Previous: 21c-AppArmorSELinux.html
This is a common pattern:
https://www.reddit.com/r/ProgrammerHumor/comments/aloi5v/programmers_know_the_risks_involved/
document.querySelector('video').playbackRate = 1.2
From the bottom up, hardware to high level:
Hardware in security arms race?
Hardware and higher level compromise?
* General survey of secure and/or privacy-friendly applications for personal use:
* https://prism-break.org/en/all/
* https://www.privacytools.io/
* https://github.com/Lissy93/personal-security-checklist
* VirtualBox, KVM, virtual machines
* Use snapshots to keep the updated state clean!
* Web browsing
* Browser choice
* https://www.mozilla.org/en-US/firefox/
* https://www.torproject.org/download/download-easy.html.en
* https://www.eff.org/pages/tor-and-https (infographic)
* https://en.wikipedia.org/wiki/Onion_routing
* https://www.whonix.org/wiki/Comparison_with_Others
* JavaScript: https://noscript.net/
* Fingerprinting:
* https://panopticlick.eff.org/
* https://coveryourtracks.eff.org/
* https://privacy.net/analyzer/
* HTTPS
* Browse in a virtual machine, and refresh snapshots!
* Communications:
* Text/data
* Comparison tables
* https://en.wikipedia.org/wiki/Comparison_of_instant_messaging_clients#Secure_messengers
* https://bitmessage.org/wiki/FAQ#How_does_Bitmessage_compare_to_other_messaging_methods
* http://secushare.org/comparison
* Email can be secure?
* gnupg (good, but not PFS: https://en.wikipedia.org/wiki/Forward_secrecy)
* https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP
* https://en.wikipedia.org/wiki/GNU_Privacy_Guard
* https://www.gnupg.org/related_software/frontends.html#sec-1-2
* https://www.mailvelope.com/
* Chat-compatible encryption with perfect forward secrecy
* https://en.wikipedia.org/wiki/Off-the-Record_Messaging
* https://en.wikipedia.org/wiki/Signal_Protocol
* https://en.wikipedia.org/wiki/OMEMO
* https://conversations.im/
* https://github.com/wireapp/proteus
* https://wire.com/
* p2p for A in CIA, (cryptography for the C and I)
* Bote: https://en.wikipedia.org/wiki/I2P
* Tox:
* https://en.wikipedia.org/wiki/Tox_(protocol)
* https://tox.chat/
* Voice/video: https://en.wikipedia.org/wiki/Comparison_of_VoIP_software#Secure_VoIP_software
* https://tox.chat/
* https://en.wikipedia.org/wiki/ZRTP
* https://linphone.org/
* https://wire.com/
* http://retroshare.net/ (and file sharing, email, etc.)
Password managers: https://en.wikipedia.org/wiki/Comparison_of_password_managers
* (not Linux/Unix exclusive)
* A password manager assists in generating and retrieving complex passwords, potentially storing such passwords in an encrypted database or calculating them on demand. Types of password managers include:
* locally installed software applications
* online services accessed through website portals
* locally accessed hardware devices that serve as keys
* Remote versus Local
* Remote, for example: https://lastpass.com
* Local, for example: https://keepassxc.org/
* Hosting / server for C, I, and A in CIA triad
* Tor hidden services:
* Example: https://en.wikipedia.org/wiki/Sci-Hub (scihub22266oqcxt.onion) can only be visited using Tor browser, and can't easily be located or taken down forcibly (availability)
* Eepsites: https://geti2p.net/en/
* https://en.wikipedia.org/wiki/I2P
* File-sharing/transfer:
* see general links above for secure p2p/direct file transfer methods
* securing basic rsync
* https://www.upguard.com/articles/secure-rsync
* https://syncthing.net/
* https://onionshare.org/
* http://retroshare.net/ (and file sharing, email, etc.)
* Remote access:
* ssh hardening
* ssh on hidden service server
* Collaboration: see general links above
The most important thing on this list: STFU…
A fun note on modern interent op-sec: https://sive.rs/anon
Are there any fully open/transparent phones? Not really, but some
laudable efforts:
* https://www.pine64.org/pinephone/
* http://libresmartphone.com/open-hardware-smartphone/
* https://en.wikipedia.org/wiki/Openmoko
* http://wiki.openmoko.org/wiki/Main_Page
* https://puri.sm/shop/librem-5/
* https://volla.online
Next: