Quellcode durchsuchen

Advice on mobile chat apps

Bob Mottram vor 9 Jahren
Ursprung
Commit
2a9f449460
6 geänderte Dateien mit 289 neuen und 262 gelöschten Zeilen
  1. 40
    33
      doc/EN/faq.org
  2. 1
    1
      doc/EN/mobile.org
  3. 102
    82
      website/EN/faq.html
  4. 1
    1
      website/EN/index.html
  5. 29
    29
      website/EN/mobile.html
  6. 116
    116
      website/EN/usage.html

+ 40
- 33
doc/EN/faq.org Datei anzeigen

@@ -25,6 +25,7 @@
25 25
 | [[Why can't I access my .onion site with a Tor browser?]]                         |
26 26
 | [[What is the best hardware to run this system on?]]                              |
27 27
 | [[Can I add more users to the system?]]                                           |
28
+| [[What is the most secure chat app to use on mobile?]]                            |
28 29
 | [[How do I remove a user from the system?]]                                       |
29 30
 | [[How do I reset the tripwire?]]                                                  |
30 31
 | [[Is metadata protected?]]                                                        |
@@ -43,7 +44,7 @@
43 44
 * I don't have a static IP address. Can I still install this system?
44 45
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
45 46
 
46
-The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]], which supports a variety of dynamic DNS providers.
47
+The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses [[http://troglobit.com/inadyn.html][inadyn]] , which supports a variety of dynamic DNS providers.
47 48
 * Why not support building images for Raspberry Pi?
48 49
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
49 50
 
@@ -65,29 +66,35 @@ It was originally designed to run on the Beaglebone Black, but that should be re
65 66
 * Can I add more users to the system?
66 67
 Yes. Freedombone can support a small number of users, for a "/friends and family/" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
67 68
 
68
-#+BEGIN_SRC bash
69
+#+begin_src bash
69 70
 ssh username@mydomainname -p 2222
70
-#+END_SRC
71
+#+end_src
71 72
 
72 73
 Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
73 74
 
74 75
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
75 76
 
76 77
 Another point is that Freedombone installations are not intended to support many users (maybe ten at most). Large numbers of users may make the system unstable, and the more users you have on one system the more it becomes a single point of failure and also perhaps a honeypot from the standpoint of adversaries. Think of what happened with Lavabit and the moral dilemma which an administrator can be faced with (comply with threats and betray the trust of your users or don't comply and suffer other consequences). Ideally, you never want to put yourself into a situation where you can be forced to betray others.
78
+* What is the most secure chat app to use on mobile?
79
+On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
80
+
81
+The current safest way to chat is to use [[https://conversations.im][Conversations]] together with [[https://guardianproject.info/apps/orbot/][Orbot]] - both of which can be installed from [[https://f-droid.org/][F-droid]]. You may need to enable the [[https://guardianproject.info/][Guardian Project]] repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
82
+
83
+There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a /complete social graph/ of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
77 84
 * How do I remove a user from the system?
78 85
 To remove a user:
79 86
 
80
-#+BEGIN_SRC bash
87
+#+begin_src bash
81 88
 ssh username@mydomainname -p 2222
82
-#+END_SRC
89
+#+end_src
83 90
 
84 91
 Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
85 92
 * How do I reset the tripwire?
86 93
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
87 94
 
88
-#+BEGIN_SRC bash
95
+#+begin_src bash
89 96
 ssh username@mydomain -p 2222
90
-#+END_SRC
97
+#+end_src
91 98
 
92 99
 Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
93 100
 * Is metadata protected?
@@ -99,9 +106,9 @@ Select /Administrator controls/ then "reset tripwire" using cursors and space ba
99 106
 
100 107
 Even when using Freedombone metadata analysis by third parties is still possible. This can be mitigated by accessing your blog, or other web services, via their /onion addresses/, rather than via more conventional domain names. In that case your ISP and any government which they might be compelled to report back to will know when your system is being accessed, but not necessarily /which/ services are being accessed /or by whom/. So for instance using a Tor browser and the onion address people may be able to safely read your blog or wiki and be reasonably confident that metadata isn't being gathered about what they read (or more concisely the metadata which can be gathered by a third party may just not be very useful or personally identifiable). On the other hand if you access the system via conventional domain names and dynamic DNS then it's safe to assume that metadata can and will be collected by third parties.
101 108
 * How do I create email processing rules?
102
-#+BEGIN_SRC bash
109
+#+begin_src bash
103 110
 ssh username@domainname -p 2222
104
-#+END_SRC
111
+#+end_src
105 112
 
106 113
 Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
107 114
 
@@ -116,13 +123,13 @@ Spamassassin is also available and within Mutt you can use the S (shift+s) key t
116 123
 * Why isn't dynamic DNS working?
117 124
 If you run the command:
118 125
 
119
-#+BEGIN_SRC bash
120
-service inadyn status
121
-#+END_SRC
126
+#+begin_src bash
127
+systemctl status inadyn
128
+#+end_src
122 129
 
123 130
 And see some error related to checking for changes in the IP address then you can try other external IP services. Edit */etc/inadyn.conf* and change the domain for the *checkip-url* parameter. Possible sites are:
124 131
 
125
-#+BEGIN_SRC bash
132
+#+begin_src text
126 133
 https://check.torproject.org/
127 134
 https://www.whatsmydns.net/whats-my-ip-address.html
128 135
 https://www.privateinternetaccess.com/pages/whats-my-ip/
@@ -169,14 +176,14 @@ http://www.infosniper.net/
169 176
 http://wtfismyip.com/
170 177
 http://ipinfo.io/
171 178
 http://httpbin.org/ip
172
-#+END_SRC
179
+#+end_src
173 180
 
174 181
 * How do I change my encryption settings?
175 182
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
176 183
 
177
-#+BEGIN_SRC bash
184
+#+begin_src bash
178 185
 ssh myusername@mydomain -p 2222
179
-#+END_SRC
186
+#+end_src
180 187
 
181 188
 Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
182 189
 * How do I get a domain name?
@@ -184,12 +191,12 @@ Suppose that you have bought a domain name (rather than using a free subdomain o
184 191
 
185 192
 Remove any existing nameservers for your domain (or select "custom" nameservers), then add:
186 193
 
187
-#+BEGIN_SRC bash
194
+#+begin_src text
188 195
 NS1.AFRAID.ORG
189 196
 NS2.AFRAID.ORG
190 197
 NS3.AFRAID.ORG
191 198
 NS4.AFRAID.ORG
192
-#+END_SRC
199
+#+end_src
193 200
 
194 201
 It might take a few minutes for the above change to take effect.  Within freedns click on "Domains" and add your domains (this might only be available to paid members).  Make sure that they're marked as "private".
195 202
 
@@ -197,34 +204,34 @@ Select "Subdomains" from the menu on the left then select the MX entry for your
197 204
 
198 205
 To route email to one of your freedns domains:
199 206
 
200
-#+BEGIN_SRC bash
207
+#+begin_src bash
201 208
 editor /etc/mailname
202
-#+END_SRC
209
+#+end_src
203 210
 
204 211
 Add any extra domains which you own, then save and exit.
205 212
 
206
-#+BEGIN_SRC bash
213
+#+begin_src bash
207 214
 editor /etc/exim4/update-exim4.conf.conf
208
-#+END_SRC
215
+#+end_src
209 216
 
210 217
 Within dc_other_hostnames add your extra domain names, separated by a colon ':' character.
211 218
 
212 219
 Save and exit, then restart exim.
213 220
 
214
-#+BEGIN_SRC bash
221
+#+begin_src bash
215 222
 update-exim4.conf.template -r
216 223
 update-exim4.conf
217 224
 service exim4 restart
218
-#+END_SRC
225
+#+end_src
219 226
 
220 227
 You should now be able to send an email from /postmaster@mynewdomainname/ and it should arrive in your inbox.
221 228
 
222 229
 * How do I get a "real" SSL/TLS/HTTPS certificate?
223 230
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
224 231
 
225
-#+BEGIN_SRC bash
232
+#+begin_src bash
226 233
 ssh username@mydomainname -p 2222
227
-#+END_SRC
234
+#+end_src
228 235
 
229 236
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
230 237
 
@@ -234,17 +241,17 @@ Normally certificates will be automatically renewed once per month, so you don't
234 241
 
235 242
 If you need to manually renew a certificate:
236 243
 
237
-#+BEGIN_SRC bash
244
+#+begin_src bash
238 245
 ssh username@mydomainname -p 2222
239
-#+END_SRC
246
+#+end_src
240 247
 
241 248
 Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
242 249
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
243 250
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
244 251
 
245
-#+BEGIN_SRC bash
252
+#+begin_src bash
246 253
 ssh username@mydomainname -p 2222
247
-#+END_SRC
254
+#+end_src
248 255
 
249 256
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
250 257
 * Why use self-signed certificates?
@@ -258,15 +265,15 @@ Despite the hype, security of web sites on the internet is still a somewhat unso
258 265
 
259 266
 For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok.
260 267
 * Why not use the services of $company instead? They took the Seppuku pledge
261
-[[http://seppuku.cryptostorm.org][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
268
+[[https://cryptostorm.org/viewtopic.php?f=63&t=2954&sid=7de2d1e699cfde2f574e6a7f6ea5a173][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
262 269
 * Why does my email keep getting rejected as spam by Gmail/etc?
263 270
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
264 271
 
265 272
 Often ISPs will run their own SMTP mail server which you can use for proxying, typically called /mail.ISPdomain/. On the administrator control panel there is an option to set the details for outgoing email from the Mutt client.
266 273
 
267
-#+BEGIN_SRC bash
274
+#+begin_src bash
268 275
 ssh username@mydomainname -p 2222
269
-#+END_SRC
276
+#+end_src
270 277
 
271 278
 Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
272 279
 

+ 1
- 1
doc/EN/mobile.org Datei anzeigen

@@ -74,7 +74,7 @@ The most secure way to access email is via an ssh connection and shell interface
74 74
 This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
75 75
 
76 76
 * Services
77
-For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]].
77
+For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]]. Also see advice on chat apps in the [[file:./faq.html][FAQ]].
78 78
 
79 79
 * Battery preservation
80 80
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.

+ 102
- 82
website/EN/faq.html Datei anzeigen

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-04-06 Wed 18:58 -->
6
+<!-- 2016-05-06 Fri 21:38 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -171,15 +171,15 @@ for the JavaScript code in this tag.
171 171
 </colgroup>
172 172
 <tbody>
173 173
 <tr>
174
-<td class="org-left"><a href="#orgheadline1">I don't have a static IP address. Can I still install this system?</a></td>
174
+<td class="org-left"><a href="#orgb121a4d">I don't have a static IP address. Can I still install this system?</a></td>
175 175
 </tr>
176 176
 
177 177
 <tr>
178
-<td class="org-left"><a href="#orgheadline2">Why not support building images for Raspberry Pi?</a></td>
178
+<td class="org-left"><a href="#orgf010a5a">Why not support building images for Raspberry Pi?</a></td>
179 179
 </tr>
180 180
 
181 181
 <tr>
182
-<td class="org-left"><a href="#orgheadline3">Why use Github?</a></td>
182
+<td class="org-left"><a href="#org1aa1408">Why use Github?</a></td>
183 183
 </tr>
184 184
 
185 185
 <tr>
@@ -187,87 +187,91 @@ for the JavaScript code in this tag.
187 187
 </tr>
188 188
 
189 189
 <tr>
190
-<td class="org-left"><a href="#orgheadline4">Why can't I access my .onion site with a Tor browser?</a></td>
190
+<td class="org-left"><a href="#org100d598">Why can't I access my .onion site with a Tor browser?</a></td>
191 191
 </tr>
192 192
 
193 193
 <tr>
194
-<td class="org-left"><a href="#orgheadline5">What is the best hardware to run this system on?</a></td>
194
+<td class="org-left"><a href="#orga3487a7">What is the best hardware to run this system on?</a></td>
195 195
 </tr>
196 196
 
197 197
 <tr>
198
-<td class="org-left"><a href="#orgheadline6">Can I add more users to the system?</a></td>
198
+<td class="org-left"><a href="#orgd298dbb">Can I add more users to the system?</a></td>
199 199
 </tr>
200 200
 
201 201
 <tr>
202
-<td class="org-left"><a href="#orgheadline7">How do I remove a user from the system?</a></td>
202
+<td class="org-left"><a href="#orgef8453">What is the most secure chat app to use on mobile?</a></td>
203 203
 </tr>
204 204
 
205 205
 <tr>
206
-<td class="org-left"><a href="#orgheadline8">How do I reset the tripwire?</a></td>
206
+<td class="org-left"><a href="#org6c7f74">How do I remove a user from the system?</a></td>
207 207
 </tr>
208 208
 
209 209
 <tr>
210
-<td class="org-left"><a href="#orgheadline9">Is metadata protected?</a></td>
210
+<td class="org-left"><a href="#org9551764">How do I reset the tripwire?</a></td>
211 211
 </tr>
212 212
 
213 213
 <tr>
214
-<td class="org-left"><a href="#orgheadline10">How do I create email processing rules?</a></td>
214
+<td class="org-left"><a href="#org1a2b83f">Is metadata protected?</a></td>
215 215
 </tr>
216 216
 
217 217
 <tr>
218
-<td class="org-left"><a href="#orgheadline11">Why isn't dynamic DNS working?</a></td>
218
+<td class="org-left"><a href="#org88df6a0">How do I create email processing rules?</a></td>
219 219
 </tr>
220 220
 
221 221
 <tr>
222
-<td class="org-left"><a href="#orgheadline12">How do I change my encryption settings?</a></td>
222
+<td class="org-left"><a href="#org844e5d1">Why isn't dynamic DNS working?</a></td>
223 223
 </tr>
224 224
 
225 225
 <tr>
226
-<td class="org-left"><a href="#orgheadline13">How do I get a domain name?</a></td>
226
+<td class="org-left"><a href="#org577cd3b">How do I change my encryption settings?</a></td>
227 227
 </tr>
228 228
 
229 229
 <tr>
230
-<td class="org-left"><a href="#orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
230
+<td class="org-left"><a href="#org23cc852">How do I get a domain name?</a></td>
231 231
 </tr>
232 232
 
233 233
 <tr>
234
-<td class="org-left"><a href="#orgheadline15">How do I renew a Let's Encrypt certificate?</a></td>
234
+<td class="org-left"><a href="#orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
235 235
 </tr>
236 236
 
237 237
 <tr>
238
-<td class="org-left"><a href="#orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
238
+<td class="org-left"><a href="#org2d4283">How do I renew a Let's Encrypt certificate?</a></td>
239 239
 </tr>
240 240
 
241 241
 <tr>
242
-<td class="org-left"><a href="#orgheadline17">Why use self-signed certificates?</a></td>
242
+<td class="org-left"><a href="#org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
243 243
 </tr>
244 244
 
245 245
 <tr>
246
-<td class="org-left"><a href="#orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
246
+<td class="org-left"><a href="#orgfc78066">Why use self-signed certificates?</a></td>
247 247
 </tr>
248 248
 
249 249
 <tr>
250
-<td class="org-left"><a href="#orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
250
+<td class="org-left"><a href="#org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
251
+</tr>
252
+
253
+<tr>
254
+<td class="org-left"><a href="#org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
251 255
 </tr>
252 256
 </tbody>
253 257
 </table>
254 258
 </div>
255 259
 
256
-<div id="outline-container-orgheadline1" class="outline-2">
257
-<h2 id="orgheadline1">I don't have a static IP address. Can I still install this system?</h2>
258
-<div class="outline-text-2" id="text-orgheadline1">
260
+<div id="outline-container-orgb121a4d" class="outline-2">
261
+<h2 id="orgb121a4d">I don't have a static IP address. Can I still install this system?</h2>
262
+<div class="outline-text-2" id="text-orgb121a4d">
259 263
 <p>
260 264
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
261 265
 </p>
262 266
 
263 267
 <p>
264
-The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a>, which supports a variety of dynamic DNS providers.
268
+The lack of a static IP address can be worked around by using a dynamic DNS service. Freedombone uses <a href="http://troglobit.com/inadyn.html">inadyn</a> , which supports a variety of dynamic DNS providers.
265 269
 </p>
266 270
 </div>
267 271
 </div>
268
-<div id="outline-container-orgheadline2" class="outline-2">
269
-<h2 id="orgheadline2">Why not support building images for Raspberry Pi?</h2>
270
-<div class="outline-text-2" id="text-orgheadline2">
272
+<div id="outline-container-orgf010a5a" class="outline-2">
273
+<h2 id="orgf010a5a">Why not support building images for Raspberry Pi?</h2>
274
+<div class="outline-text-2" id="text-orgf010a5a">
271 275
 <p>
272 276
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
273 277
 </p>
@@ -277,9 +281,9 @@ So although the Raspberry Pi is cheap and hugely popular it's not supported by t
277 281
 </p>
278 282
 </div>
279 283
 </div>
280
-<div id="outline-container-orgheadline3" class="outline-2">
281
-<h2 id="orgheadline3">Why use Github?</h2>
282
-<div class="outline-text-2" id="text-orgheadline3">
284
+<div id="outline-container-org1aa1408" class="outline-2">
285
+<h2 id="org1aa1408">Why use Github?</h2>
286
+<div class="outline-text-2" id="text-org1aa1408">
283 287
 <p>
284 288
 Github is paradoxically a centralized, closed and proprietary system which happens to mostly host free and open source projects. Up until now it has been relatively benign, but at some point in the name of "growth" it will likely start becoming more evil, or just become like SourceForge - which was also once much loved by FOSS developers, but turned into a den of malvertizing.
285 289
 </p>
@@ -297,17 +301,17 @@ Currently many of the repositories used for applications which are not yet packa
297 301
 </p>
298 302
 </div>
299 303
 </div>
300
-<div id="outline-container-orgheadline4" class="outline-2">
301
-<h2 id="orgheadline4">Why can't I access my .onion site with a Tor browser?</h2>
302
-<div class="outline-text-2" id="text-orgheadline4">
304
+<div id="outline-container-org100d598" class="outline-2">
305
+<h2 id="org100d598">Why can't I access my .onion site with a Tor browser?</h2>
306
+<div class="outline-text-2" id="text-org100d598">
303 307
 <p>
304 308
 Probably you need to add the site to the NoScript whitelist. Typically click/press on the noscript icon (or select from the menu on mobile) then select <i>whitelist</i> and add the site URL. You may also need to disable HTTPS Everywhere when using onion addresses, which don't use https.
305 309
 </p>
306 310
 </div>
307 311
 </div>
308
-<div id="outline-container-orgheadline5" class="outline-2">
309
-<h2 id="orgheadline5">What is the best hardware to run this system on?</h2>
310
-<div class="outline-text-2" id="text-orgheadline5">
312
+<div id="outline-container-orga3487a7" class="outline-2">
313
+<h2 id="orga3487a7">What is the best hardware to run this system on?</h2>
314
+<div class="outline-text-2" id="text-orga3487a7">
311 315
 <p>
312 316
 It was originally designed to run on the Beaglebone Black, but that should be regarded as the most minimal system, because it's single core and has by today's standards a small amount of memory. Obviously the more powerful the hardware is the faster things like web pages (blog, social networking, etc) will be served but the more electricity such a system will require if you're running it 24/7. A good compromise between performance and energy consumption is something like an old netbook. The battery of an old netbook or laptop even gives you <a href="https://en.wikipedia.org/wiki/Uninterruptible_power_supply">UPS capability</a> to keep the system going during brief power outages or cable re-arrangements, and that means using full disk encryption on the server also becomes more practical.
313 317
 </p>
@@ -317,9 +321,9 @@ It was originally designed to run on the Beaglebone Black, but that should be re
317 321
 </p>
318 322
 </div>
319 323
 </div>
320
-<div id="outline-container-orgheadline6" class="outline-2">
321
-<h2 id="orgheadline6">Can I add more users to the system?</h2>
322
-<div class="outline-text-2" id="text-orgheadline6">
324
+<div id="outline-container-orgd298dbb" class="outline-2">
325
+<h2 id="orgd298dbb">Can I add more users to the system?</h2>
326
+<div class="outline-text-2" id="text-orgd298dbb">
323 327
 <p>
324 328
 Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
325 329
 </p>
@@ -343,9 +347,25 @@ Another point is that Freedombone installations are not intended to support many
343 347
 </p>
344 348
 </div>
345 349
 </div>
346
-<div id="outline-container-orgheadline7" class="outline-2">
347
-<h2 id="orgheadline7">How do I remove a user from the system?</h2>
348
-<div class="outline-text-2" id="text-orgheadline7">
350
+<div id="outline-container-orgef8453" class="outline-2">
351
+<h2 id="orgef8453">What is the most secure chat app to use on mobile?</h2>
352
+<div class="outline-text-2" id="text-orgef8453">
353
+<p>
354
+On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
355
+</p>
356
+
357
+<p>
358
+The current safest way to chat is to use <a href="https://conversations.im/">Conversations</a> together with <a href="https://guardianproject.info/apps/orbot/">Orbot</a> - both of which can be installed from <a href="https://f-droid.org/">F-droid</a>. You may need to enable the <a href="https://guardianproject.info/">Guardian Project</a> repository within F-droid in order to be able to install Orbot. Within the settings of the Conversations app you can set it to route via Tor, and also you can use the XMPP service of your Freedombone server. That way all of the software infrastructure is controlled by you or your community.
359
+</p>
360
+
361
+<p>
362
+There are many other fashionable chat apps with end-to-end security, but often they are closed source or can't be onion routed. For example, this means that although the often recommended Signal app may have state of the art security for the content of each message, in all likelihood Google and whichever agencies they are friendly with will be able to obtain a <i>complete social graph</i> of all Signal users, revealing who chats with who. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently audited.
363
+</p>
364
+</div>
365
+</div>
366
+<div id="outline-container-org6c7f74" class="outline-2">
367
+<h2 id="org6c7f74">How do I remove a user from the system?</h2>
368
+<div class="outline-text-2" id="text-org6c7f74">
349 369
 <p>
350 370
 To remove a user:
351 371
 </p>
@@ -361,9 +381,9 @@ Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Delete
361 381
 </p>
362 382
 </div>
363 383
 </div>
364
-<div id="outline-container-orgheadline8" class="outline-2">
365
-<h2 id="orgheadline8">How do I reset the tripwire?</h2>
366
-<div class="outline-text-2" id="text-orgheadline8">
384
+<div id="outline-container-org9551764" class="outline-2">
385
+<h2 id="org9551764">How do I reset the tripwire?</h2>
386
+<div class="outline-text-2" id="text-org9551764">
367 387
 <p>
368 388
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
369 389
 </p>
@@ -379,9 +399,9 @@ Select <i>Administrator controls</i> then "reset tripwire" using cursors and spa
379 399
 </p>
380 400
 </div>
381 401
 </div>
382
-<div id="outline-container-orgheadline9" class="outline-2">
383
-<h2 id="orgheadline9">Is metadata protected?</h2>
384
-<div class="outline-text-2" id="text-orgheadline9">
402
+<div id="outline-container-org1a2b83f" class="outline-2">
403
+<h2 id="org1a2b83f">Is metadata protected?</h2>
404
+<div class="outline-text-2" id="text-org1a2b83f">
385 405
 <blockquote>
386 406
 <p>
387 407
 "<i>We kill people based on metadata</i>"
@@ -397,9 +417,9 @@ Even when using Freedombone metadata analysis by third parties is still possible
397 417
 </p>
398 418
 </div>
399 419
 </div>
400
-<div id="outline-container-orgheadline10" class="outline-2">
401
-<h2 id="orgheadline10">How do I create email processing rules?</h2>
402
-<div class="outline-text-2" id="text-orgheadline10">
420
+<div id="outline-container-org88df6a0" class="outline-2">
421
+<h2 id="org88df6a0">How do I create email processing rules?</h2>
422
+<div class="outline-text-2" id="text-org88df6a0">
403 423
 <div class="org-src-container">
404 424
 
405 425
 <pre class="src src-bash">ssh username@domainname -p 2222
@@ -456,16 +476,16 @@ Spamassassin is also available and within Mutt you can use the S (shift+s) key t
456 476
 </p>
457 477
 </div>
458 478
 </div>
459
-<div id="outline-container-orgheadline11" class="outline-2">
460
-<h2 id="orgheadline11">Why isn't dynamic DNS working?</h2>
461
-<div class="outline-text-2" id="text-orgheadline11">
479
+<div id="outline-container-org844e5d1" class="outline-2">
480
+<h2 id="org844e5d1">Why isn't dynamic DNS working?</h2>
481
+<div class="outline-text-2" id="text-org844e5d1">
462 482
 <p>
463 483
 If you run the command:
464 484
 </p>
465 485
 
466 486
 <div class="org-src-container">
467 487
 
468
-<pre class="src src-bash">service inadyn status
488
+<pre class="src src-bash">systemctl status inadyn
469 489
 </pre>
470 490
 </div>
471 491
 
@@ -475,7 +495,7 @@ And see some error related to checking for changes in the IP address then you ca
475 495
 
476 496
 <div class="org-src-container">
477 497
 
478
-<pre class="src src-bash">https://check.torproject.org/
498
+<pre class="src src-text">https://check.torproject.org/
479 499
 https://www.whatsmydns.net/whats-my-ip-address.html
480 500
 https://www.privateinternetaccess.com/pages/whats-my-ip/
481 501
 http://checkip.two-dns.de
@@ -526,9 +546,9 @@ http://httpbin.org/ip
526 546
 </div>
527 547
 </div>
528 548
 
529
-<div id="outline-container-orgheadline12" class="outline-2">
530
-<h2 id="orgheadline12">How do I change my encryption settings?</h2>
531
-<div class="outline-text-2" id="text-orgheadline12">
549
+<div id="outline-container-org577cd3b" class="outline-2">
550
+<h2 id="org577cd3b">How do I change my encryption settings?</h2>
551
+<div class="outline-text-2" id="text-org577cd3b">
532 552
 <p>
533 553
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
534 554
 </p>
@@ -544,9 +564,9 @@ Select <i>Administrator controls</i> then select <i>Security Settings</i>. You w
544 564
 </p>
545 565
 </div>
546 566
 </div>
547
-<div id="outline-container-orgheadline13" class="outline-2">
548
-<h2 id="orgheadline13">How do I get a domain name?</h2>
549
-<div class="outline-text-2" id="text-orgheadline13">
567
+<div id="outline-container-org23cc852" class="outline-2">
568
+<h2 id="org23cc852">How do I get a domain name?</h2>
569
+<div class="outline-text-2" id="text-org23cc852">
550 570
 <p>
551 571
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
552 572
 </p>
@@ -557,7 +577,7 @@ Remove any existing nameservers for your domain (or select "custom" nameservers)
557 577
 
558 578
 <div class="org-src-container">
559 579
 
560
-<pre class="src src-bash">NS1.AFRAID.ORG
580
+<pre class="src src-text">NS1.AFRAID.ORG
561 581
 NS2.AFRAID.ORG
562 582
 NS3.AFRAID.ORG
563 583
 NS4.AFRAID.ORG
@@ -614,9 +634,9 @@ You should now be able to send an email from <i>postmaster@mynewdomainname</i> a
614 634
 </div>
615 635
 </div>
616 636
 
617
-<div id="outline-container-orgheadline14" class="outline-2">
618
-<h2 id="orgheadline14">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
619
-<div class="outline-text-2" id="text-orgheadline14">
637
+<div id="outline-container-orgc277e1a" class="outline-2">
638
+<h2 id="orgc277e1a">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
639
+<div class="outline-text-2" id="text-orgc277e1a">
620 640
 <p>
621 641
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
622 642
 </p>
@@ -636,9 +656,9 @@ One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS
636 656
 </p>
637 657
 </div>
638 658
 </div>
639
-<div id="outline-container-orgheadline15" class="outline-2">
640
-<h2 id="orgheadline15">How do I renew a Let's Encrypt certificate?</h2>
641
-<div class="outline-text-2" id="text-orgheadline15">
659
+<div id="outline-container-org2d4283" class="outline-2">
660
+<h2 id="org2d4283">How do I renew a Let's Encrypt certificate?</h2>
661
+<div class="outline-text-2" id="text-org2d4283">
642 662
 <p>
643 663
 Normally certificates will be automatically renewed once per month, so you don't need to be concerned about it. If anything goes wrong with the automatic renewal then you should receive a warning email.
644 664
 </p>
@@ -658,9 +678,9 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Renew
658 678
 </p>
659 679
 </div>
660 680
 </div>
661
-<div id="outline-container-orgheadline16" class="outline-2">
662
-<h2 id="orgheadline16">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
663
-<div class="outline-text-2" id="text-orgheadline16">
681
+<div id="outline-container-org4e3be95" class="outline-2">
682
+<h2 id="org4e3be95">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
683
+<div class="outline-text-2" id="text-org4e3be95">
664 684
 <p>
665 685
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
666 686
 </p>
@@ -676,9 +696,9 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Creat
676 696
 </p>
677 697
 </div>
678 698
 </div>
679
-<div id="outline-container-orgheadline17" class="outline-2">
680
-<h2 id="orgheadline17">Why use self-signed certificates?</h2>
681
-<div class="outline-text-2" id="text-orgheadline17">
699
+<div id="outline-container-orgfc78066" class="outline-2">
700
+<h2 id="orgfc78066">Why use self-signed certificates?</h2>
701
+<div class="outline-text-2" id="text-orgfc78066">
682 702
 <p>
683 703
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up <i>scary-scary looking</i> browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is <i>no certainty about who that connection is with</i>.
684 704
 </p>
@@ -700,17 +720,17 @@ For now a self-signed certificate will probably in most cases protect your commu
700 720
 </p>
701 721
 </div>
702 722
 </div>
703
-<div id="outline-container-orgheadline18" class="outline-2">
704
-<h2 id="orgheadline18">Why not use the services of $company instead? They took the Seppuku pledge</h2>
705
-<div class="outline-text-2" id="text-orgheadline18">
723
+<div id="outline-container-org56ed697" class="outline-2">
724
+<h2 id="org56ed697">Why not use the services of $company instead? They took the Seppuku pledge</h2>
725
+<div class="outline-text-2" id="text-org56ed697">
706 726
 <p>
707
-<a href="http://seppuku.cryptostorm.org/">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
727
+<a href="https://cryptostorm.org/viewtopic.php?f=63&amp;t=2954&amp;sid=7de2d1e699cfde2f574e6a7f6ea5a173">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
708 728
 </p>
709 729
 </div>
710 730
 </div>
711
-<div id="outline-container-orgheadline19" class="outline-2">
712
-<h2 id="orgheadline19">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
713
-<div class="outline-text-2" id="text-orgheadline19">
731
+<div id="outline-container-org1d00f37" class="outline-2">
732
+<h2 id="org1d00f37">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
733
+<div class="outline-text-2" id="text-org1d00f37">
714 734
 <p>
715 735
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
716 736
 </p>

+ 1
- 1
website/EN/index.html Datei anzeigen

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-04-26 Tue 19:03 -->
6
+<!-- 2016-05-06 Fri 20:43 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>

+ 29
- 29
website/EN/mobile.html Datei anzeigen

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-04-19 Tue 18:40 -->
6
+<!-- 2016-05-06 Fri 20:04 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -186,9 +186,9 @@ Mobile phones are insecure devices, but they're regarded as being so essential t
186 186
 </table>
187 187
 </center>
188 188
 
189
-<div id="outline-container-orgheadline1" class="outline-2">
190
-<h2 id="orgheadline1">Open</h2>
191
-<div class="outline-text-2" id="text-orgheadline1">
189
+<div id="outline-container-orgc988f00" class="outline-2">
190
+<h2 id="orgc988f00">Open</h2>
191
+<div class="outline-text-2" id="text-orgc988f00">
192 192
 <p>
193 193
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
194 194
 </p>
@@ -199,45 +199,45 @@ Why is it so important to run Linux on a phone? Aren't <i>iThings</i> supposed t
199 199
 </div>
200 200
 </div>
201 201
 
202
-<div id="outline-container-orgheadline2" class="outline-2">
203
-<h2 id="orgheadline2">Remove</h2>
204
-<div class="outline-text-2" id="text-orgheadline2">
202
+<div id="outline-container-org6812923" class="outline-2">
203
+<h2 id="org6812923">Remove</h2>
204
+<div class="outline-text-2" id="text-org6812923">
205 205
 <p>
206 206
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
207 207
 </p>
208 208
 </div>
209 209
 </div>
210 210
 
211
-<div id="outline-container-orgheadline3" class="outline-2">
212
-<h2 id="orgheadline3">Encrypt</h2>
213
-<div class="outline-text-2" id="text-orgheadline3">
211
+<div id="outline-container-orge0fcdf4" class="outline-2">
212
+<h2 id="orge0fcdf4">Encrypt</h2>
213
+<div class="outline-text-2" id="text-orge0fcdf4">
214 214
 <p>
215 215
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
216 216
 </p>
217 217
 </div>
218 218
 </div>
219 219
 
220
-<div id="outline-container-orgheadline4" class="outline-2">
221
-<h2 id="orgheadline4">Apps</h2>
222
-<div class="outline-text-2" id="text-orgheadline4">
220
+<div id="outline-container-org87c1781" class="outline-2">
221
+<h2 id="org87c1781">Apps</h2>
222
+<div class="outline-text-2" id="text-org87c1781">
223 223
 <p>
224 224
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
225 225
 </p>
226 226
 </div>
227 227
 </div>
228 228
 
229
-<div id="outline-container-orgheadline5" class="outline-2">
230
-<h2 id="orgheadline5">Lock</h2>
231
-<div class="outline-text-2" id="text-orgheadline5">
229
+<div id="outline-container-orgaca6fdb" class="outline-2">
230
+<h2 id="orgaca6fdb">Lock</h2>
231
+<div class="outline-text-2" id="text-orgaca6fdb">
232 232
 <p>
233 233
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
234 234
 </p>
235 235
 </div>
236 236
 </div>
237 237
 
238
-<div id="outline-container-orgheadline6" class="outline-2">
239
-<h2 id="orgheadline6">Onion</h2>
240
-<div class="outline-text-2" id="text-orgheadline6">
238
+<div id="outline-container-org8852762" class="outline-2">
239
+<h2 id="org8852762">Onion</h2>
240
+<div class="outline-text-2" id="text-org8852762">
241 241
 <p>
242 242
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
243 243
 </p>
@@ -248,9 +248,9 @@ In F-droid under the <b>repositories</b> menu you can enable the <b>guardian pro
248 248
 </div>
249 249
 </div>
250 250
 
251
-<div id="outline-container-orgheadline7" class="outline-2">
252
-<h2 id="orgheadline7">ssh</h2>
253
-<div class="outline-text-2" id="text-orgheadline7">
251
+<div id="outline-container-org3c8b1c0" class="outline-2">
252
+<h2 id="org3c8b1c0">ssh</h2>
253
+<div class="outline-text-2" id="text-org3c8b1c0">
254 254
 <p>
255 255
 The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
256 256
 </p>
@@ -261,18 +261,18 @@ This is a <i>defense in depth</i> approach in which there are multiple hurdles w
261 261
 </div>
262 262
 </div>
263 263
 
264
-<div id="outline-container-orgheadline8" class="outline-2">
265
-<h2 id="orgheadline8">Services</h2>
266
-<div class="outline-text-2" id="text-orgheadline8">
264
+<div id="outline-container-org9fad5e1" class="outline-2">
265
+<h2 id="org9fad5e1">Services</h2>
266
+<div class="outline-text-2" id="text-org9fad5e1">
267 267
 <p>
268
-For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>.
268
+For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>. Also see advice on chat apps in the <a href="./faq.html">FAQ</a>.
269 269
 </p>
270 270
 </div>
271 271
 </div>
272 272
 
273
-<div id="outline-container-orgheadline9" class="outline-2">
274
-<h2 id="orgheadline9">Battery preservation</h2>
275
-<div class="outline-text-2" id="text-orgheadline9">
273
+<div id="outline-container-org27ba21c" class="outline-2">
274
+<h2 id="org27ba21c">Battery preservation</h2>
275
+<div class="outline-text-2" id="text-org27ba21c">
276 276
 <p>
277 277
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
278 278
 </p>

+ 116
- 116
website/EN/usage.html Datei anzeigen

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-05-04 Wed 20:18 -->
6
+<!-- 2016-05-06 Fri 21:02 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -170,15 +170,15 @@ for the JavaScript code in this tag.
170 170
 </colgroup>
171 171
 <tbody>
172 172
 <tr>
173
-<td class="org-left"><a href="#orge3b8b7">Readme</a></td>
173
+<td class="org-left"><a href="#orgba9a28a">Readme</a></td>
174 174
 </tr>
175 175
 
176 176
 <tr>
177
-<td class="org-left"><a href="#org2605adf">Improving ssh security</a></td>
177
+<td class="org-left"><a href="#orgc3327a3">Improving ssh security</a></td>
178 178
 </tr>
179 179
 
180 180
 <tr>
181
-<td class="org-left"><a href="#org9bac184">Administrating the system via an onion address (Tor)</a></td>
181
+<td class="org-left"><a href="#org659f155">Administrating the system via an onion address (Tor)</a></td>
182 182
 </tr>
183 183
 
184 184
 <tr>
@@ -190,38 +190,38 @@ for the JavaScript code in this tag.
190 190
 </tr>
191 191
 
192 192
 <tr>
193
-<td class="org-left"><a href="#org6129962">Syncing to the Cloud</a></td>
193
+<td class="org-left"><a href="#orgc94b7c1">Syncing to the Cloud</a></td>
194 194
 </tr>
195 195
 
196 196
 <tr>
197
-<td class="org-left"><a href="#orgbfe6921">Play Music</a></td>
197
+<td class="org-left"><a href="#org6eb6c9c">Play Music</a></td>
198 198
 </tr>
199 199
 
200 200
 <tr>
201
-<td class="org-left"><a href="#orgeb2748f">Microblogging (GNU Social)</a></td>
201
+<td class="org-left"><a href="#org5ea1548">Microblogging (GNU Social)</a></td>
202 202
 </tr>
203 203
 
204 204
 <tr>
205
-<td class="org-left"><a href="#org1cef6c2">Social Network</a></td>
205
+<td class="org-left"><a href="#org69e0391">Social Network</a></td>
206 206
 </tr>
207 207
 
208 208
 <tr>
209
-<td class="org-left"><a href="#orgf363d07">Chat Services</a></td>
209
+<td class="org-left"><a href="#orgd9f317a">Chat Services</a></td>
210 210
 </tr>
211 211
 
212 212
 <tr>
213
-<td class="org-left"><a href="#orgb67222f">RSS Reader</a></td>
213
+<td class="org-left"><a href="#org6a436c8">RSS Reader</a></td>
214 214
 </tr>
215 215
 
216 216
 <tr>
217
-<td class="org-left"><a href="#org6f25e8a">Adding or removing users</a></td>
217
+<td class="org-left"><a href="#orgeecbd40">Adding or removing users</a></td>
218 218
 </tr>
219 219
 </tbody>
220 220
 </table>
221 221
 
222
-<div id="outline-container-orge3b8b7" class="outline-2">
223
-<h2 id="orge3b8b7">Readme</h2>
224
-<div class="outline-text-2" id="text-orge3b8b7">
222
+<div id="outline-container-orgba9a28a" class="outline-2">
223
+<h2 id="orgba9a28a">Readme</h2>
224
+<div class="outline-text-2" id="text-orgba9a28a">
225 225
 <p>
226 226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
227 227
 </p>
@@ -242,9 +242,9 @@ To exit you can either just close the terminal or use <b>CTRL-x CTRL-c</b> follo
242 242
 </p>
243 243
 </div>
244 244
 </div>
245
-<div id="outline-container-org2605adf" class="outline-2">
246
-<h2 id="org2605adf">Improving ssh security</h2>
247
-<div class="outline-text-2" id="text-org2605adf">
245
+<div id="outline-container-orgc3327a3" class="outline-2">
246
+<h2 id="orgc3327a3">Improving ssh security</h2>
247
+<div class="outline-text-2" id="text-orgc3327a3">
248 248
 <p>
249 249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
250 250
 </p>
@@ -297,9 +297,9 @@ If you wish to only use ssh keys then log in to the Freedombone, become the root
297 297
 </div>
298 298
 </div>
299 299
 
300
-<div id="outline-container-org9bac184" class="outline-2">
301
-<h2 id="org9bac184">Administrating the system via an onion address (Tor)</h2>
302
-<div class="outline-text-2" id="text-org9bac184">
300
+<div id="outline-container-org659f155" class="outline-2">
301
+<h2 id="org659f155">Administrating the system via an onion address (Tor)</h2>
302
+<div class="outline-text-2" id="text-org659f155">
303 303
 <p>
304 304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
305 305
 </p>
@@ -345,9 +345,9 @@ Subsequently even if dynamic DNS isn't working you may still be able to administ
345 345
 </p>
346 346
 </div>
347 347
 </div>
348
-<div id="outline-container-org6129962" class="outline-2">
349
-<h2 id="org6129962">Syncing to the Cloud</h2>
350
-<div class="outline-text-2" id="text-org6129962">
348
+<div id="outline-container-orgc94b7c1" class="outline-2">
349
+<h2 id="orgc94b7c1">Syncing to the Cloud</h2>
350
+<div class="outline-text-2" id="text-orgc94b7c1">
351 351
 <p>
352 352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
353 353
 </p>
@@ -357,9 +357,9 @@ Freedombone provides Syncthing shared directories for each user on the system, p
357 357
 </p>
358 358
 </div>
359 359
 
360
-<div id="outline-container-org964db8e" class="outline-3">
361
-<h3 id="org964db8e">On a laptop</h3>
362
-<div class="outline-text-3" id="text-org964db8e">
360
+<div id="outline-container-org90059f7" class="outline-3">
361
+<h3 id="org90059f7">On a laptop</h3>
362
+<div class="outline-text-3" id="text-org90059f7">
363 363
 <p>
364 364
 Install syncthing:
365 365
 </p>
@@ -414,9 +414,9 @@ Now wait for a few minutes. Eventually you will see two messages appear within t
414 414
 </p>
415 415
 </div>
416 416
 </div>
417
-<div id="outline-container-org68dbe71" class="outline-3">
418
-<h3 id="org68dbe71">On Android</h3>
419
-<div class="outline-text-3" id="text-org68dbe71">
417
+<div id="outline-container-org1dc3b2f" class="outline-3">
418
+<h3 id="org1dc3b2f">On Android</h3>
419
+<div class="outline-text-3" id="text-org1dc3b2f">
420 420
 <p>
421 421
 Install Syncthing and Connectbot from F-droid.
422 422
 </p>
@@ -447,12 +447,12 @@ Now wait for a few minutes or more. Eventually you should receive two notificati
447 447
 </div>
448 448
 </div>
449 449
 </div>
450
-<div id="outline-container-orgbfe6921" class="outline-2">
451
-<h2 id="orgbfe6921">Play Music</h2>
452
-<div class="outline-text-2" id="text-orgbfe6921">
453
-</div><div id="outline-container-orgdf44d93" class="outline-3">
454
-<h3 id="orgdf44d93">With the DLNA service</h3>
455
-<div class="outline-text-3" id="text-orgdf44d93">
450
+<div id="outline-container-org6eb6c9c" class="outline-2">
451
+<h2 id="org6eb6c9c">Play Music</h2>
452
+<div class="outline-text-2" id="text-org6eb6c9c">
453
+</div><div id="outline-container-orgaf474b4" class="outline-3">
454
+<h3 id="orgaf474b4">With the DLNA service</h3>
455
+<div class="outline-text-3" id="text-orgaf474b4">
456 456
 <p>
457 457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
458 458
 </p>
@@ -493,9 +493,9 @@ The DLNA service will only work within your local home network, and isn't remote
493 493
 </div>
494 494
 </div>
495 495
 
496
-<div id="outline-container-orgeb2748f" class="outline-2">
497
-<h2 id="orgeb2748f">Microblogging (GNU Social)</h2>
498
-<div class="outline-text-2" id="text-orgeb2748f">
496
+<div id="outline-container-org5ea1548" class="outline-2">
497
+<h2 id="org5ea1548">Microblogging (GNU Social)</h2>
498
+<div class="outline-text-2" id="text-org5ea1548">
499 499
 <p>
500 500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
501 501
 </p>
@@ -524,20 +524,20 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
524 524
 </div>
525 525
 </div>
526 526
 
527
-<div id="outline-container-org1cef6c2" class="outline-2">
528
-<h2 id="org1cef6c2">Social Network</h2>
529
-<div class="outline-text-2" id="text-org1cef6c2">
530
-</div><div id="outline-container-orgb06d3d5" class="outline-3">
531
-<h3 id="orgb06d3d5">Domains</h3>
532
-<div class="outline-text-3" id="text-orgb06d3d5">
527
+<div id="outline-container-org69e0391" class="outline-2">
528
+<h2 id="org69e0391">Social Network</h2>
529
+<div class="outline-text-2" id="text-org69e0391">
530
+</div><div id="outline-container-org5bf4b36" class="outline-3">
531
+<h3 id="org5bf4b36">Domains</h3>
532
+<div class="outline-text-3" id="text-org5bf4b36">
533 533
 <p>
534 534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
535 535
 </p>
536 536
 </div>
537 537
 </div>
538
-<div id="outline-container-orgacecd43" class="outline-3">
539
-<h3 id="orgacecd43">Initial install</h3>
540
-<div class="outline-text-3" id="text-orgacecd43">
538
+<div id="outline-container-org302aa5f" class="outline-3">
539
+<h3 id="org302aa5f">Initial install</h3>
540
+<div class="outline-text-3" id="text-org302aa5f">
541 541
 <p>
542 542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
543 543
 </p>
@@ -551,19 +551,19 @@ On first visiting your Hubzilla site you'll see the login screen. The first thin
551 551
 </div>
552 552
 </div>
553 553
 
554
-<div id="outline-container-orgf363d07" class="outline-2">
555
-<h2 id="orgf363d07">Chat Services</h2>
556
-<div class="outline-text-2" id="text-orgf363d07">
557
-</div><div id="outline-container-org3279b5e" class="outline-3">
558
-<h3 id="org3279b5e">IRC</h3>
559
-<div class="outline-text-3" id="text-org3279b5e">
554
+<div id="outline-container-orgd9f317a" class="outline-2">
555
+<h2 id="orgd9f317a">Chat Services</h2>
556
+<div class="outline-text-2" id="text-orgd9f317a">
557
+</div><div id="outline-container-org3ec44f8" class="outline-3">
558
+<h3 id="org3ec44f8">IRC</h3>
559
+<div class="outline-text-3" id="text-org3ec44f8">
560 560
 <p>
561 561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
562 562
 </p>
563 563
 </div>
564
-<div id="outline-container-orgeee7519" class="outline-4">
565
-<h4 id="orgeee7519">Irssi</h4>
566
-<div class="outline-text-4" id="text-orgeee7519">
564
+<div id="outline-container-orgd48562" class="outline-4">
565
+<h4 id="orgd48562">Irssi</h4>
566
+<div class="outline-text-4" id="text-orgd48562">
567 567
 <p>
568 568
 The easiest way to use irssi is to connect to your system, like this:
569 569
 </p>
@@ -579,9 +579,9 @@ Then select <b>IRC</b> from the menu. However, other than via this method using
579 579
 </p>
580 580
 </div>
581 581
 </div>
582
-<div id="outline-container-org9672d7" class="outline-4">
583
-<h4 id="org9672d7">HexChat</h4>
584
-<div class="outline-text-4" id="text-org9672d7">
582
+<div id="outline-container-orgf572812" class="outline-4">
583
+<h4 id="orgf572812">HexChat</h4>
584
+<div class="outline-text-4" id="text-orgf572812">
585 585
 <p>
586 586
 HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
587 587
 </p>
@@ -759,9 +759,9 @@ Click <b>close</b> and then <b>connect</b>.
759 759
 </div>
760 760
 </div>
761 761
 
762
-<div id="outline-container-org4cd3e8f" class="outline-4">
763
-<h4 id="org4cd3e8f">Emacs</h4>
764
-<div class="outline-text-4" id="text-org4cd3e8f">
762
+<div id="outline-container-org41ad30c" class="outline-4">
763
+<h4 id="org41ad30c">Emacs</h4>
764
+<div class="outline-text-4" id="text-org41ad30c">
765 765
 <p>
766 766
 If you are an Emacs user then you can also connect to your IRC server via Emacs.
767 767
 </p>
@@ -794,9 +794,9 @@ Add the following to your Emacs configuration file:
794 794
 </div>
795 795
 </div>
796 796
 </div>
797
-<div id="outline-container-org37e8802" class="outline-4">
798
-<h4 id="org37e8802">Changing or removing the IRC password</h4>
799
-<div class="outline-text-4" id="text-org37e8802">
797
+<div id="outline-container-org75ef2ca" class="outline-4">
798
+<h4 id="org75ef2ca">Changing or removing the IRC password</h4>
799
+<div class="outline-text-4" id="text-org75ef2ca">
800 800
 <p>
801 801
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
802 802
 </p>
@@ -814,12 +814,12 @@ Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the pa
814 814
 </div>
815 815
 </div>
816 816
 
817
-<div id="outline-container-orge57f18c" class="outline-3">
818
-<h3 id="orge57f18c">XMPP/Jabber</h3>
819
-<div class="outline-text-3" id="text-orge57f18c">
820
-</div><div id="outline-container-org37e1fc5" class="outline-4">
821
-<h4 id="org37e1fc5">Using with Profanity</h4>
822
-<div class="outline-text-4" id="text-org37e1fc5">
817
+<div id="outline-container-orgb9d1b40" class="outline-3">
818
+<h3 id="orgb9d1b40">XMPP/Jabber</h3>
819
+<div class="outline-text-3" id="text-orgb9d1b40">
820
+</div><div id="outline-container-orgf48f420" class="outline-4">
821
+<h4 id="orgf48f420">Using with Profanity</h4>
822
+<div class="outline-text-4" id="text-orgf48f420">
823 823
 <p>
824 824
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
825 825
 </p>
@@ -909,9 +909,9 @@ When accessed via the user control panel the client is automatically routed thro
909 909
 </p>
910 910
 </div>
911 911
 </div>
912
-<div id="outline-container-orgf29929d" class="outline-4">
913
-<h4 id="orgf29929d">Using with Jitsi</h4>
914
-<div class="outline-text-4" id="text-orgf29929d">
912
+<div id="outline-container-org7a19a8b" class="outline-4">
913
+<h4 id="org7a19a8b">Using with Jitsi</h4>
914
+<div class="outline-text-4" id="text-org7a19a8b">
915 915
 <p>
916 916
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
917 917
 </p>
@@ -941,9 +941,9 @@ You can also <a href="https://www.youtube.com/watch?v=vgx7VSrDGjk">see this vide
941 941
 </p>
942 942
 </div>
943 943
 </div>
944
-<div id="outline-container-org9715ca0" class="outline-4">
945
-<h4 id="org9715ca0">Using with Ubuntu</h4>
946
-<div class="outline-text-4" id="text-org9715ca0">
944
+<div id="outline-container-orgb774289" class="outline-4">
945
+<h4 id="orgb774289">Using with Ubuntu</h4>
946
+<div class="outline-text-4" id="text-orgb774289">
947 947
 <p>
948 948
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
949 949
 </p>
@@ -961,17 +961,17 @@ Click on <b>Advanced</b> and make sure that <b>Encryption required</b> and <b>Ig
961 961
 </p>
962 962
 </div>
963 963
 </div>
964
-<div id="outline-container-org2b79a3a" class="outline-4">
965
-<h4 id="org2b79a3a">Using Tor Messenger</h4>
966
-<div class="outline-text-4" id="text-org2b79a3a">
964
+<div id="outline-container-org2052a77" class="outline-4">
965
+<h4 id="org2052a77">Using Tor Messenger</h4>
966
+<div class="outline-text-4" id="text-org2052a77">
967 967
 <p>
968 968
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
969 969
 </p>
970 970
 </div>
971 971
 </div>
972
-<div id="outline-container-org244a79d" class="outline-4">
973
-<h4 id="org244a79d">Using with Android</h4>
974
-<div class="outline-text-4" id="text-org244a79d">
972
+<div id="outline-container-orgfa1cd5e" class="outline-4">
973
+<h4 id="orgfa1cd5e">Using with Android</h4>
974
+<div class="outline-text-4" id="text-orgfa1cd5e">
975 975
 <p>
976 976
 Install <a href="https://f-droid.org/">F-Droid</a>
977 977
 </p>
@@ -1007,16 +1007,16 @@ Then select <b>Next</b>. When chatting you can use the lock icon to encrypt your
1007 1007
 </div>
1008 1008
 </div>
1009 1009
 </div>
1010
-<div id="outline-container-org690ba89" class="outline-3">
1011
-<h3 id="org690ba89">Tox</h3>
1012
-<div class="outline-text-3" id="text-org690ba89">
1010
+<div id="outline-container-orgbae2a03" class="outline-3">
1011
+<h3 id="orgbae2a03">Tox</h3>
1012
+<div class="outline-text-3" id="text-orgbae2a03">
1013 1013
 <p>
1014 1014
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
1015 1015
 </p>
1016 1016
 </div>
1017
-<div id="outline-container-org5a004a8" class="outline-4">
1018
-<h4 id="org5a004a8">Using the Toxic client</h4>
1019
-<div class="outline-text-4" id="text-org5a004a8">
1017
+<div id="outline-container-orga66ac79" class="outline-4">
1018
+<h4 id="orga66ac79">Using the Toxic client</h4>
1019
+<div class="outline-text-4" id="text-orga66ac79">
1020 1020
 <p>
1021 1021
 Log into your system with:
1022 1022
 </p>
@@ -1040,12 +1040,12 @@ Then from the menu select <b>Tox Chat</b>. Tox is encrypted by default and also
1040 1040
 </div>
1041 1041
 </div>
1042 1042
 
1043
-<div id="outline-container-org21caf2" class="outline-3">
1044
-<h3 id="org21caf2">VoIP (Voice chat)</h3>
1045
-<div class="outline-text-3" id="text-org21caf2">
1046
-</div><div id="outline-container-orgeed8246" class="outline-4">
1047
-<h4 id="orgeed8246">Using with Ubuntu</h4>
1048
-<div class="outline-text-4" id="text-orgeed8246">
1043
+<div id="outline-container-org64c2fbd" class="outline-3">
1044
+<h3 id="org64c2fbd">VoIP (Voice chat)</h3>
1045
+<div class="outline-text-3" id="text-org64c2fbd">
1046
+</div><div id="outline-container-org7933c24" class="outline-4">
1047
+<h4 id="org7933c24">Using with Ubuntu</h4>
1048
+<div class="outline-text-4" id="text-org7933c24">
1049 1049
 <p>
1050 1050
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1051 1051
 </p>
@@ -1059,9 +1059,9 @@ Click on "add new" to add a new server and enter the default domain name for the
1059 1059
 </p>
1060 1060
 </div>
1061 1061
 </div>
1062
-<div id="outline-container-orgc647f97" class="outline-4">
1063
-<h4 id="orgc647f97">Using with Android</h4>
1064
-<div class="outline-text-4" id="text-orgc647f97">
1062
+<div id="outline-container-org6b891bc" class="outline-4">
1063
+<h4 id="org6b891bc">Using with Android</h4>
1064
+<div class="outline-text-4" id="text-org6b891bc">
1065 1065
 <p>
1066 1066
 Install <a href="https://f-droid.org/">F-Droid</a>
1067 1067
 </p>
@@ -1088,24 +1088,24 @@ Selecting the server by pressing on it then connects you to the server so that y
1088 1088
 </div>
1089 1089
 </div>
1090 1090
 </div>
1091
-<div id="outline-container-org9beba01" class="outline-3">
1092
-<h3 id="org9beba01">SIP phones</h3>
1093
-<div class="outline-text-3" id="text-org9beba01">
1091
+<div id="outline-container-orge8fb5bd" class="outline-3">
1092
+<h3 id="orge8fb5bd">SIP phones</h3>
1093
+<div class="outline-text-3" id="text-orge8fb5bd">
1094 1094
 <p>
1095 1095
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1096 1096
 </p>
1097 1097
 </div>
1098
-<div id="outline-container-orgadcf55e" class="outline-4">
1099
-<h4 id="orgadcf55e">About ZRTP</h4>
1100
-<div class="outline-text-4" id="text-orgadcf55e">
1098
+<div id="outline-container-orgeaa3a07" class="outline-4">
1099
+<h4 id="orgeaa3a07">About ZRTP</h4>
1100
+<div class="outline-text-4" id="text-orgeaa3a07">
1101 1101
 <p>
1102 1102
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1103 1103
 </p>
1104 1104
 </div>
1105 1105
 </div>
1106
-<div id="outline-container-orgbc591b0" class="outline-4">
1107
-<h4 id="orgbc591b0">Using with CSIPSimple</h4>
1108
-<div class="outline-text-4" id="text-orgbc591b0">
1106
+<div id="outline-container-org18183d5" class="outline-4">
1107
+<h4 id="org18183d5">Using with CSIPSimple</h4>
1108
+<div class="outline-text-4" id="text-org18183d5">
1109 1109
 <p>
1110 1110
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1111 1111
 </p>
@@ -1161,9 +1161,9 @@ If everything is working the account should appear in green with a status of <b>
1161 1161
 </p>
1162 1162
 </div>
1163 1163
 </div>
1164
-<div id="outline-container-orga274b04" class="outline-4">
1165
-<h4 id="orga274b04">Using with Ring</h4>
1166
-<div class="outline-text-4" id="text-orga274b04">
1164
+<div id="outline-container-org1099c7a" class="outline-4">
1165
+<h4 id="org1099c7a">Using with Ring</h4>
1166
+<div class="outline-text-4" id="text-org1099c7a">
1167 1167
 <p>
1168 1168
 From the menu select <b>Manage accounts</b>.
1169 1169
 </p>
@@ -1216,9 +1216,9 @@ Select the <b>Security</b> tab. Under <b>SRTP Key Exchange</b> select <b>ZRTP</b
1216 1216
 </div>
1217 1217
 </div>
1218 1218
 
1219
-<div id="outline-container-orgb67222f" class="outline-2">
1220
-<h2 id="orgb67222f">RSS Reader</h2>
1221
-<div class="outline-text-2" id="text-orgb67222f">
1219
+<div id="outline-container-org6a436c8" class="outline-2">
1220
+<h2 id="org6a436c8">RSS Reader</h2>
1221
+<div class="outline-text-2" id="text-org6a436c8">
1222 1222
 <p>
1223 1223
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1224 1224
 </p>
@@ -1262,9 +1262,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
1262 1262
 </blockquote>
1263 1263
 </div>
1264 1264
 </div>
1265
-<div id="outline-container-org6f25e8a" class="outline-2">
1266
-<h2 id="org6f25e8a">Adding or removing users</h2>
1267
-<div class="outline-text-2" id="text-org6f25e8a">
1265
+<div id="outline-container-orgeecbd40" class="outline-2">
1266
+<h2 id="orgeecbd40">Adding or removing users</h2>
1267
+<div class="outline-text-2" id="text-orgeecbd40">
1268 1268
 <p>
1269 1269
 Log into the system with:
1270 1270
 </p>