Bob Mottram 7 年之前
父節點
當前提交
3180e85973
共有 2 個文件被更改,包括 33 次插入33 次删除
  1. 1
    1
      doc/EN/mobile.org
  2. 32
    32
      website/EN/mobile.html

+ 1
- 1
doc/EN/mobile.org 查看文件

@@ -50,7 +50,7 @@ Use a Linux based phone operating system. Typically this will mean Android, but
50 50
 
51 51
 Why is it so important to run Linux on a phone? Aren't /iThings/ supposed to be highly secure? Don't the "experts" always tell you to just use an iPhone with its supposedly superior secure enclave? Isn't the CEO of Apple a good guy, fighting for freedom against the evil Feds?
52 52
 
53
-In the end it comes down to the fact that /if the source code for the device cannot be independently audited to check for backdoors, bugs and so on, then it can't actually be trusted/. It doesn't matter if there's a supposedly secure enclave on your closed source gadget. No matter how well-meaning or brave people running companies may be, local laws may force them to add backdoors into their systems (sometimes called "technical capabilities order" or "legal intercept") or to give away the encryption keys (Lavabit) or they may also do that purely for business reasons such as being able to sell you to their advertising customers and so on.
53
+In the end it comes down to the fact that /if the source code for the device cannot be independently audited to check for backdoors, bugs and so on, then it can't actually be trusted/. It doesn't matter if there's a supposedly secure enclave on your closed source gadget. No matter how well-meaning or brave people running companies may be, local laws may force them to add backdoors into their systems (sometimes called "technical capabilities order" or "lawful interception") or to give away the encryption keys (Lavabit) or they may also do that purely for business reasons such as being able to sell you to their advertising customers and so on.
54 54
 
55 55
 * Remove
56 56
 

+ 32
- 32
website/EN/mobile.html 查看文件

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2018-03-09 Fri 10:59 -->
6
+<!-- 2018-03-09 Fri 12:09 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title>&lrm;</title>
@@ -277,9 +277,9 @@ Mobile phones are insecure devices, but they're regarded as being so essential t
277 277
 </table>
278 278
 </center>
279 279
 
280
-<div id="outline-container-orge9af22f" class="outline-2">
281
-<h2 id="orge9af22f">Open</h2>
282
-<div class="outline-text-2" id="text-orge9af22f">
280
+<div id="outline-container-orgbf3dadb" class="outline-2">
281
+<h2 id="orgbf3dadb">Open</h2>
282
+<div class="outline-text-2" id="text-orgbf3dadb">
283 283
 <p>
284 284
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean LineageOS or Replicant. LineageOS is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by LineageOS. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
285 285
 </p>
@@ -289,32 +289,32 @@ Why is it so important to run Linux on a phone? Aren't <i>iThings</i> supposed t
289 289
 </p>
290 290
 
291 291
 <p>
292
-In the end it comes down to the fact that <i>if the source code for the device cannot be independently audited to check for backdoors, bugs and so on, then it can't actually be trusted</i>. It doesn't matter if there's a supposedly secure enclave on your closed source gadget. No matter how well-meaning or brave people running companies may be, local laws may force them to add backdoors into their systems (sometimes called "technical capabilities order" or "legal intercept") or to give away the encryption keys (Lavabit) or they may also do that purely for business reasons such as being able to sell you to their advertising customers and so on.
292
+In the end it comes down to the fact that <i>if the source code for the device cannot be independently audited to check for backdoors, bugs and so on, then it can't actually be trusted</i>. It doesn't matter if there's a supposedly secure enclave on your closed source gadget. No matter how well-meaning or brave people running companies may be, local laws may force them to add backdoors into their systems (sometimes called "technical capabilities order" or "lawful interception") or to give away the encryption keys (Lavabit) or they may also do that purely for business reasons such as being able to sell you to their advertising customers and so on.
293 293
 </p>
294 294
 </div>
295 295
 </div>
296 296
 
297
-<div id="outline-container-org7695365" class="outline-2">
298
-<h2 id="org7695365">Remove</h2>
299
-<div class="outline-text-2" id="text-org7695365">
297
+<div id="outline-container-org2cd56a1" class="outline-2">
298
+<h2 id="org2cd56a1">Remove</h2>
299
+<div class="outline-text-2" id="text-org2cd56a1">
300 300
 <p>
301 301
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
302 302
 </p>
303 303
 </div>
304 304
 </div>
305 305
 
306
-<div id="outline-container-org0e0d70a" class="outline-2">
307
-<h2 id="org0e0d70a">Encrypt</h2>
308
-<div class="outline-text-2" id="text-org0e0d70a">
306
+<div id="outline-container-org7a5b1ec" class="outline-2">
307
+<h2 id="org7a5b1ec">Encrypt</h2>
308
+<div class="outline-text-2" id="text-org7a5b1ec">
309 309
 <p>
310 310
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
311 311
 </p>
312 312
 </div>
313 313
 </div>
314 314
 
315
-<div id="outline-container-org0d5a396" class="outline-2">
316
-<h2 id="org0d5a396">Apps</h2>
317
-<div class="outline-text-2" id="text-org0d5a396">
315
+<div id="outline-container-orge82be24" class="outline-2">
316
+<h2 id="orge82be24">Apps</h2>
317
+<div class="outline-text-2" id="text-orge82be24">
318 318
 <p>
319 319
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
320 320
 </p>
@@ -325,18 +325,18 @@ Avoid using the Open Whisper Systems Signal app if you can, no matter what "expe
325 325
 </div>
326 326
 </div>
327 327
 
328
-<div id="outline-container-org425f6d8" class="outline-2">
329
-<h2 id="org425f6d8">Lock</h2>
330
-<div class="outline-text-2" id="text-org425f6d8">
328
+<div id="outline-container-orgd5b57aa" class="outline-2">
329
+<h2 id="orgd5b57aa">Lock</h2>
330
+<div class="outline-text-2" id="text-orgd5b57aa">
331 331
 <p>
332 332
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
333 333
 </p>
334 334
 </div>
335 335
 </div>
336 336
 
337
-<div id="outline-container-orga5f3435" class="outline-2">
338
-<h2 id="orga5f3435">Onion</h2>
339
-<div class="outline-text-2" id="text-orga5f3435">
337
+<div id="outline-container-org53d7a19" class="outline-2">
338
+<h2 id="org53d7a19">Onion</h2>
339
+<div class="outline-text-2" id="text-org53d7a19">
340 340
 <p>
341 341
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
342 342
 </p>
@@ -347,26 +347,26 @@ In F-droid under the <b>repositories</b> menu you can enable the <b>guardian pro
347 347
 </div>
348 348
 </div>
349 349
 
350
-<div id="outline-container-org54b691b" class="outline-2">
351
-<h2 id="org54b691b">Email</h2>
352
-<div class="outline-text-2" id="text-org54b691b">
350
+<div id="outline-container-orge727228" class="outline-2">
351
+<h2 id="orge727228">Email</h2>
352
+<div class="outline-text-2" id="text-orge727228">
353 353
 <p>
354 354
 The easiest way to access email is by installing the <a href="./app_mailpile.html">Mailpile</a> app. This keeps your GPG keys off of possibly insecure mobile devices but still enables encrypted email communications in an easy way. You can use K9 mail if you prefer, but that will require installing OpenKeychain and having your GPG keys on the device, which is a lot more risky.
355 355
 </p>
356 356
 </div>
357 357
 </div>
358
-<div id="outline-container-orgee547c2" class="outline-2">
359
-<h2 id="orgee547c2">Services</h2>
360
-<div class="outline-text-2" id="text-orgee547c2">
358
+<div id="outline-container-orgaaed473" class="outline-2">
359
+<h2 id="orgaaed473">Services</h2>
360
+<div class="outline-text-2" id="text-orgaaed473">
361 361
 <p>
362 362
 For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>. Also see advice on chat apps in the <a href="./faq.html">FAQ</a>.
363 363
 </p>
364 364
 </div>
365 365
 </div>
366 366
 
367
-<div id="outline-container-org31e2d6c" class="outline-2">
368
-<h2 id="org31e2d6c">Battery</h2>
369
-<div class="outline-text-2" id="text-org31e2d6c">
367
+<div id="outline-container-org3937a6e" class="outline-2">
368
+<h2 id="org3937a6e">Battery</h2>
369
+<div class="outline-text-2" id="text-org3937a6e">
370 370
 <p>
371 371
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app.
372 372
 </p>
@@ -385,9 +385,9 @@ It's also recommended to disable battery optimisations for Conversations and Orb
385 385
 </div>
386 386
 </div>
387 387
 
388
-<div id="outline-container-org6dfb521" class="outline-2">
389
-<h2 id="org6dfb521">Blocking bad domains</h2>
390
-<div class="outline-text-2" id="text-org6dfb521">
388
+<div id="outline-container-orgfe1c6d3" class="outline-2">
389
+<h2 id="orgfe1c6d3">Blocking bad domains</h2>
390
+<div class="outline-text-2" id="text-orgfe1c6d3">
391 391
 <p>
392 392
 You can block known bad domains by editing the <b>/system/etc/hosts</b> file on your device. It is possible to use extensive ad-blocking hosts files used by other ad-blocking systems such as pi-hole, but merely blocking Facebook and Google Analytics will protect you against much of the corporate surveillance which goes on. Even if you don't have a Facebook account this may still be useful since they will still try to create a "ghost profile" of you, so the less data they have the better.
393 393
 </p>