Pārlūkot izejas kodu

Advice on mobile chat apps

Bob Mottram 9 gadus atpakaļ
vecāks
revīzija
2a9f449460
6 mainītis faili ar 289 papildinājumiem un 262 dzēšanām
  1. 40
    33
      doc/EN/faq.org
  2. 1
    1
      doc/EN/mobile.org
  3. 102
    82
      website/EN/faq.html
  4. 1
    1
      website/EN/index.html
  5. 29
    29
      website/EN/mobile.html
  6. 116
    116
      website/EN/usage.html

+ 40
- 33
doc/EN/faq.org Parādīt failu

25
 | [[Why can't I access my .onion site with a Tor browser?]]                         |
25
 | [[Why can't I access my .onion site with a Tor browser?]]                         |
26
 | [[What is the best hardware to run this system on?]]                              |
26
 | [[What is the best hardware to run this system on?]]                              |
27
 | [[Can I add more users to the system?]]                                           |
27
 | [[Can I add more users to the system?]]                                           |
28
+| [[What is the most secure chat app to use on mobile?]]                            |
28
 | [[How do I remove a user from the system?]]                                       |
29
 | [[How do I remove a user from the system?]]                                       |
29
 | [[How do I reset the tripwire?]]                                                  |
30
 | [[How do I reset the tripwire?]]                                                  |
30
 | [[Is metadata protected?]]                                                        |
31
 | [[Is metadata protected?]]                                                        |
43
 * I don't have a static IP address. Can I still install this system?
44
 * I don't have a static IP address. Can I still install this system?
44
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
45
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
45
 
46
 
46
-The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]], which supports a variety of dynamic DNS providers.
47
+The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]] , which supports a variety of dynamic DNS providers.
47
 * Why not support building images for Raspberry Pi?
48
 * Why not support building images for Raspberry Pi?
48
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
49
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
49
 
50
 
65
 * Can I add more users to the system?
66
 * Can I add more users to the system?
66
 Yes. Freedombone can support a small number of users, for a "/friends and family/" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
67
 Yes. Freedombone can support a small number of users, for a "/friends and family/" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
67
 
68
 
68
-#+BEGIN_SRC bash
69
+#+begin_src bash
69
 ssh username@mydomainname -p 2222
70
 ssh username@mydomainname -p 2222
70
-#+END_SRC
71
+#+end_src
71
 
72
 
72
 Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
73
 Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
73
 
74
 
74
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
75
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
75
 
76
 
76
 Another point is that Freedombone installations are not intended to support many users (maybe ten at most). Large numbers of users may make the system unstable, and the more users you have on one system the more it becomes a single point of failure and also perhaps a honeypot from the standpoint of adversaries. Think of what happened with Lavabit and the moral dilemma which an administrator can be faced with (comply with threats and betray the trust of your users or don't comply and suffer other consequences). Ideally, you never want to put yourself into a situation where you can be forced to betray others.
77
 Another point is that Freedombone installations are not intended to support many users (maybe ten at most). Large numbers of users may make the system unstable, and the more users you have on one system the more it becomes a single point of failure and also perhaps a honeypot from the standpoint of adversaries. Think of what happened with Lavabit and the moral dilemma which an administrator can be faced with (comply with threats and betray the trust of your users or don't comply and suffer other consequences). Ideally, you never want to put yourself into a situation where you can be forced to betray others.
78
+* What is the most secure chat app to use on mobile?
79
+On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
80
+
81
+The current safest way to chat is to use [[https://conversations.im][Conversations]] together with [[https://guardianproject.info/apps/orbot/][Orbot]] - both of which can be installed from [[https://f-droid.org/][F-droid]]. You may need to enable the [[https://guardianproject.info/][Guardian Project]] repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
82
+
83
+There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a /complete social graph/ of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
77
 * How do I remove a user from the system?
84
 * How do I remove a user from the system?
78
 To remove a user:
85
 To remove a user:
79
 
86
 
80
-#+BEGIN_SRC bash
87
+#+begin_src bash
81
 ssh username@mydomainname -p 2222
88
 ssh username@mydomainname -p 2222
82
-#+END_SRC
89
+#+end_src
83
 
90
 
84
 Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
91
 Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
85
 * How do I reset the tripwire?
92
 * How do I reset the tripwire?
86
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
93
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
87
 
94
 
88
-#+BEGIN_SRC bash
95
+#+begin_src bash
89
 ssh username@mydomain -p 2222
96
 ssh username@mydomain -p 2222
90
-#+END_SRC
97
+#+end_src
91
 
98
 
92
 Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
99
 Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
93
 * Is metadata protected?
100
 * Is metadata protected?
99
 
106
 
100
 Even when using Freedombone metadata analysis by third parties is still possible. This can be mitigated by accessing your blog, or other web services, via their /onion addresses/, rather than via more conventional domain names. In that case your ISP and any government which they might be compelled to report back to will know when your system is being accessed, but not necessarily /which/ services are being accessed /or by whom/. So for instance using a Tor browser and the onion address people may be able to safely read your blog or wiki and be reasonably confident that metadata isn't being gathered about what they read (or more concisely the metadata which can be gathered by a third party may just not be very useful or personally identifiable). On the other hand if you access the system via conventional domain names and dynamic DNS then it's safe to assume that metadata can and will be collected by third parties.
107
 Even when using Freedombone metadata analysis by third parties is still possible. This can be mitigated by accessing your blog, or other web services, via their /onion addresses/, rather than via more conventional domain names. In that case your ISP and any government which they might be compelled to report back to will know when your system is being accessed, but not necessarily /which/ services are being accessed /or by whom/. So for instance using a Tor browser and the onion address people may be able to safely read your blog or wiki and be reasonably confident that metadata isn't being gathered about what they read (or more concisely the metadata which can be gathered by a third party may just not be very useful or personally identifiable). On the other hand if you access the system via conventional domain names and dynamic DNS then it's safe to assume that metadata can and will be collected by third parties.
101
 * How do I create email processing rules?
108
 * How do I create email processing rules?
102
-#+BEGIN_SRC bash
109
+#+begin_src bash
103
 ssh username@domainname -p 2222
110
 ssh username@domainname -p 2222
104
-#+END_SRC
111
+#+end_src
105
 
112
 
106
 Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
113
 Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
107
 
114
 
116
 * Why isn't dynamic DNS working?
123
 * Why isn't dynamic DNS working?
117
 If you run the command:
124
 If you run the command:
118
 
125
 
119
-#+BEGIN_SRC bash
120
-service inadyn status
121
-#+END_SRC
126
+#+begin_src bash
127
+systemctl status inadyn
128
+#+end_src
122
 
129
 
123
 And see some error related to checking for changes in the IP address then you can try other external IP services. Edit */etc/inadyn.conf* and change the domain for the *checkip-url* parameter. Possible sites are:
130
 And see some error related to checking for changes in the IP address then you can try other external IP services. Edit */etc/inadyn.conf* and change the domain for the *checkip-url* parameter. Possible sites are:
124
 
131
 
125
-#+BEGIN_SRC bash
132
+#+begin_src text
126
 https://check.torproject.org/
133
 https://check.torproject.org/
127
 https://www.whatsmydns.net/whats-my-ip-address.html
134
 https://www.whatsmydns.net/whats-my-ip-address.html
128
 https://www.privateinternetaccess.com/pages/whats-my-ip/
135
 https://www.privateinternetaccess.com/pages/whats-my-ip/
169
 http://wtfismyip.com/
176
 http://wtfismyip.com/
170
 http://ipinfo.io/
177
 http://ipinfo.io/
171
 http://httpbin.org/ip
178
 http://httpbin.org/ip
172
-#+END_SRC
179
+#+end_src
173
 
180
 
174
 * How do I change my encryption settings?
181
 * How do I change my encryption settings?
175
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
182
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
176
 
183
 
177
-#+BEGIN_SRC bash
184
+#+begin_src bash
178
 ssh myusername@mydomain -p 2222
185
 ssh myusername@mydomain -p 2222
179
-#+END_SRC
186
+#+end_src
180
 
187
 
181
 Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
188
 Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
182
 * How do I get a domain name?
189
 * How do I get a domain name?
184
 
191
 
185
 Remove any existing nameservers for your domain (or select "custom" nameservers), then add:
192
 Remove any existing nameservers for your domain (or select "custom" nameservers), then add:
186
 
193
 
187
-#+BEGIN_SRC bash
194
+#+begin_src text
188
 NS1.AFRAID.ORG
195
 NS1.AFRAID.ORG
189
 NS2.AFRAID.ORG
196
 NS2.AFRAID.ORG
190
 NS3.AFRAID.ORG
197
 NS3.AFRAID.ORG
191
 NS4.AFRAID.ORG
198
 NS4.AFRAID.ORG
192
-#+END_SRC
199
+#+end_src
193
 
200
 
194
 It might take a few minutes for the above change to take effect.  Within freedns click on "Domains" and add your domains (this might only be available to paid members).  Make sure that they're marked as "private".
201
 It might take a few minutes for the above change to take effect.  Within freedns click on "Domains" and add your domains (this might only be available to paid members).  Make sure that they're marked as "private".
195
 
202
 
197
 
204
 
198
 To route email to one of your freedns domains:
205
 To route email to one of your freedns domains:
199
 
206
 
200
-#+BEGIN_SRC bash
207
+#+begin_src bash
201
 editor /etc/mailname
208
 editor /etc/mailname
202
-#+END_SRC
209
+#+end_src
203
 
210
 
204
 Add any extra domains which you own, then save and exit.
211
 Add any extra domains which you own, then save and exit.
205
 
212
 
206
-#+BEGIN_SRC bash
213
+#+begin_src bash
207
 editor /etc/exim4/update-exim4.conf.conf
214
 editor /etc/exim4/update-exim4.conf.conf
208
-#+END_SRC
215
+#+end_src
209
 
216
 
210
 Within dc_other_hostnames add your extra domain names, separated by a colon ':' character.
217
 Within dc_other_hostnames add your extra domain names, separated by a colon ':' character.
211
 
218
 
212
 Save and exit, then restart exim.
219
 Save and exit, then restart exim.
213
 
220
 
214
-#+BEGIN_SRC bash
221
+#+begin_src bash
215
 update-exim4.conf.template -r
222
 update-exim4.conf.template -r
216
 update-exim4.conf
223
 update-exim4.conf
217
 service exim4 restart
224
 service exim4 restart
218
-#+END_SRC
225
+#+end_src
219
 
226
 
220
 You should now be able to send an email from /postmaster@mynewdomainname/ and it should arrive in your inbox.
227
 You should now be able to send an email from /postmaster@mynewdomainname/ and it should arrive in your inbox.
221
 
228
 
222
 * How do I get a "real" SSL/TLS/HTTPS certificate?
229
 * How do I get a "real" SSL/TLS/HTTPS certificate?
223
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
230
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
224
 
231
 
225
-#+BEGIN_SRC bash
232
+#+begin_src bash
226
 ssh username@mydomainname -p 2222
233
 ssh username@mydomainname -p 2222
227
-#+END_SRC
234
+#+end_src
228
 
235
 
229
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
236
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
230
 
237
 
234
 
241
 
235
 If you need to manually renew a certificate:
242
 If you need to manually renew a certificate:
236
 
243
 
237
-#+BEGIN_SRC bash
244
+#+begin_src bash
238
 ssh username@mydomainname -p 2222
245
 ssh username@mydomainname -p 2222
239
-#+END_SRC
246
+#+end_src
240
 
247
 
241
 Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
248
 Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
242
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
249
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
243
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
250
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
244
 
251
 
245
-#+BEGIN_SRC bash
252
+#+begin_src bash
246
 ssh username@mydomainname -p 2222
253
 ssh username@mydomainname -p 2222
247
-#+END_SRC
254
+#+end_src
248
 
255
 
249
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
256
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
250
 * Why use self-signed certificates?
257
 * Why use self-signed certificates?
258
 
265
 
259
 For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok.
266
 For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok.
260
 * Why not use the services of $company instead? They took the Seppuku pledge
267
 * Why not use the services of $company instead? They took the Seppuku pledge
261
-[[http://seppuku.cryptostorm.org][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
268
+[[https://cryptostorm.org/viewtopic.php?f=63&t=2954&sid=7de2d1e699cfde2f574e6a7f6ea5a173][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
262
 * Why does my email keep getting rejected as spam by Gmail/etc?
269
 * Why does my email keep getting rejected as spam by Gmail/etc?
263
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
270
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
264
 
271
 
265
 Often ISPs will run their own SMTP mail server which you can use for proxying, typically called /mail.ISPdomain/. On the administrator control panel there is an option to set the details for outgoing email from the Mutt client.
272
 Often ISPs will run their own SMTP mail server which you can use for proxying, typically called /mail.ISPdomain/. On the administrator control panel there is an option to set the details for outgoing email from the Mutt client.
266
 
273
 
267
-#+BEGIN_SRC bash
274
+#+begin_src bash
268
 ssh username@mydomainname -p 2222
275
 ssh username@mydomainname -p 2222
269
-#+END_SRC
276
+#+end_src
270
 
277
 
271
 Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
278
 Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
272
 
279
 

+ 1
- 1
doc/EN/mobile.org Parādīt failu

74
 This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
74
 This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
75
 
75
 
76
 * Services
76
 * Services
77
-For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]].
77
+For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]]. Also see advice on chat apps in the [[file:./faq.html][FAQ]].
78
 
78
 
79
 * Battery preservation
79
 * Battery preservation
80
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
80
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.

+ 102
- 82
website/EN/faq.html Parādīt failu

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-06 Wed 18:58 -->
6
+<!-- 2016-05-06 Fri 21:38 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
171
 </colgroup>
171
 </colgroup>
172
 <tbody>
172
 <tbody>
173
 <tr>
173
 <tr>
174
-<td class="org-left"><a href="#orgheadline1">I don't have a static IP address. Can I still install this system?</a></td>
174
+<td class="org-left"><a href="#orgb121a4d">I don't have a static IP address. Can I still install this system?</a></td>
175
 </tr>
175
 </tr>
176
 
176
 
177
 <tr>
177
 <tr>
178
-<td class="org-left"><a href="#orgheadline2">Why not support building images for Raspberry Pi?</a></td>
178
+<td class="org-left"><a href="#orgf010a5a">Why not support building images for Raspberry Pi?</a></td>
179
 </tr>
179
 </tr>
180
 
180
 
181
 <tr>
181
 <tr>
182
-<td class="org-left"><a href="#orgheadline3">Why use Github?</a></td>
182
+<td class="org-left"><a href="#org1aa1408">Why use Github?</a></td>
183
 </tr>
183
 </tr>
184
 
184
 
185
 <tr>
185
 <tr>
187
 </tr>
187
 </tr>
188
 
188
 
189
 <tr>
189
 <tr>
190
-<td class="org-left"><a href="#orgheadline4">Why can't I access my .onion site with a Tor browser?</a></td>
190
+<td class="org-left"><a href="#org100d598">Why can't I access my .onion site with a Tor browser?</a></td>
191
 </tr>
191
 </tr>
192
 
192
 
193
 <tr>
193
 <tr>
194
-<td class="org-left"><a href="#orgheadline5">What is the best hardware to run this system on?</a></td>
194
+<td class="org-left"><a href="#orga3487a7">What is the best hardware to run this system on?</a></td>
195
 </tr>
195
 </tr>
196
 
196
 
197
 <tr>
197
 <tr>
198
-<td class="org-left"><a href="#orgheadline6">Can I add more users to the system?</a></td>
198
+<td class="org-left"><a href="#orgd298dbb">Can I add more users to the system?</a></td>
199
 </tr>
199
 </tr>
200
 
200
 
201
 <tr>
201
 <tr>
202
-<td class="org-left"><a href="#orgheadline7">How do I remove a user from the system?</a></td>
202
+<td class="org-left"><a href="#orgef8453">What is the most secure chat app to use on mobile?</a></td>
203
 </tr>
203
 </tr>
204
 
204
 
205
 <tr>
205
 <tr>
206
-<td class="org-left"><a href="#orgheadline8">How do I reset the tripwire?</a></td>
206
+<td class="org-left"><a href="#org6c7f74">How do I remove a user from the system?</a></td>
207
 </tr>
207
 </tr>
208
 
208
 
209
 <tr>
209
 <tr>
210
-<td class="org-left"><a href="#orgheadline9">Is metadata protected?</a></td>
210
+<td class="org-left"><a href="#org9551764">How do I reset the tripwire?</a></td>
211
 </tr>
211
 </tr>
212
 
212
 
213
 <tr>
213
 <tr>
214
-<td class="org-left"><a href="#orgheadline10">How do I create email processing rules?</a></td>
214
+<td class="org-left"><a href="#org1a2b83f">Is metadata protected?</a></td>
215
 </tr>
215
 </tr>
216
 
216
 
217
 <tr>
217
 <tr>
218
-<td class="org-left"><a href="#orgheadline11">Why isn't dynamic DNS working?</a></td>
218
+<td class="org-left"><a href="#org88df6a0">How do I create email processing rules?</a></td>
219
 </tr>
219
 </tr>
220
 
220
 
221
 <tr>
221
 <tr>
222
-<td class="org-left"><a href="#orgheadline12">How do I change my encryption settings?</a></td>
222
+<td class="org-left"><a href="#org844e5d1">Why isn't dynamic DNS working?</a></td>
223
 </tr>
223
 </tr>
224
 
224
 
225
 <tr>
225
 <tr>
226
-<td class="org-left"><a href="#orgheadline13">How do I get a domain name?</a></td>
226
+<td class="org-left"><a href="#org577cd3b">How do I change my encryption settings?</a></td>
227
 </tr>
227
 </tr>
228
 
228
 
229
 <tr>
229
 <tr>
230
-<td class="org-left"><a href="#orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
230
+<td class="org-left"><a href="#org23cc852">How do I get a domain name?</a></td>
231
 </tr>
231
 </tr>
232
 
232
 
233
 <tr>
233
 <tr>
234
-<td class="org-left"><a href="#orgheadline15">How do I renew a Let's Encrypt certificate?</a></td>
234
+<td class="org-left"><a href="#orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
235
 </tr>
235
 </tr>
236
 
236
 
237
 <tr>
237
 <tr>
238
-<td class="org-left"><a href="#orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
238
+<td class="org-left"><a href="#org2d4283">How do I renew a Let's Encrypt certificate?</a></td>
239
 </tr>
239
 </tr>
240
 
240
 
241
 <tr>
241
 <tr>
242
-<td class="org-left"><a href="#orgheadline17">Why use self-signed certificates?</a></td>
242
+<td class="org-left"><a href="#org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
243
 </tr>
243
 </tr>
244
 
244
 
245
 <tr>
245
 <tr>
246
-<td class="org-left"><a href="#orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
246
+<td class="org-left"><a href="#orgfc78066">Why use self-signed certificates?</a></td>
247
 </tr>
247
 </tr>
248
 
248
 
249
 <tr>
249
 <tr>
250
-<td class="org-left"><a href="#orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
250
+<td class="org-left"><a href="#org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
251
+</tr>
252
+
253
+<tr>
254
+<td class="org-left"><a href="#org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
251
 </tr>
255
 </tr>
252
 </tbody>
256
 </tbody>
253
 </table>
257
 </table>
254
 </div>
258
 </div>
255
 
259
 
256
-<div id="outline-container-orgheadline1" class="outline-2">
257
-<h2 id="orgheadline1">I don't have a static IP address. Can I still install this system?</h2>
258
-<div class="outline-text-2" id="text-orgheadline1">
260
+<div id="outline-container-orgb121a4d" class="outline-2">
261
+<h2 id="orgb121a4d">I don't have a static IP address. Can I still install this system?</h2>
262
+<div class="outline-text-2" id="text-orgb121a4d">
259
 <p>
263
 <p>
260
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
264
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
261
 </p>
265
 </p>
262
 
266
 
263
 <p>
267
 <p>
264
-The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a>, which supports a variety of dynamic DNS providers.
268
+The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a> , which supports a variety of dynamic DNS providers.
265
 </p>
269
 </p>
266
 </div>
270
 </div>
267
 </div>
271
 </div>
268
-<div id="outline-container-orgheadline2" class="outline-2">
269
-<h2 id="orgheadline2">Why not support building images for Raspberry Pi?</h2>
270
-<div class="outline-text-2" id="text-orgheadline2">
272
+<div id="outline-container-orgf010a5a" class="outline-2">
273
+<h2 id="orgf010a5a">Why not support building images for Raspberry Pi?</h2>
274
+<div class="outline-text-2" id="text-orgf010a5a">
271
 <p>
275
 <p>
272
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
276
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
273
 </p>
277
 </p>
277
 </p>
281
 </p>
278
 </div>
282
 </div>
279
 </div>
283
 </div>
280
-<div id="outline-container-orgheadline3" class="outline-2">
281
-<h2 id="orgheadline3">Why use Github?</h2>
282
-<div class="outline-text-2" id="text-orgheadline3">
284
+<div id="outline-container-org1aa1408" class="outline-2">
285
+<h2 id="org1aa1408">Why use Github?</h2>
286
+<div class="outline-text-2" id="text-org1aa1408">
283
 <p>
287
 <p>
284
 Github is paradoxically a centralized, closed and proprietary system which happens to mostly host free and open source projects. Up until now it has been relatively benign, but at some point in the name of "growth" it will likely start becoming more evil, or just become like SourceForge - which was also once much loved by FOSS developers, but turned into a den of malvertizing.
288
 Github is paradoxically a centralized, closed and proprietary system which happens to mostly host free and open source projects. Up until now it has been relatively benign, but at some point in the name of "growth" it will likely start becoming more evil, or just become like SourceForge - which was also once much loved by FOSS developers, but turned into a den of malvertizing.
285
 </p>
289
 </p>
297
 </p>
301
 </p>
298
 </div>
302
 </div>
299
 </div>
303
 </div>
300
-<div id="outline-container-orgheadline4" class="outline-2">
301
-<h2 id="orgheadline4">Why can't I access my .onion site with a Tor browser?</h2>
302
-<div class="outline-text-2" id="text-orgheadline4">
304
+<div id="outline-container-org100d598" class="outline-2">
305
+<h2 id="org100d598">Why can't I access my .onion site with a Tor browser?</h2>
306
+<div class="outline-text-2" id="text-org100d598">
303
 <p>
307
 <p>
304
 Probably you need to add the site to the NoScript whitelist. Typically click/press on the noscript icon (or select from the menu on mobile) then select <i>whitelist</i> and add the site URL. You may also need to disable HTTPS Everywhere when using onion addresses, which don't use https.
308
 Probably you need to add the site to the NoScript whitelist. Typically click/press on the noscript icon (or select from the menu on mobile) then select <i>whitelist</i> and add the site URL. You may also need to disable HTTPS Everywhere when using onion addresses, which don't use https.
305
 </p>
309
 </p>
306
 </div>
310
 </div>
307
 </div>
311
 </div>
308
-<div id="outline-container-orgheadline5" class="outline-2">
309
-<h2 id="orgheadline5">What is the best hardware to run this system on?</h2>
310
-<div class="outline-text-2" id="text-orgheadline5">
312
+<div id="outline-container-orga3487a7" class="outline-2">
313
+<h2 id="orga3487a7">What is the best hardware to run this system on?</h2>
314
+<div class="outline-text-2" id="text-orga3487a7">
311
 <p>
315
 <p>
312
 It was originally designed to run on the Beaglebone Black, but that should be regarded as the most minimal system, because it's single core and has by today's standards a small amount of memory. Obviously the more powerful the hardware is the faster things like web pages (blog, social networking, etc) will be served but the more electricity such a system will require if you're running it 24/7. A good compromise between performance and energy consumption is something like an old netbook. The battery of an old netbook or laptop even gives you <a href="https://en.wikipedia.org/wiki/Uninterruptible_power_supply">UPS capability</a> to keep the system going during brief power outages or cable re-arrangements, and that means using full disk encryption on the server also becomes more practical.
316
 It was originally designed to run on the Beaglebone Black, but that should be regarded as the most minimal system, because it's single core and has by today's standards a small amount of memory. Obviously the more powerful the hardware is the faster things like web pages (blog, social networking, etc) will be served but the more electricity such a system will require if you're running it 24/7. A good compromise between performance and energy consumption is something like an old netbook. The battery of an old netbook or laptop even gives you <a href="https://en.wikipedia.org/wiki/Uninterruptible_power_supply">UPS capability</a> to keep the system going during brief power outages or cable re-arrangements, and that means using full disk encryption on the server also becomes more practical.
313
 </p>
317
 </p>
317
 </p>
321
 </p>
318
 </div>
322
 </div>
319
 </div>
323
 </div>
320
-<div id="outline-container-orgheadline6" class="outline-2">
321
-<h2 id="orgheadline6">Can I add more users to the system?</h2>
322
-<div class="outline-text-2" id="text-orgheadline6">
324
+<div id="outline-container-orgd298dbb" class="outline-2">
325
+<h2 id="orgd298dbb">Can I add more users to the system?</h2>
326
+<div class="outline-text-2" id="text-orgd298dbb">
323
 <p>
327
 <p>
324
 Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
328
 Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
325
 </p>
329
 </p>
343
 </p>
347
 </p>
344
 </div>
348
 </div>
345
 </div>
349
 </div>
346
-<div id="outline-container-orgheadline7" class="outline-2">
347
-<h2 id="orgheadline7">How do I remove a user from the system?</h2>
348
-<div class="outline-text-2" id="text-orgheadline7">
350
+<div id="outline-container-orgef8453" class="outline-2">
351
+<h2 id="orgef8453">What is the most secure chat app to use on mobile?</h2>
352
+<div class="outline-text-2" id="text-orgef8453">
353
+<p>
354
+On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
355
+</p>
356
+
357
+<p>
358
+The current safest way to chat is to use <a href="https://conversations.im/">Conversations</a> together with <a href="https://guardianproject.info/apps/orbot/">Orbot</a> - both of which can be installed from <a href="https://f-droid.org/">F-droid</a>. You may need to enable the <a href="https://guardianproject.info/">Guardian Project</a> repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
359
+</p>
360
+
361
+<p>
362
+There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a <i>complete social graph</i> of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
363
+</p>
364
+</div>
365
+</div>
366
+<div id="outline-container-org6c7f74" class="outline-2">
367
+<h2 id="org6c7f74">How do I remove a user from the system?</h2>
368
+<div class="outline-text-2" id="text-org6c7f74">
349
 <p>
369
 <p>
350
 To remove a user:
370
 To remove a user:
351
 </p>
371
 </p>
361
 </p>
381
 </p>
362
 </div>
382
 </div>
363
 </div>
383
 </div>
364
-<div id="outline-container-orgheadline8" class="outline-2">
365
-<h2 id="orgheadline8">How do I reset the tripwire?</h2>
366
-<div class="outline-text-2" id="text-orgheadline8">
384
+<div id="outline-container-org9551764" class="outline-2">
385
+<h2 id="org9551764">How do I reset the tripwire?</h2>
386
+<div class="outline-text-2" id="text-org9551764">
367
 <p>
387
 <p>
368
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
388
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
369
 </p>
389
 </p>
379
 </p>
399
 </p>
380
 </div>
400
 </div>
381
 </div>
401
 </div>
382
-<div id="outline-container-orgheadline9" class="outline-2">
383
-<h2 id="orgheadline9">Is metadata protected?</h2>
384
-<div class="outline-text-2" id="text-orgheadline9">
402
+<div id="outline-container-org1a2b83f" class="outline-2">
403
+<h2 id="org1a2b83f">Is metadata protected?</h2>
404
+<div class="outline-text-2" id="text-org1a2b83f">
385
 <blockquote>
405
 <blockquote>
386
 <p>
406
 <p>
387
 "<i>We kill people based on metadata</i>"
407
 "<i>We kill people based on metadata</i>"
397
 </p>
417
 </p>
398
 </div>
418
 </div>
399
 </div>
419
 </div>
400
-<div id="outline-container-orgheadline10" class="outline-2">
401
-<h2 id="orgheadline10">How do I create email processing rules?</h2>
402
-<div class="outline-text-2" id="text-orgheadline10">
420
+<div id="outline-container-org88df6a0" class="outline-2">
421
+<h2 id="org88df6a0">How do I create email processing rules?</h2>
422
+<div class="outline-text-2" id="text-org88df6a0">
403
 <div class="org-src-container">
423
 <div class="org-src-container">
404
 
424
 
405
 <pre class="src src-bash">ssh username@domainname -p 2222
425
 <pre class="src src-bash">ssh username@domainname -p 2222
456
 </p>
476
 </p>
457
 </div>
477
 </div>
458
 </div>
478
 </div>
459
-<div id="outline-container-orgheadline11" class="outline-2">
460
-<h2 id="orgheadline11">Why isn't dynamic DNS working?</h2>
461
-<div class="outline-text-2" id="text-orgheadline11">
479
+<div id="outline-container-org844e5d1" class="outline-2">
480
+<h2 id="org844e5d1">Why isn't dynamic DNS working?</h2>
481
+<div class="outline-text-2" id="text-org844e5d1">
462
 <p>
482
 <p>
463
 If you run the command:
483
 If you run the command:
464
 </p>
484
 </p>
465
 
485
 
466
 <div class="org-src-container">
486
 <div class="org-src-container">
467
 
487
 
468
-<pre class="src src-bash">service inadyn status
488
+<pre class="src src-bash">systemctl status inadyn
469
 </pre>
489
 </pre>
470
 </div>
490
 </div>
471
 
491
 
475
 
495
 
476
 <div class="org-src-container">
496
 <div class="org-src-container">
477
 
497
 
478
-<pre class="src src-bash">https://check.torproject.org/
498
+<pre class="src src-text">https://check.torproject.org/
479
 https://www.whatsmydns.net/whats-my-ip-address.html
499
 https://www.whatsmydns.net/whats-my-ip-address.html
480
 https://www.privateinternetaccess.com/pages/whats-my-ip/
500
 https://www.privateinternetaccess.com/pages/whats-my-ip/
481
 http://checkip.two-dns.de
501
 http://checkip.two-dns.de
526
 </div>
546
 </div>
527
 </div>
547
 </div>
528
 
548
 
529
-<div id="outline-container-orgheadline12" class="outline-2">
530
-<h2 id="orgheadline12">How do I change my encryption settings?</h2>
531
-<div class="outline-text-2" id="text-orgheadline12">
549
+<div id="outline-container-org577cd3b" class="outline-2">
550
+<h2 id="org577cd3b">How do I change my encryption settings?</h2>
551
+<div class="outline-text-2" id="text-org577cd3b">
532
 <p>
552
 <p>
533
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
553
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
534
 </p>
554
 </p>
544
 </p>
564
 </p>
545
 </div>
565
 </div>
546
 </div>
566
 </div>
547
-<div id="outline-container-orgheadline13" class="outline-2">
548
-<h2 id="orgheadline13">How do I get a domain name?</h2>
549
-<div class="outline-text-2" id="text-orgheadline13">
567
+<div id="outline-container-org23cc852" class="outline-2">
568
+<h2 id="org23cc852">How do I get a domain name?</h2>
569
+<div class="outline-text-2" id="text-org23cc852">
550
 <p>
570
 <p>
551
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
571
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
552
 </p>
572
 </p>
557
 
577
 
558
 <div class="org-src-container">
578
 <div class="org-src-container">
559
 
579
 
560
-<pre class="src src-bash">NS1.AFRAID.ORG
580
+<pre class="src src-text">NS1.AFRAID.ORG
561
 NS2.AFRAID.ORG
581
 NS2.AFRAID.ORG
562
 NS3.AFRAID.ORG
582
 NS3.AFRAID.ORG
563
 NS4.AFRAID.ORG
583
 NS4.AFRAID.ORG
614
 </div>
634
 </div>
615
 </div>
635
 </div>
616
 
636
 
617
-<div id="outline-container-orgheadline14" class="outline-2">
618
-<h2 id="orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
619
-<div class="outline-text-2" id="text-orgheadline14">
637
+<div id="outline-container-orgc277e1a" class="outline-2">
638
+<h2 id="orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
639
+<div class="outline-text-2" id="text-orgc277e1a">
620
 <p>
640
 <p>
621
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
641
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
622
 </p>
642
 </p>
636
 </p>
656
 </p>
637
 </div>
657
 </div>
638
 </div>
658
 </div>
639
-<div id="outline-container-orgheadline15" class="outline-2">
640
-<h2 id="orgheadline15">How do I renew a Let's Encrypt certificate?</h2>
641
-<div class="outline-text-2" id="text-orgheadline15">
659
+<div id="outline-container-org2d4283" class="outline-2">
660
+<h2 id="org2d4283">How do I renew a Let's Encrypt certificate?</h2>
661
+<div class="outline-text-2" id="text-org2d4283">
642
 <p>
662
 <p>
643
 Normally certificates will be automatically renewed once per month, so you don't need to be concerned about it. If anything goes wrong with the automatic renewal then you should receive a warning email.
663
 Normally certificates will be automatically renewed once per month, so you don't need to be concerned about it. If anything goes wrong with the automatic renewal then you should receive a warning email.
644
 </p>
664
 </p>
658
 </p>
678
 </p>
659
 </div>
679
 </div>
660
 </div>
680
 </div>
661
-<div id="outline-container-orgheadline16" class="outline-2">
662
-<h2 id="orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
663
-<div class="outline-text-2" id="text-orgheadline16">
681
+<div id="outline-container-org4e3be95" class="outline-2">
682
+<h2 id="org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
683
+<div class="outline-text-2" id="text-org4e3be95">
664
 <p>
684
 <p>
665
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
685
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
666
 </p>
686
 </p>
676
 </p>
696
 </p>
677
 </div>
697
 </div>
678
 </div>
698
 </div>
679
-<div id="outline-container-orgheadline17" class="outline-2">
680
-<h2 id="orgheadline17">Why use self-signed certificates?</h2>
681
-<div class="outline-text-2" id="text-orgheadline17">
699
+<div id="outline-container-orgfc78066" class="outline-2">
700
+<h2 id="orgfc78066">Why use self-signed certificates?</h2>
701
+<div class="outline-text-2" id="text-orgfc78066">
682
 <p>
702
 <p>
683
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up <i>scary-scary looking</i> browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is <i>no certainty about who that connection is with</i>.
703
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up <i>scary-scary looking</i> browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is <i>no certainty about who that connection is with</i>.
684
 </p>
704
 </p>
700
 </p>
720
 </p>
701
 </div>
721
 </div>
702
 </div>
722
 </div>
703
-<div id="outline-container-orgheadline18" class="outline-2">
704
-<h2 id="orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</h2>
705
-<div class="outline-text-2" id="text-orgheadline18">
723
+<div id="outline-container-org56ed697" class="outline-2">
724
+<h2 id="org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</h2>
725
+<div class="outline-text-2" id="text-org56ed697">
706
 <p>
726
 <p>
707
-<a href="http://seppuku.cryptostorm.org/">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
727
+<a href="https://cryptostorm.org/viewtopic.php?f=63&amp;t=2954&amp;sid=7de2d1e699cfde2f574e6a7f6ea5a173">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
708
 </p>
728
 </p>
709
 </div>
729
 </div>
710
 </div>
730
 </div>
711
-<div id="outline-container-orgheadline19" class="outline-2">
712
-<h2 id="orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
713
-<div class="outline-text-2" id="text-orgheadline19">
731
+<div id="outline-container-org1d00f37" class="outline-2">
732
+<h2 id="org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
733
+<div class="outline-text-2" id="text-org1d00f37">
714
 <p>
734
 <p>
715
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
735
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
716
 </p>
736
 </p>

+ 1
- 1
website/EN/index.html Parādīt failu

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-26 Tue 19:03 -->
6
+<!-- 2016-05-06 Fri 20:43 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>

+ 29
- 29
website/EN/mobile.html Parādīt failu

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-19 Tue 18:40 -->
6
+<!-- 2016-05-06 Fri 20:04 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
186
 </table>
186
 </table>
187
 </center>
187
 </center>
188
 
188
 
189
-<div id="outline-container-orgheadline1" class="outline-2">
190
-<h2 id="orgheadline1">Open</h2>
191
-<div class="outline-text-2" id="text-orgheadline1">
189
+<div id="outline-container-orgc988f00" class="outline-2">
190
+<h2 id="orgc988f00">Open</h2>
191
+<div class="outline-text-2" id="text-orgc988f00">
192
 <p>
192
 <p>
193
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
193
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
194
 </p>
194
 </p>
199
 </div>
199
 </div>
200
 </div>
200
 </div>
201
 
201
 
202
-<div id="outline-container-orgheadline2" class="outline-2">
203
-<h2 id="orgheadline2">Remove</h2>
204
-<div class="outline-text-2" id="text-orgheadline2">
202
+<div id="outline-container-org6812923" class="outline-2">
203
+<h2 id="org6812923">Remove</h2>
204
+<div class="outline-text-2" id="text-org6812923">
205
 <p>
205
 <p>
206
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
206
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
207
 </p>
207
 </p>
208
 </div>
208
 </div>
209
 </div>
209
 </div>
210
 
210
 
211
-<div id="outline-container-orgheadline3" class="outline-2">
212
-<h2 id="orgheadline3">Encrypt</h2>
213
-<div class="outline-text-2" id="text-orgheadline3">
211
+<div id="outline-container-orge0fcdf4" class="outline-2">
212
+<h2 id="orge0fcdf4">Encrypt</h2>
213
+<div class="outline-text-2" id="text-orge0fcdf4">
214
 <p>
214
 <p>
215
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
215
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
216
 </p>
216
 </p>
217
 </div>
217
 </div>
218
 </div>
218
 </div>
219
 
219
 
220
-<div id="outline-container-orgheadline4" class="outline-2">
221
-<h2 id="orgheadline4">Apps</h2>
222
-<div class="outline-text-2" id="text-orgheadline4">
220
+<div id="outline-container-org87c1781" class="outline-2">
221
+<h2 id="org87c1781">Apps</h2>
222
+<div class="outline-text-2" id="text-org87c1781">
223
 <p>
223
 <p>
224
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
224
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
225
 </p>
225
 </p>
226
 </div>
226
 </div>
227
 </div>
227
 </div>
228
 
228
 
229
-<div id="outline-container-orgheadline5" class="outline-2">
230
-<h2 id="orgheadline5">Lock</h2>
231
-<div class="outline-text-2" id="text-orgheadline5">
229
+<div id="outline-container-orgaca6fdb" class="outline-2">
230
+<h2 id="orgaca6fdb">Lock</h2>
231
+<div class="outline-text-2" id="text-orgaca6fdb">
232
 <p>
232
 <p>
233
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
233
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
234
 </p>
234
 </p>
235
 </div>
235
 </div>
236
 </div>
236
 </div>
237
 
237
 
238
-<div id="outline-container-orgheadline6" class="outline-2">
239
-<h2 id="orgheadline6">Onion</h2>
240
-<div class="outline-text-2" id="text-orgheadline6">
238
+<div id="outline-container-org8852762" class="outline-2">
239
+<h2 id="org8852762">Onion</h2>
240
+<div class="outline-text-2" id="text-org8852762">
241
 <p>
241
 <p>
242
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
242
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
243
 </p>
243
 </p>
248
 </div>
248
 </div>
249
 </div>
249
 </div>
250
 
250
 
251
-<div id="outline-container-orgheadline7" class="outline-2">
252
-<h2 id="orgheadline7">ssh</h2>
253
-<div class="outline-text-2" id="text-orgheadline7">
251
+<div id="outline-container-org3c8b1c0" class="outline-2">
252
+<h2 id="org3c8b1c0">ssh</h2>
253
+<div class="outline-text-2" id="text-org3c8b1c0">
254
 <p>
254
 <p>
255
 The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
255
 The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
256
 </p>
256
 </p>
261
 </div>
261
 </div>
262
 </div>
262
 </div>
263
 
263
 
264
-<div id="outline-container-orgheadline8" class="outline-2">
265
-<h2 id="orgheadline8">Services</h2>
266
-<div class="outline-text-2" id="text-orgheadline8">
264
+<div id="outline-container-org9fad5e1" class="outline-2">
265
+<h2 id="org9fad5e1">Services</h2>
266
+<div class="outline-text-2" id="text-org9fad5e1">
267
 <p>
267
 <p>
268
-For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>.
268
+For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>. Also see advice on chat apps in the <a href="./faq.html">FAQ</a>.
269
 </p>
269
 </p>
270
 </div>
270
 </div>
271
 </div>
271
 </div>
272
 
272
 
273
-<div id="outline-container-orgheadline9" class="outline-2">
274
-<h2 id="orgheadline9">Battery preservation</h2>
275
-<div class="outline-text-2" id="text-orgheadline9">
273
+<div id="outline-container-org27ba21c" class="outline-2">
274
+<h2 id="org27ba21c">Battery preservation</h2>
275
+<div class="outline-text-2" id="text-org27ba21c">
276
 <p>
276
 <p>
277
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
277
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
278
 </p>
278
 </p>

+ 116
- 116
website/EN/usage.html Parādīt failu

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-05-04 Wed 20:18 -->
6
+<!-- 2016-05-06 Fri 21:02 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
170
 </colgroup>
170
 </colgroup>
171
 <tbody>
171
 <tbody>
172
 <tr>
172
 <tr>
173
-<td class="org-left"><a href="#orge3b8b7">Readme</a></td>
173
+<td class="org-left"><a href="#orgba9a28a">Readme</a></td>
174
 </tr>
174
 </tr>
175
 
175
 
176
 <tr>
176
 <tr>
177
-<td class="org-left"><a href="#org2605adf">Improving ssh security</a></td>
177
+<td class="org-left"><a href="#orgc3327a3">Improving ssh security</a></td>
178
 </tr>
178
 </tr>
179
 
179
 
180
 <tr>
180
 <tr>
181
-<td class="org-left"><a href="#org9bac184">Administrating the system via an onion address (Tor)</a></td>
181
+<td class="org-left"><a href="#org659f155">Administrating the system via an onion address (Tor)</a></td>
182
 </tr>
182
 </tr>
183
 
183
 
184
 <tr>
184
 <tr>
190
 </tr>
190
 </tr>
191
 
191
 
192
 <tr>
192
 <tr>
193
-<td class="org-left"><a href="#org6129962">Syncing to the Cloud</a></td>
193
+<td class="org-left"><a href="#orgc94b7c1">Syncing to the Cloud</a></td>
194
 </tr>
194
 </tr>
195
 
195
 
196
 <tr>
196
 <tr>
197
-<td class="org-left"><a href="#orgbfe6921">Play Music</a></td>
197
+<td class="org-left"><a href="#org6eb6c9c">Play Music</a></td>
198
 </tr>
198
 </tr>
199
 
199
 
200
 <tr>
200
 <tr>
201
-<td class="org-left"><a href="#orgeb2748f">Microblogging (GNU Social)</a></td>
201
+<td class="org-left"><a href="#org5ea1548">Microblogging (GNU Social)</a></td>
202
 </tr>
202
 </tr>
203
 
203
 
204
 <tr>
204
 <tr>
205
-<td class="org-left"><a href="#org1cef6c2">Social Network</a></td>
205
+<td class="org-left"><a href="#org69e0391">Social Network</a></td>
206
 </tr>
206
 </tr>
207
 
207
 
208
 <tr>
208
 <tr>
209
-<td class="org-left"><a href="#orgf363d07">Chat Services</a></td>
209
+<td class="org-left"><a href="#orgd9f317a">Chat Services</a></td>
210
 </tr>
210
 </tr>
211
 
211
 
212
 <tr>
212
 <tr>
213
-<td class="org-left"><a href="#orgb67222f">RSS Reader</a></td>
213
+<td class="org-left"><a href="#org6a436c8">RSS Reader</a></td>
214
 </tr>
214
 </tr>
215
 
215
 
216
 <tr>
216
 <tr>
217
-<td class="org-left"><a href="#org6f25e8a">Adding or removing users</a></td>
217
+<td class="org-left"><a href="#orgeecbd40">Adding or removing users</a></td>
218
 </tr>
218
 </tr>
219
 </tbody>
219
 </tbody>
220
 </table>
220
 </table>
221
 
221
 
222
-<div id="outline-container-orge3b8b7" class="outline-2">
223
-<h2 id="orge3b8b7">Readme</h2>
224
-<div class="outline-text-2" id="text-orge3b8b7">
222
+<div id="outline-container-orgba9a28a" class="outline-2">
223
+<h2 id="orgba9a28a">Readme</h2>
224
+<div class="outline-text-2" id="text-orgba9a28a">
225
 <p>
225
 <p>
226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
227
 </p>
227
 </p>
242
 </p>
242
 </p>
243
 </div>
243
 </div>
244
 </div>
244
 </div>
245
-<div id="outline-container-org2605adf" class="outline-2">
246
-<h2 id="org2605adf">Improving ssh security</h2>
247
-<div class="outline-text-2" id="text-org2605adf">
245
+<div id="outline-container-orgc3327a3" class="outline-2">
246
+<h2 id="orgc3327a3">Improving ssh security</h2>
247
+<div class="outline-text-2" id="text-orgc3327a3">
248
 <p>
248
 <p>
249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
250
 </p>
250
 </p>
297
 </div>
297
 </div>
298
 </div>
298
 </div>
299
 
299
 
300
-<div id="outline-container-org9bac184" class="outline-2">
301
-<h2 id="org9bac184">Administrating the system via an onion address (Tor)</h2>
302
-<div class="outline-text-2" id="text-org9bac184">
300
+<div id="outline-container-org659f155" class="outline-2">
301
+<h2 id="org659f155">Administrating the system via an onion address (Tor)</h2>
302
+<div class="outline-text-2" id="text-org659f155">
303
 <p>
303
 <p>
304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
305
 </p>
305
 </p>
345
 </p>
345
 </p>
346
 </div>
346
 </div>
347
 </div>
347
 </div>
348
-<div id="outline-container-org6129962" class="outline-2">
349
-<h2 id="org6129962">Syncing to the Cloud</h2>
350
-<div class="outline-text-2" id="text-org6129962">
348
+<div id="outline-container-orgc94b7c1" class="outline-2">
349
+<h2 id="orgc94b7c1">Syncing to the Cloud</h2>
350
+<div class="outline-text-2" id="text-orgc94b7c1">
351
 <p>
351
 <p>
352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
353
 </p>
353
 </p>
357
 </p>
357
 </p>
358
 </div>
358
 </div>
359
 
359
 
360
-<div id="outline-container-org964db8e" class="outline-3">
361
-<h3 id="org964db8e">On a laptop</h3>
362
-<div class="outline-text-3" id="text-org964db8e">
360
+<div id="outline-container-org90059f7" class="outline-3">
361
+<h3 id="org90059f7">On a laptop</h3>
362
+<div class="outline-text-3" id="text-org90059f7">
363
 <p>
363
 <p>
364
 Install syncthing:
364
 Install syncthing:
365
 </p>
365
 </p>
414
 </p>
414
 </p>
415
 </div>
415
 </div>
416
 </div>
416
 </div>
417
-<div id="outline-container-org68dbe71" class="outline-3">
418
-<h3 id="org68dbe71">On Android</h3>
419
-<div class="outline-text-3" id="text-org68dbe71">
417
+<div id="outline-container-org1dc3b2f" class="outline-3">
418
+<h3 id="org1dc3b2f">On Android</h3>
419
+<div class="outline-text-3" id="text-org1dc3b2f">
420
 <p>
420
 <p>
421
 Install Syncthing and Connectbot from F-droid.
421
 Install Syncthing and Connectbot from F-droid.
422
 </p>
422
 </p>
447
 </div>
447
 </div>
448
 </div>
448
 </div>
449
 </div>
449
 </div>
450
-<div id="outline-container-orgbfe6921" class="outline-2">
451
-<h2 id="orgbfe6921">Play Music</h2>
452
-<div class="outline-text-2" id="text-orgbfe6921">
453
-</div><div id="outline-container-orgdf44d93" class="outline-3">
454
-<h3 id="orgdf44d93">With the DLNA service</h3>
455
-<div class="outline-text-3" id="text-orgdf44d93">
450
+<div id="outline-container-org6eb6c9c" class="outline-2">
451
+<h2 id="org6eb6c9c">Play Music</h2>
452
+<div class="outline-text-2" id="text-org6eb6c9c">
453
+</div><div id="outline-container-orgaf474b4" class="outline-3">
454
+<h3 id="orgaf474b4">With the DLNA service</h3>
455
+<div class="outline-text-3" id="text-orgaf474b4">
456
 <p>
456
 <p>
457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
458
 </p>
458
 </p>
493
 </div>
493
 </div>
494
 </div>
494
 </div>
495
 
495
 
496
-<div id="outline-container-orgeb2748f" class="outline-2">
497
-<h2 id="orgeb2748f">Microblogging (GNU Social)</h2>
498
-<div class="outline-text-2" id="text-orgeb2748f">
496
+<div id="outline-container-org5ea1548" class="outline-2">
497
+<h2 id="org5ea1548">Microblogging (GNU Social)</h2>
498
+<div class="outline-text-2" id="text-org5ea1548">
499
 <p>
499
 <p>
500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
501
 </p>
501
 </p>
524
 </div>
524
 </div>
525
 </div>
525
 </div>
526
 
526
 
527
-<div id="outline-container-org1cef6c2" class="outline-2">
528
-<h2 id="org1cef6c2">Social Network</h2>
529
-<div class="outline-text-2" id="text-org1cef6c2">
530
-</div><div id="outline-container-orgb06d3d5" class="outline-3">
531
-<h3 id="orgb06d3d5">Domains</h3>
532
-<div class="outline-text-3" id="text-orgb06d3d5">
527
+<div id="outline-container-org69e0391" class="outline-2">
528
+<h2 id="org69e0391">Social Network</h2>
529
+<div class="outline-text-2" id="text-org69e0391">
530
+</div><div id="outline-container-org5bf4b36" class="outline-3">
531
+<h3 id="org5bf4b36">Domains</h3>
532
+<div class="outline-text-3" id="text-org5bf4b36">
533
 <p>
533
 <p>
534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
535
 </p>
535
 </p>
536
 </div>
536
 </div>
537
 </div>
537
 </div>
538
-<div id="outline-container-orgacecd43" class="outline-3">
539
-<h3 id="orgacecd43">Initial install</h3>
540
-<div class="outline-text-3" id="text-orgacecd43">
538
+<div id="outline-container-org302aa5f" class="outline-3">
539
+<h3 id="org302aa5f">Initial install</h3>
540
+<div class="outline-text-3" id="text-org302aa5f">
541
 <p>
541
 <p>
542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
543
 </p>
543
 </p>
551
 </div>
551
 </div>
552
 </div>
552
 </div>
553
 
553
 
554
-<div id="outline-container-orgf363d07" class="outline-2">
555
-<h2 id="orgf363d07">Chat Services</h2>
556
-<div class="outline-text-2" id="text-orgf363d07">
557
-</div><div id="outline-container-org3279b5e" class="outline-3">
558
-<h3 id="org3279b5e">IRC</h3>
559
-<div class="outline-text-3" id="text-org3279b5e">
554
+<div id="outline-container-orgd9f317a" class="outline-2">
555
+<h2 id="orgd9f317a">Chat Services</h2>
556
+<div class="outline-text-2" id="text-orgd9f317a">
557
+</div><div id="outline-container-org3ec44f8" class="outline-3">
558
+<h3 id="org3ec44f8">IRC</h3>
559
+<div class="outline-text-3" id="text-org3ec44f8">
560
 <p>
560
 <p>
561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
562
 </p>
562
 </p>
563
 </div>
563
 </div>
564
-<div id="outline-container-orgeee7519" class="outline-4">
565
-<h4 id="orgeee7519">Irssi</h4>
566
-<div class="outline-text-4" id="text-orgeee7519">
564
+<div id="outline-container-orgd48562" class="outline-4">
565
+<h4 id="orgd48562">Irssi</h4>
566
+<div class="outline-text-4" id="text-orgd48562">
567
 <p>
567
 <p>
568
 The easiest way to use irssi is to connect to your system, like this:
568
 The easiest way to use irssi is to connect to your system, like this:
569
 </p>
569
 </p>
579
 </p>
579
 </p>
580
 </div>
580
 </div>
581
 </div>
581
 </div>
582
-<div id="outline-container-org9672d7" class="outline-4">
583
-<h4 id="org9672d7">HexChat</h4>
584
-<div class="outline-text-4" id="text-org9672d7">
582
+<div id="outline-container-orgf572812" class="outline-4">
583
+<h4 id="orgf572812">HexChat</h4>
584
+<div class="outline-text-4" id="text-orgf572812">
585
 <p>
585
 <p>
586
 HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
586
 HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
587
 </p>
587
 </p>
759
 </div>
759
 </div>
760
 </div>
760
 </div>
761
 
761
 
762
-<div id="outline-container-org4cd3e8f" class="outline-4">
763
-<h4 id="org4cd3e8f">Emacs</h4>
764
-<div class="outline-text-4" id="text-org4cd3e8f">
762
+<div id="outline-container-org41ad30c" class="outline-4">
763
+<h4 id="org41ad30c">Emacs</h4>
764
+<div class="outline-text-4" id="text-org41ad30c">
765
 <p>
765
 <p>
766
 If you are an Emacs user then you can also connect to your IRC server via Emacs.
766
 If you are an Emacs user then you can also connect to your IRC server via Emacs.
767
 </p>
767
 </p>
794
 </div>
794
 </div>
795
 </div>
795
 </div>
796
 </div>
796
 </div>
797
-<div id="outline-container-org37e8802" class="outline-4">
798
-<h4 id="org37e8802">Changing or removing the IRC password</h4>
799
-<div class="outline-text-4" id="text-org37e8802">
797
+<div id="outline-container-org75ef2ca" class="outline-4">
798
+<h4 id="org75ef2ca">Changing or removing the IRC password</h4>
799
+<div class="outline-text-4" id="text-org75ef2ca">
800
 <p>
800
 <p>
801
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
801
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
802
 </p>
802
 </p>
814
 </div>
814
 </div>
815
 </div>
815
 </div>
816
 
816
 
817
-<div id="outline-container-orge57f18c" class="outline-3">
818
-<h3 id="orge57f18c">XMPP/Jabber</h3>
819
-<div class="outline-text-3" id="text-orge57f18c">
820
-</div><div id="outline-container-org37e1fc5" class="outline-4">
821
-<h4 id="org37e1fc5">Using with Profanity</h4>
822
-<div class="outline-text-4" id="text-org37e1fc5">
817
+<div id="outline-container-orgb9d1b40" class="outline-3">
818
+<h3 id="orgb9d1b40">XMPP/Jabber</h3>
819
+<div class="outline-text-3" id="text-orgb9d1b40">
820
+</div><div id="outline-container-orgf48f420" class="outline-4">
821
+<h4 id="orgf48f420">Using with Profanity</h4>
822
+<div class="outline-text-4" id="text-orgf48f420">
823
 <p>
823
 <p>
824
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
824
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
825
 </p>
825
 </p>
909
 </p>
909
 </p>
910
 </div>
910
 </div>
911
 </div>
911
 </div>
912
-<div id="outline-container-orgf29929d" class="outline-4">
913
-<h4 id="orgf29929d">Using with Jitsi</h4>
914
-<div class="outline-text-4" id="text-orgf29929d">
912
+<div id="outline-container-org7a19a8b" class="outline-4">
913
+<h4 id="org7a19a8b">Using with Jitsi</h4>
914
+<div class="outline-text-4" id="text-org7a19a8b">
915
 <p>
915
 <p>
916
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
916
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
917
 </p>
917
 </p>
941
 </p>
941
 </p>
942
 </div>
942
 </div>
943
 </div>
943
 </div>
944
-<div id="outline-container-org9715ca0" class="outline-4">
945
-<h4 id="org9715ca0">Using with Ubuntu</h4>
946
-<div class="outline-text-4" id="text-org9715ca0">
944
+<div id="outline-container-orgb774289" class="outline-4">
945
+<h4 id="orgb774289">Using with Ubuntu</h4>
946
+<div class="outline-text-4" id="text-orgb774289">
947
 <p>
947
 <p>
948
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
948
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
949
 </p>
949
 </p>
961
 </p>
961
 </p>
962
 </div>
962
 </div>
963
 </div>
963
 </div>
964
-<div id="outline-container-org2b79a3a" class="outline-4">
965
-<h4 id="org2b79a3a">Using Tor Messenger</h4>
966
-<div class="outline-text-4" id="text-org2b79a3a">
964
+<div id="outline-container-org2052a77" class="outline-4">
965
+<h4 id="org2052a77">Using Tor Messenger</h4>
966
+<div class="outline-text-4" id="text-org2052a77">
967
 <p>
967
 <p>
968
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
968
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
969
 </p>
969
 </p>
970
 </div>
970
 </div>
971
 </div>
971
 </div>
972
-<div id="outline-container-org244a79d" class="outline-4">
973
-<h4 id="org244a79d">Using with Android</h4>
974
-<div class="outline-text-4" id="text-org244a79d">
972
+<div id="outline-container-orgfa1cd5e" class="outline-4">
973
+<h4 id="orgfa1cd5e">Using with Android</h4>
974
+<div class="outline-text-4" id="text-orgfa1cd5e">
975
 <p>
975
 <p>
976
 Install <a href="https://f-droid.org/">F-Droid</a>
976
 Install <a href="https://f-droid.org/">F-Droid</a>
977
 </p>
977
 </p>
1007
 </div>
1007
 </div>
1008
 </div>
1008
 </div>
1009
 </div>
1009
 </div>
1010
-<div id="outline-container-org690ba89" class="outline-3">
1011
-<h3 id="org690ba89">Tox</h3>
1012
-<div class="outline-text-3" id="text-org690ba89">
1010
+<div id="outline-container-orgbae2a03" class="outline-3">
1011
+<h3 id="orgbae2a03">Tox</h3>
1012
+<div class="outline-text-3" id="text-orgbae2a03">
1013
 <p>
1013
 <p>
1014
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
1014
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
1015
 </p>
1015
 </p>
1016
 </div>
1016
 </div>
1017
-<div id="outline-container-org5a004a8" class="outline-4">
1018
-<h4 id="org5a004a8">Using the Toxic client</h4>
1019
-<div class="outline-text-4" id="text-org5a004a8">
1017
+<div id="outline-container-orga66ac79" class="outline-4">
1018
+<h4 id="orga66ac79">Using the Toxic client</h4>
1019
+<div class="outline-text-4" id="text-orga66ac79">
1020
 <p>
1020
 <p>
1021
 Log into your system with:
1021
 Log into your system with:
1022
 </p>
1022
 </p>
1040
 </div>
1040
 </div>
1041
 </div>
1041
 </div>
1042
 
1042
 
1043
-<div id="outline-container-org21caf2" class="outline-3">
1044
-<h3 id="org21caf2">VoIP (Voice chat)</h3>
1045
-<div class="outline-text-3" id="text-org21caf2">
1046
-</div><div id="outline-container-orgeed8246" class="outline-4">
1047
-<h4 id="orgeed8246">Using with Ubuntu</h4>
1048
-<div class="outline-text-4" id="text-orgeed8246">
1043
+<div id="outline-container-org64c2fbd" class="outline-3">
1044
+<h3 id="org64c2fbd">VoIP (Voice chat)</h3>
1045
+<div class="outline-text-3" id="text-org64c2fbd">
1046
+</div><div id="outline-container-org7933c24" class="outline-4">
1047
+<h4 id="org7933c24">Using with Ubuntu</h4>
1048
+<div class="outline-text-4" id="text-org7933c24">
1049
 <p>
1049
 <p>
1050
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1050
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1051
 </p>
1051
 </p>
1059
 </p>
1059
 </p>
1060
 </div>
1060
 </div>
1061
 </div>
1061
 </div>
1062
-<div id="outline-container-orgc647f97" class="outline-4">
1063
-<h4 id="orgc647f97">Using with Android</h4>
1064
-<div class="outline-text-4" id="text-orgc647f97">
1062
+<div id="outline-container-org6b891bc" class="outline-4">
1063
+<h4 id="org6b891bc">Using with Android</h4>
1064
+<div class="outline-text-4" id="text-org6b891bc">
1065
 <p>
1065
 <p>
1066
 Install <a href="https://f-droid.org/">F-Droid</a>
1066
 Install <a href="https://f-droid.org/">F-Droid</a>
1067
 </p>
1067
 </p>
1088
 </div>
1088
 </div>
1089
 </div>
1089
 </div>
1090
 </div>
1090
 </div>
1091
-<div id="outline-container-org9beba01" class="outline-3">
1092
-<h3 id="org9beba01">SIP phones</h3>
1093
-<div class="outline-text-3" id="text-org9beba01">
1091
+<div id="outline-container-orge8fb5bd" class="outline-3">
1092
+<h3 id="orge8fb5bd">SIP phones</h3>
1093
+<div class="outline-text-3" id="text-orge8fb5bd">
1094
 <p>
1094
 <p>
1095
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1095
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1096
 </p>
1096
 </p>
1097
 </div>
1097
 </div>
1098
-<div id="outline-container-orgadcf55e" class="outline-4">
1099
-<h4 id="orgadcf55e">About ZRTP</h4>
1100
-<div class="outline-text-4" id="text-orgadcf55e">
1098
+<div id="outline-container-orgeaa3a07" class="outline-4">
1099
+<h4 id="orgeaa3a07">About ZRTP</h4>
1100
+<div class="outline-text-4" id="text-orgeaa3a07">
1101
 <p>
1101
 <p>
1102
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1102
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1103
 </p>
1103
 </p>
1104
 </div>
1104
 </div>
1105
 </div>
1105
 </div>
1106
-<div id="outline-container-orgbc591b0" class="outline-4">
1107
-<h4 id="orgbc591b0">Using with CSIPSimple</h4>
1108
-<div class="outline-text-4" id="text-orgbc591b0">
1106
+<div id="outline-container-org18183d5" class="outline-4">
1107
+<h4 id="org18183d5">Using with CSIPSimple</h4>
1108
+<div class="outline-text-4" id="text-org18183d5">
1109
 <p>
1109
 <p>
1110
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1110
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1111
 </p>
1111
 </p>
1161
 </p>
1161
 </p>
1162
 </div>
1162
 </div>
1163
 </div>
1163
 </div>
1164
-<div id="outline-container-orga274b04" class="outline-4">
1165
-<h4 id="orga274b04">Using with Ring</h4>
1166
-<div class="outline-text-4" id="text-orga274b04">
1164
+<div id="outline-container-org1099c7a" class="outline-4">
1165
+<h4 id="org1099c7a">Using with Ring</h4>
1166
+<div class="outline-text-4" id="text-org1099c7a">
1167
 <p>
1167
 <p>
1168
 From the menu select <b>Manage accounts</b>.
1168
 From the menu select <b>Manage accounts</b>.
1169
 </p>
1169
 </p>
1216
 </div>
1216
 </div>
1217
 </div>
1217
 </div>
1218
 
1218
 
1219
-<div id="outline-container-orgb67222f" class="outline-2">
1220
-<h2 id="orgb67222f">RSS Reader</h2>
1221
-<div class="outline-text-2" id="text-orgb67222f">
1219
+<div id="outline-container-org6a436c8" class="outline-2">
1220
+<h2 id="org6a436c8">RSS Reader</h2>
1221
+<div class="outline-text-2" id="text-org6a436c8">
1222
 <p>
1222
 <p>
1223
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1223
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1224
 </p>
1224
 </p>
1262
 </blockquote>
1262
 </blockquote>
1263
 </div>
1263
 </div>
1264
 </div>
1264
 </div>
1265
-<div id="outline-container-org6f25e8a" class="outline-2">
1266
-<h2 id="org6f25e8a">Adding or removing users</h2>
1267
-<div class="outline-text-2" id="text-org6f25e8a">
1265
+<div id="outline-container-orgeecbd40" class="outline-2">
1266
+<h2 id="orgeecbd40">Adding or removing users</h2>
1267
+<div class="outline-text-2" id="text-orgeecbd40">
1268
 <p>
1268
 <p>
1269
 Log into the system with:
1269
 Log into the system with:
1270
 </p>
1270
 </p>