noscript.net/
    * Fingerprinting:
        * https://panopticlick.eff.org/
        * https://coveryourtracks.eff.org/
        * https://privacy.net/analyzer/
    * HTTPS
    * Browse in a virtual machine, and refresh snapshots!
* Communications:
    * Text/data
        * Comparison tables
            * https://en.wikipedia.org/wiki/Comparison_of_instant_messaging_clients#Secure_messengers
            * https://bitmessage.org/wiki/FAQ#How_does_Bitmessage_compare_to_other_messaging_methods
            * http://secushare.org/comparison
        * Email can be secure?
            * gnupg (good, but not PFS: https://en.wikipedia.org/wiki/Forward_secrecy)
                * https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP
                * https://en.wikipedia.org/wiki/GNU_Privacy_Guard
                * https://www.gnupg.org/related_software/frontends.html#sec-1-2
                * https://www.mailvelope.com/
        * Chat-compatible encryption with perfect forward secrecy
            * https://en.wikipedia.org/wiki/Off-the-Record_Messaging
            * https://en.wikipedia.org/wiki/Signal_Protocol
            * https://en.wikipedia.org/wiki/OMEMO
                * https://conversations.im/
            * https://github.com/wireapp/proteus
                * https://wire.com/
        * p2p for A in CIA, (cryptography for the C and I)
            * Bote: https://en.wikipedia.org/wiki/I2P
            * Tox:
                * https://en.wikipedia.org/wiki/Tox_(protocol)
                * https://tox.chat/
    * Voice/video: https://en.wikipedia.org/wiki/Comparison_of_VoIP_software#Secure_VoIP_software
        * https://tox.chat/
        * https://en.wikipedia.org/wiki/ZRTP
            * https://linphone.org/
        * https://wire.com/
        * http://retroshare.net/ (and file sharing, email, etc.)
        Password managers: https://en.wikipedia.org/wiki/Comparison_of_password_managers
    * (not Linux/Unix exclusive)
    * A password manager assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand. Types of password managers include:
    * locally installed software applications
    * online services accessed through website portals
    * locally accessed hardware devices that serve as keys
    * Remote versus Local
        * Remote, for example: https://lastpass.com
        * Local, for example: https://keepassxc.org/
* Hosting / server for C, I, and A in CIA triad
    * Tor hidden services:
        * Example: https://en.wikipedia.org/wiki/Sci-Hub (scihub22266oqcxt.onion) can only be visited using Tor browser, and can't easily be located or taken down forcibly (availability)
    * Eepsites: https://geti2p.net/en/
        * https://en.wikipedia.org/wiki/I2P
* File-sharing/transfer:
    * see general links above for secure p2p/direct file transfer methods
    * securing basic rsync
        * https://www.upguard.com/articles/secure-rsync
    * https://syncthing.net/
    * https://onionshare.org/
    * http://retroshare.net/ (and file sharing, email, etc.)
* Remote access:
    * ssh hardening
    * ssh on hidden service server
* Collaboration: see general links above

1.11 Privacy

1.12 Operational Security (OpSec)

The most important thing on this list: STFU…

A fun note on modern interent op-sec: https://sive.rs/anon

1.13 Tangent: Phone

21d-PracticalPersonal/hippa.jpg
Are there any fully open/transparent phones? Not really, but some laudable efforts:
* https://www.pine64.org/pinephone/
* http://libresmartphone.com/open-hardware-smartphone/
* https://en.wikipedia.org/wiki/Openmoko
* http://wiki.openmoko.org/wiki/Main_Page
* https://puri.sm/shop/librem-5/
* https://volla.online

Next: