Bladeren bron

HexChat replaces XChat

Bob Mottram 8 jaren geleden
bovenliggende
commit
328a727929
Geen account gekoppeld aan de committers e-mail
2 gewijzigde bestanden met toevoegingen van 151 en 150 verwijderingen
  1. 19
    19
      doc/EN/usage.org
  2. 132
    131
      website/EN/usage.html

+ 19
- 19
doc/EN/usage.org Bestand weergeven

@@ -200,15 +200,15 @@ ssh myusername@mydomain -p 2222
200 200
 #+END_SRC
201 201
 
202 202
 Then select *IRC* from the menu. However, other than via this method using ssh, irssi isn't a very good IRC client because it doesn't have the capability to onion route messages, and therefore leaks metadata. For the best security when using your IRC server, use XChat or client which supports Tor.
203
-*** XChat
204
-XChat is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
203
+*** HexChat
204
+HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
205 205
 
206
-First install XChat and set up its configuration file.
206
+First install HexChat and set up its configuration file.
207 207
 
208 208
 #+BEGIN_SRC bash
209
-sudo apt-get install tor xchat
210
-mkdir ~/.xchat2
211
-echo "# By default, XChat based IRC software, when started-up, or run for first time,
209
+sudo apt-get install tor hexchat
210
+mkdir -p ~/.config/hexchat
211
+echo "# By default, HexChat based IRC software, when started-up, or run for first time,
212 212
 # it starts to use local network, to connect to the internet. To prevent that,
213 213
 # and to force it, to use Tor proxy (a Socks5 server):
214 214
 #
@@ -224,7 +224,7 @@ net_proxy_type = 3
224 224
 #                 Check yourself https://toxin.jottit.com/xchat_set_variables
225 225
 net_proxy_use = 0
226 226
 
227
-# XChat should not use the same circuit/exit server as other Tor applications.
227
+# HexChat should not use the same circuit/exit server as other Tor applications.
228 228
 # Otherwise activity in different applications could be correlated to the same
229 229
 # pseudonym. There is a way to prevent that.
230 230
 # It is called stream isolation. We use IsolateSOCKSAuth, 
@@ -234,12 +234,12 @@ net_proxy_use = 0
234 234
 # Works with Tor 0.2.3 and above.
235 235
 #
236 236
 # /set net_proxy_auth 1
237
-# /set net_proxy_pass = XChat
238
-# /set net_proxy_user = XChat
237
+# /set net_proxy_pass = HexChat
238
+# /set net_proxy_user = HexChat
239 239
 #
240 240
 net_proxy_auth = 1
241
-net_proxy_pass = XChat
242
-net_proxy_user = XChat
241
+net_proxy_pass = HexChat
242
+net_proxy_user = HexChat
243 243
 
244 244
 # Get rid of protocol leaks:
245 245
 # a DCC session can reveal IP address, etc. identd flag can reveal your
@@ -250,7 +250,7 @@ net_proxy_user = XChat
250 250
 # /set dcc_auto_resume OFF
251 251
 # /set dcc_auto_send 0
252 252
 # /set irc_hide_version ON
253
-# /set identd OFF <-- NOT working on all XChat-based IRC software.
253
+# /set identd OFF <-- NOT working on all HexChat-based IRC software.
254 254
 # But still highly suggested to include & use it.
255 255
 # Probable not needed on UNIX, source: http://xchat.org/faq/#q21 
256 256
 dcc_auto_chat = 0
@@ -261,7 +261,7 @@ identd = 0
261 261
 
262 262
 # If you use your own comment instead of default values, then these data are
263 263
 # posted on each channel when you do these events: JOIN, PART, QUIT, AWAY.
264
-# So they can reveal who you actually are, when you are using same XChat
264
+# So they can reveal who you actually are, when you are using same HexChat
265 265
 # software for multiple different nicknames.
266 266
 #
267 267
 # Delete everything under Settings -> Preferences -> Default Messages:
@@ -272,7 +272,7 @@ away_reason =
272 272
 irc_part_reason = 
273 273
 irc_quit_reason = 
274 274
 
275
-# By default, XChat based IRC software uses your platform OS(Operating System)s
275
+# By default, HexChat based IRC software uses your platform OS(Operating System)s
276 276
 # login user name as your nickname, user name, real name.  To prevent leaking
277 277
 # that, and, to use your own choice of nickname, realname, username:
278 278
 #
@@ -300,18 +300,18 @@ irc_nick3 = user__
300 300
 
301 301
 # Use a more common nick completion suffix:
302 302
 # When you write the first few characters of a nickname followed by tab,
303
-# it will, by XChat default, complete the nickname and ", " behind the
304
-# nickname. The behavior is XChat specific. The " :" is more more common
303
+# it will, by HexChat default, complete the nickname and ", " behind the
304
+# nickname. The behavior is HexChat specific. The " :" is more more common
305 305
 # for more common clients such as mIRC.
306 306
 #
307
-# XChat -> Settings -> Preferences -> input box -> completion_suffix set to :
307
+# HexChat -> Settings -> Preferences -> input box -> completion_suffix set to :
308 308
 #
309 309
 completion_suffix = :
310 310
 
311 311
 # Not starting the server windows at the beginning so you can check and set
312 312
 # settings before connecting to any IRC networks.
313 313
 gui_slist_skip = 1
314
-" > ~/.xchat2/xchat.conf
314
+" > ~/.config/hexchat/hexchat.conf
315 315
 #+END_SRC
316 316
 
317 317
 Now look up the onion address for your IRC server
@@ -324,7 +324,7 @@ Select Administrator options, then *About this system* and make a note of the on
324 324
 
325 325
 [[file:images/xchat_setup.jpg]]
326 326
 
327
-Run XChat.
327
+Run HexChat.
328 328
 
329 329
 Within the network list click, *Add* and enter your domain name then click *Edit*.
330 330
 

+ 132
- 131
website/EN/usage.html Bestand weergeven

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-05-02 Mon 11:42 -->
6
+<!-- 2016-05-03 Tue 09:50 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -170,15 +170,15 @@ for the JavaScript code in this tag.
170 170
 </colgroup>
171 171
 <tbody>
172 172
 <tr>
173
-<td class="org-left"><a href="#orgbe07d11">Readme</a></td>
173
+<td class="org-left"><a href="#org6612024">Readme</a></td>
174 174
 </tr>
175 175
 
176 176
 <tr>
177
-<td class="org-left"><a href="#orgef813e5">Improving ssh security</a></td>
177
+<td class="org-left"><a href="#org26be483">Improving ssh security</a></td>
178 178
 </tr>
179 179
 
180 180
 <tr>
181
-<td class="org-left"><a href="#org18b106d">Administrating the system via an onion address (Tor)</a></td>
181
+<td class="org-left"><a href="#org1c4ec39">Administrating the system via an onion address (Tor)</a></td>
182 182
 </tr>
183 183
 
184 184
 <tr>
@@ -190,38 +190,38 @@ for the JavaScript code in this tag.
190 190
 </tr>
191 191
 
192 192
 <tr>
193
-<td class="org-left"><a href="#org8a03ab5">Syncing to the Cloud</a></td>
193
+<td class="org-left"><a href="#org9ff08c0">Syncing to the Cloud</a></td>
194 194
 </tr>
195 195
 
196 196
 <tr>
197
-<td class="org-left"><a href="#org2c738ba">Play Music</a></td>
197
+<td class="org-left"><a href="#org3d15a36">Play Music</a></td>
198 198
 </tr>
199 199
 
200 200
 <tr>
201
-<td class="org-left"><a href="#orgf5b70cb">Microblogging (GNU Social)</a></td>
201
+<td class="org-left"><a href="#org8c8fc0d">Microblogging (GNU Social)</a></td>
202 202
 </tr>
203 203
 
204 204
 <tr>
205
-<td class="org-left"><a href="#orgdef70e5">Social Network</a></td>
205
+<td class="org-left"><a href="#orgff04fd5">Social Network</a></td>
206 206
 </tr>
207 207
 
208 208
 <tr>
209
-<td class="org-left"><a href="#orgde14250">Chat Services</a></td>
209
+<td class="org-left"><a href="#org1e24252">Chat Services</a></td>
210 210
 </tr>
211 211
 
212 212
 <tr>
213
-<td class="org-left"><a href="#org1a5bd9f">RSS Reader</a></td>
213
+<td class="org-left"><a href="#org685ac90">RSS Reader</a></td>
214 214
 </tr>
215 215
 
216 216
 <tr>
217
-<td class="org-left"><a href="#org3063ad5">Adding or removing users</a></td>
217
+<td class="org-left"><a href="#orgf21ff78">Adding or removing users</a></td>
218 218
 </tr>
219 219
 </tbody>
220 220
 </table>
221 221
 
222
-<div id="outline-container-orgbe07d11" class="outline-2">
223
-<h2 id="orgbe07d11">Readme</h2>
224
-<div class="outline-text-2" id="text-orgbe07d11">
222
+<div id="outline-container-org6612024" class="outline-2">
223
+<h2 id="org6612024">Readme</h2>
224
+<div class="outline-text-2" id="text-org6612024">
225 225
 <p>
226 226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
227 227
 </p>
@@ -242,9 +242,9 @@ To exit you can either just close the terminal or use <b>CTRL-x CTRL-c</b> follo
242 242
 </p>
243 243
 </div>
244 244
 </div>
245
-<div id="outline-container-orgef813e5" class="outline-2">
246
-<h2 id="orgef813e5">Improving ssh security</h2>
247
-<div class="outline-text-2" id="text-orgef813e5">
245
+<div id="outline-container-org26be483" class="outline-2">
246
+<h2 id="org26be483">Improving ssh security</h2>
247
+<div class="outline-text-2" id="text-org26be483">
248 248
 <p>
249 249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
250 250
 </p>
@@ -297,9 +297,9 @@ If you wish to only use ssh keys then log in to the Freedombone, become the root
297 297
 </div>
298 298
 </div>
299 299
 
300
-<div id="outline-container-org18b106d" class="outline-2">
301
-<h2 id="org18b106d">Administrating the system via an onion address (Tor)</h2>
302
-<div class="outline-text-2" id="text-org18b106d">
300
+<div id="outline-container-org1c4ec39" class="outline-2">
301
+<h2 id="org1c4ec39">Administrating the system via an onion address (Tor)</h2>
302
+<div class="outline-text-2" id="text-org1c4ec39">
303 303
 <p>
304 304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
305 305
 </p>
@@ -345,9 +345,9 @@ Subsequently even if dynamic DNS isn't working you may still be able to administ
345 345
 </p>
346 346
 </div>
347 347
 </div>
348
-<div id="outline-container-org8a03ab5" class="outline-2">
349
-<h2 id="org8a03ab5">Syncing to the Cloud</h2>
350
-<div class="outline-text-2" id="text-org8a03ab5">
348
+<div id="outline-container-org9ff08c0" class="outline-2">
349
+<h2 id="org9ff08c0">Syncing to the Cloud</h2>
350
+<div class="outline-text-2" id="text-org9ff08c0">
351 351
 <p>
352 352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
353 353
 </p>
@@ -357,9 +357,9 @@ Freedombone provides Syncthing shared directories for each user on the system, p
357 357
 </p>
358 358
 </div>
359 359
 
360
-<div id="outline-container-orgd9c5cb7" class="outline-3">
361
-<h3 id="orgd9c5cb7">On a laptop</h3>
362
-<div class="outline-text-3" id="text-orgd9c5cb7">
360
+<div id="outline-container-org41367ab" class="outline-3">
361
+<h3 id="org41367ab">On a laptop</h3>
362
+<div class="outline-text-3" id="text-org41367ab">
363 363
 <p>
364 364
 Install syncthing:
365 365
 </p>
@@ -414,9 +414,9 @@ Now wait for a few minutes. Eventually you will see two messages appear within t
414 414
 </p>
415 415
 </div>
416 416
 </div>
417
-<div id="outline-container-org20b5472" class="outline-3">
418
-<h3 id="org20b5472">On Android</h3>
419
-<div class="outline-text-3" id="text-org20b5472">
417
+<div id="outline-container-org12a7cf9" class="outline-3">
418
+<h3 id="org12a7cf9">On Android</h3>
419
+<div class="outline-text-3" id="text-org12a7cf9">
420 420
 <p>
421 421
 Install Syncthing and Connectbot from F-droid.
422 422
 </p>
@@ -447,12 +447,12 @@ Now wait for a few minutes or more. Eventually you should receive two notificati
447 447
 </div>
448 448
 </div>
449 449
 </div>
450
-<div id="outline-container-org2c738ba" class="outline-2">
451
-<h2 id="org2c738ba">Play Music</h2>
452
-<div class="outline-text-2" id="text-org2c738ba">
453
-</div><div id="outline-container-orgea71315" class="outline-3">
454
-<h3 id="orgea71315">With the DLNA service</h3>
455
-<div class="outline-text-3" id="text-orgea71315">
450
+<div id="outline-container-org3d15a36" class="outline-2">
451
+<h2 id="org3d15a36">Play Music</h2>
452
+<div class="outline-text-2" id="text-org3d15a36">
453
+</div><div id="outline-container-org782b524" class="outline-3">
454
+<h3 id="org782b524">With the DLNA service</h3>
455
+<div class="outline-text-3" id="text-org782b524">
456 456
 <p>
457 457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
458 458
 </p>
@@ -493,9 +493,9 @@ The DLNA service will only work within your local home network, and isn't remote
493 493
 </div>
494 494
 </div>
495 495
 
496
-<div id="outline-container-orgf5b70cb" class="outline-2">
497
-<h2 id="orgf5b70cb">Microblogging (GNU Social)</h2>
498
-<div class="outline-text-2" id="text-orgf5b70cb">
496
+<div id="outline-container-org8c8fc0d" class="outline-2">
497
+<h2 id="org8c8fc0d">Microblogging (GNU Social)</h2>
498
+<div class="outline-text-2" id="text-org8c8fc0d">
499 499
 <p>
500 500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
501 501
 </p>
@@ -524,20 +524,20 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
524 524
 </div>
525 525
 </div>
526 526
 
527
-<div id="outline-container-orgdef70e5" class="outline-2">
528
-<h2 id="orgdef70e5">Social Network</h2>
529
-<div class="outline-text-2" id="text-orgdef70e5">
530
-</div><div id="outline-container-orga3d8326" class="outline-3">
531
-<h3 id="orga3d8326">Domains</h3>
532
-<div class="outline-text-3" id="text-orga3d8326">
527
+<div id="outline-container-orgff04fd5" class="outline-2">
528
+<h2 id="orgff04fd5">Social Network</h2>
529
+<div class="outline-text-2" id="text-orgff04fd5">
530
+</div><div id="outline-container-org58b8d5b" class="outline-3">
531
+<h3 id="org58b8d5b">Domains</h3>
532
+<div class="outline-text-3" id="text-org58b8d5b">
533 533
 <p>
534 534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
535 535
 </p>
536 536
 </div>
537 537
 </div>
538
-<div id="outline-container-orge174e5" class="outline-3">
539
-<h3 id="orge174e5">Initial install</h3>
540
-<div class="outline-text-3" id="text-orge174e5">
538
+<div id="outline-container-org426b91b" class="outline-3">
539
+<h3 id="org426b91b">Initial install</h3>
540
+<div class="outline-text-3" id="text-org426b91b">
541 541
 <p>
542 542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
543 543
 </p>
@@ -551,19 +551,19 @@ On first visiting your Hubzilla site you'll see the login screen. The first thin
551 551
 </div>
552 552
 </div>
553 553
 
554
-<div id="outline-container-orgde14250" class="outline-2">
555
-<h2 id="orgde14250">Chat Services</h2>
556
-<div class="outline-text-2" id="text-orgde14250">
557
-</div><div id="outline-container-org285097c" class="outline-3">
558
-<h3 id="org285097c">IRC</h3>
559
-<div class="outline-text-3" id="text-org285097c">
554
+<div id="outline-container-org1e24252" class="outline-2">
555
+<h2 id="org1e24252">Chat Services</h2>
556
+<div class="outline-text-2" id="text-org1e24252">
557
+</div><div id="outline-container-orgc371afa" class="outline-3">
558
+<h3 id="orgc371afa">IRC</h3>
559
+<div class="outline-text-3" id="text-orgc371afa">
560 560
 <p>
561 561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
562 562
 </p>
563 563
 </div>
564
-<div id="outline-container-orgb40fb67" class="outline-4">
565
-<h4 id="orgb40fb67">Irssi</h4>
566
-<div class="outline-text-4" id="text-orgb40fb67">
564
+<div id="outline-container-org23ad9da" class="outline-4">
565
+<h4 id="org23ad9da">Irssi</h4>
566
+<div class="outline-text-4" id="text-org23ad9da">
567 567
 <p>
568 568
 The easiest way to use irssi is to connect to your system, like this:
569 569
 </p>
@@ -579,22 +579,22 @@ Then select <b>IRC</b> from the menu. However, other than via this method using
579 579
 </p>
580 580
 </div>
581 581
 </div>
582
-<div id="outline-container-org4515af" class="outline-4">
583
-<h4 id="org4515af">XChat</h4>
584
-<div class="outline-text-4" id="text-org4515af">
582
+<div id="outline-container-orgc3a1e65" class="outline-4">
583
+<h4 id="orgc3a1e65">HexChat</h4>
584
+<div class="outline-text-4" id="text-orgc3a1e65">
585 585
 <p>
586
-XChat is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
586
+HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
587 587
 </p>
588 588
 
589 589
 <p>
590
-First install XChat and set up its configuration file.
590
+First install HexChat and set up its configuration file.
591 591
 </p>
592 592
 
593 593
 <div class="org-src-container">
594 594
 
595
-<pre class="src src-bash">sudo apt-get install tor xchat
596
-mkdir ~/.xchat2
597
-<span class="org-builtin">echo</span> <span class="org-string">"# By default, XChat based IRC software, when started-up, or run for first time,</span>
595
+<pre class="src src-bash">sudo apt-get install tor hexchat
596
+mkdir -p ~/.config/hexchat
597
+<span class="org-builtin">echo</span> <span class="org-string">"# By default, HexChat based IRC software, when started-up, or run for first time,</span>
598 598
 <span class="org-string"># it starts to use local network, to connect to the internet. To prevent that,</span>
599 599
 <span class="org-string"># and to force it, to use Tor proxy (a Socks5 server):</span>
600 600
 <span class="org-string">#</span>
@@ -610,7 +610,7 @@ mkdir ~/.xchat2
610 610
 <span class="org-string">#                 Check yourself https://toxin.jottit.com/xchat_set_variables</span>
611 611
 <span class="org-string">net_proxy_use = 0</span>
612 612
 
613
-<span class="org-string"># XChat should not use the same circuit/exit server as other Tor applications.</span>
613
+<span class="org-string"># HexChat should not use the same circuit/exit server as other Tor applications.</span>
614 614
 <span class="org-string"># Otherwise activity in different applications could be correlated to the same</span>
615 615
 <span class="org-string"># pseudonym. There is a way to prevent that.</span>
616 616
 <span class="org-string"># It is called stream isolation. We use IsolateSOCKSAuth, </span>
@@ -620,12 +620,12 @@ mkdir ~/.xchat2
620 620
 <span class="org-string"># Works with Tor 0.2.3 and above.</span>
621 621
 <span class="org-string">#</span>
622 622
 <span class="org-string"># /set net_proxy_auth 1</span>
623
-<span class="org-string"># /set net_proxy_pass = XChat</span>
624
-<span class="org-string"># /set net_proxy_user = XChat</span>
623
+<span class="org-string"># /set net_proxy_pass = HexChat</span>
624
+<span class="org-string"># /set net_proxy_user = HexChat</span>
625 625
 <span class="org-string">#</span>
626 626
 <span class="org-string">net_proxy_auth = 1</span>
627
-<span class="org-string">net_proxy_pass = XChat</span>
628
-<span class="org-string">net_proxy_user = XChat</span>
627
+<span class="org-string">net_proxy_pass = HexChat</span>
628
+<span class="org-string">net_proxy_user = HexChat</span>
629 629
 
630 630
 <span class="org-string"># Get rid of protocol leaks:</span>
631 631
 <span class="org-string"># a DCC session can reveal IP address, etc. identd flag can reveal your</span>
@@ -636,7 +636,7 @@ mkdir ~/.xchat2
636 636
 <span class="org-string"># /set dcc_auto_resume OFF</span>
637 637
 <span class="org-string"># /set dcc_auto_send 0</span>
638 638
 <span class="org-string"># /set irc_hide_version ON</span>
639
-<span class="org-string"># /set identd OFF &lt;-- NOT working on all XChat-based IRC software.</span>
639
+<span class="org-string"># /set identd OFF &lt;-- NOT working on all HexChat-based IRC software.</span>
640 640
 <span class="org-string"># But still highly suggested to include &amp; use it.</span>
641 641
 <span class="org-string"># Probable not needed on UNIX, source: http://xchat.org/faq/#q21 </span>
642 642
 <span class="org-string">dcc_auto_chat = 0</span>
@@ -647,7 +647,7 @@ mkdir ~/.xchat2
647 647
 
648 648
 <span class="org-string"># If you use your own comment instead of default values, then these data are</span>
649 649
 <span class="org-string"># posted on each channel when you do these events: JOIN, PART, QUIT, AWAY.</span>
650
-<span class="org-string"># So they can reveal who you actually are, when you are using same XChat</span>
650
+<span class="org-string"># So they can reveal who you actually are, when you are using same HexChat</span>
651 651
 <span class="org-string"># software for multiple different nicknames.</span>
652 652
 <span class="org-string">#</span>
653 653
 <span class="org-string"># Delete everything under Settings -&gt; Preferences -&gt; Default Messages:</span>
@@ -658,7 +658,7 @@ mkdir ~/.xchat2
658 658
 <span class="org-string">irc_part_reason = </span>
659 659
 <span class="org-string">irc_quit_reason = </span>
660 660
 
661
-<span class="org-string"># By default, XChat based IRC software uses your platform OS(Operating System)s</span>
661
+<span class="org-string"># By default, HexChat based IRC software uses your platform OS(Operating System)s</span>
662 662
 <span class="org-string"># login user name as your nickname, user name, real name.  To prevent leaking</span>
663 663
 <span class="org-string"># that, and, to use your own choice of nickname, realname, username:</span>
664 664
 <span class="org-string">#</span>
@@ -686,21 +686,22 @@ mkdir ~/.xchat2
686 686
 
687 687
 <span class="org-string"># Use a more common nick completion suffix:</span>
688 688
 <span class="org-string"># When you write the first few characters of a nickname followed by tab,</span>
689
-<span class="org-string"># it will, by XChat default, complete the nickname and "</span>, <span class="org-string">" behind the</span>
690
-<span class="org-string"># nickname. The behavior is XChat specific. The "</span> :<span class="org-string">" is more more common</span>
689
+<span class="org-string"># it will, by HexChat default, complete the nickname and "</span>, <span class="org-string">" behind the</span>
690
+<span class="org-string"># nickname. The behavior is HexChat specific. The "</span> :<span class="org-string">" is more more common</span>
691 691
 <span class="org-string"># for more common clients such as mIRC.</span>
692 692
 <span class="org-string">#</span>
693
-<span class="org-string"># XChat -&gt; Settings -&gt; Preferences -&gt; input box -&gt; completion_suffix set to :</span>
693
+<span class="org-string"># HexChat -&gt; Settings -&gt; Preferences -&gt; input box -&gt; completion_suffix set to :</span>
694 694
 <span class="org-string">#</span>
695 695
 <span class="org-string">completion_suffix = :</span>
696 696
 
697 697
 <span class="org-string"># Not starting the server windows at the beginning so you can check and set</span>
698 698
 <span class="org-string"># settings before connecting to any IRC networks.</span>
699 699
 <span class="org-string">gui_slist_skip = 1</span>
700
-<span class="org-string">"</span> &gt; ~/.xchat2/xchat.conf
700
+<span class="org-string">"</span> &gt; ~/.config/hexchat/hexchat.conf
701 701
 </pre>
702 702
 </div>
703 703
 
704
+
704 705
 <p>
705 706
 Now look up the onion address for your IRC server
706 707
 </p>
@@ -722,7 +723,7 @@ Select Administrator options, then <b>About this system</b> and make a note of t
722 723
 </div>
723 724
 
724 725
 <p>
725
-Run XChat.
726
+Run HexChat.
726 727
 </p>
727 728
 
728 729
 <p>
@@ -759,9 +760,9 @@ Click <b>close</b> and then <b>connect</b>.
759 760
 </div>
760 761
 </div>
761 762
 
762
-<div id="outline-container-orga607a2b" class="outline-4">
763
-<h4 id="orga607a2b">Changing or removing the IRC password</h4>
764
-<div class="outline-text-4" id="text-orga607a2b">
763
+<div id="outline-container-orgba98014" class="outline-4">
764
+<h4 id="orgba98014">Changing or removing the IRC password</h4>
765
+<div class="outline-text-4" id="text-orgba98014">
765 766
 <p>
766 767
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
767 768
 </p>
@@ -779,12 +780,12 @@ Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the pa
779 780
 </div>
780 781
 </div>
781 782
 
782
-<div id="outline-container-org2305168" class="outline-3">
783
-<h3 id="org2305168">XMPP/Jabber</h3>
784
-<div class="outline-text-3" id="text-org2305168">
785
-</div><div id="outline-container-orgb9b59ca" class="outline-4">
786
-<h4 id="orgb9b59ca">Using with Profanity</h4>
787
-<div class="outline-text-4" id="text-orgb9b59ca">
783
+<div id="outline-container-org99478e9" class="outline-3">
784
+<h3 id="org99478e9">XMPP/Jabber</h3>
785
+<div class="outline-text-3" id="text-org99478e9">
786
+</div><div id="outline-container-org1b87a41" class="outline-4">
787
+<h4 id="org1b87a41">Using with Profanity</h4>
788
+<div class="outline-text-4" id="text-org1b87a41">
788 789
 <p>
789 790
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
790 791
 </p>
@@ -874,9 +875,9 @@ When accessed via the user control panel the client is automatically routed thro
874 875
 </p>
875 876
 </div>
876 877
 </div>
877
-<div id="outline-container-orgcc651b3" class="outline-4">
878
-<h4 id="orgcc651b3">Using with Jitsi</h4>
879
-<div class="outline-text-4" id="text-orgcc651b3">
878
+<div id="outline-container-orgf2ff3cc" class="outline-4">
879
+<h4 id="orgf2ff3cc">Using with Jitsi</h4>
880
+<div class="outline-text-4" id="text-orgf2ff3cc">
880 881
 <p>
881 882
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
882 883
 </p>
@@ -906,9 +907,9 @@ You can also <a href="https://www.youtube.com/watch?v=vgx7VSrDGjk">see this vide
906 907
 </p>
907 908
 </div>
908 909
 </div>
909
-<div id="outline-container-org29a25b4" class="outline-4">
910
-<h4 id="org29a25b4">Using with Ubuntu</h4>
911
-<div class="outline-text-4" id="text-org29a25b4">
910
+<div id="outline-container-orgc1ad0fb" class="outline-4">
911
+<h4 id="orgc1ad0fb">Using with Ubuntu</h4>
912
+<div class="outline-text-4" id="text-orgc1ad0fb">
912 913
 <p>
913 914
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
914 915
 </p>
@@ -926,17 +927,17 @@ Click on <b>Advanced</b> and make sure that <b>Encryption required</b> and <b>Ig
926 927
 </p>
927 928
 </div>
928 929
 </div>
929
-<div id="outline-container-orgd0bdeb4" class="outline-4">
930
-<h4 id="orgd0bdeb4">Using Tor Messenger</h4>
931
-<div class="outline-text-4" id="text-orgd0bdeb4">
930
+<div id="outline-container-org6a5f16e" class="outline-4">
931
+<h4 id="org6a5f16e">Using Tor Messenger</h4>
932
+<div class="outline-text-4" id="text-org6a5f16e">
932 933
 <p>
933 934
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
934 935
 </p>
935 936
 </div>
936 937
 </div>
937
-<div id="outline-container-orgc82e9ae" class="outline-4">
938
-<h4 id="orgc82e9ae">Using with Android</h4>
939
-<div class="outline-text-4" id="text-orgc82e9ae">
938
+<div id="outline-container-orgfbae828" class="outline-4">
939
+<h4 id="orgfbae828">Using with Android</h4>
940
+<div class="outline-text-4" id="text-orgfbae828">
940 941
 <p>
941 942
 Install <a href="https://f-droid.org/">F-Droid</a>
942 943
 </p>
@@ -972,16 +973,16 @@ Then select <b>Next</b>. When chatting you can use the lock icon to encrypt your
972 973
 </div>
973 974
 </div>
974 975
 </div>
975
-<div id="outline-container-orgb1f37b0" class="outline-3">
976
-<h3 id="orgb1f37b0">Tox</h3>
977
-<div class="outline-text-3" id="text-orgb1f37b0">
976
+<div id="outline-container-orgd9baee4" class="outline-3">
977
+<h3 id="orgd9baee4">Tox</h3>
978
+<div class="outline-text-3" id="text-orgd9baee4">
978 979
 <p>
979 980
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
980 981
 </p>
981 982
 </div>
982
-<div id="outline-container-orgf4dc70d" class="outline-4">
983
-<h4 id="orgf4dc70d">Using the Toxic client</h4>
984
-<div class="outline-text-4" id="text-orgf4dc70d">
983
+<div id="outline-container-orgd598cc" class="outline-4">
984
+<h4 id="orgd598cc">Using the Toxic client</h4>
985
+<div class="outline-text-4" id="text-orgd598cc">
985 986
 <p>
986 987
 Log into your system with:
987 988
 </p>
@@ -1005,12 +1006,12 @@ Then from the menu select <b>Tox Chat</b>. Tox is encrypted by default and also
1005 1006
 </div>
1006 1007
 </div>
1007 1008
 
1008
-<div id="outline-container-org44aad51" class="outline-3">
1009
-<h3 id="org44aad51">VoIP (Voice chat)</h3>
1010
-<div class="outline-text-3" id="text-org44aad51">
1011
-</div><div id="outline-container-orgef0333f" class="outline-4">
1012
-<h4 id="orgef0333f">Using with Ubuntu</h4>
1013
-<div class="outline-text-4" id="text-orgef0333f">
1009
+<div id="outline-container-org3e54e14" class="outline-3">
1010
+<h3 id="org3e54e14">VoIP (Voice chat)</h3>
1011
+<div class="outline-text-3" id="text-org3e54e14">
1012
+</div><div id="outline-container-orgc073efb" class="outline-4">
1013
+<h4 id="orgc073efb">Using with Ubuntu</h4>
1014
+<div class="outline-text-4" id="text-orgc073efb">
1014 1015
 <p>
1015 1016
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1016 1017
 </p>
@@ -1024,9 +1025,9 @@ Click on "add new" to add a new server and enter the default domain name for the
1024 1025
 </p>
1025 1026
 </div>
1026 1027
 </div>
1027
-<div id="outline-container-orgf94e21d" class="outline-4">
1028
-<h4 id="orgf94e21d">Using with Android</h4>
1029
-<div class="outline-text-4" id="text-orgf94e21d">
1028
+<div id="outline-container-org95243ca" class="outline-4">
1029
+<h4 id="org95243ca">Using with Android</h4>
1030
+<div class="outline-text-4" id="text-org95243ca">
1030 1031
 <p>
1031 1032
 Install <a href="https://f-droid.org/">F-Droid</a>
1032 1033
 </p>
@@ -1053,24 +1054,24 @@ Selecting the server by pressing on it then connects you to the server so that y
1053 1054
 </div>
1054 1055
 </div>
1055 1056
 </div>
1056
-<div id="outline-container-orgf4bbca7" class="outline-3">
1057
-<h3 id="orgf4bbca7">SIP phones</h3>
1058
-<div class="outline-text-3" id="text-orgf4bbca7">
1057
+<div id="outline-container-org48387e1" class="outline-3">
1058
+<h3 id="org48387e1">SIP phones</h3>
1059
+<div class="outline-text-3" id="text-org48387e1">
1059 1060
 <p>
1060 1061
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1061 1062
 </p>
1062 1063
 </div>
1063
-<div id="outline-container-orgff682b" class="outline-4">
1064
-<h4 id="orgff682b">About ZRTP</h4>
1065
-<div class="outline-text-4" id="text-orgff682b">
1064
+<div id="outline-container-org34ab3dc" class="outline-4">
1065
+<h4 id="org34ab3dc">About ZRTP</h4>
1066
+<div class="outline-text-4" id="text-org34ab3dc">
1066 1067
 <p>
1067 1068
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1068 1069
 </p>
1069 1070
 </div>
1070 1071
 </div>
1071
-<div id="outline-container-orga4661af" class="outline-4">
1072
-<h4 id="orga4661af">Using with CSIPSimple</h4>
1073
-<div class="outline-text-4" id="text-orga4661af">
1072
+<div id="outline-container-orgc015dde" class="outline-4">
1073
+<h4 id="orgc015dde">Using with CSIPSimple</h4>
1074
+<div class="outline-text-4" id="text-orgc015dde">
1074 1075
 <p>
1075 1076
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1076 1077
 </p>
@@ -1126,9 +1127,9 @@ If everything is working the account should appear in green with a status of <b>
1126 1127
 </p>
1127 1128
 </div>
1128 1129
 </div>
1129
-<div id="outline-container-orga80ce5f" class="outline-4">
1130
-<h4 id="orga80ce5f">Using with Ring</h4>
1131
-<div class="outline-text-4" id="text-orga80ce5f">
1130
+<div id="outline-container-org605e58f" class="outline-4">
1131
+<h4 id="org605e58f">Using with Ring</h4>
1132
+<div class="outline-text-4" id="text-org605e58f">
1132 1133
 <p>
1133 1134
 From the menu select <b>Manage accounts</b>.
1134 1135
 </p>
@@ -1181,9 +1182,9 @@ Select the <b>Security</b> tab. Under <b>SRTP Key Exchange</b> select <b>ZRTP</b
1181 1182
 </div>
1182 1183
 </div>
1183 1184
 
1184
-<div id="outline-container-org1a5bd9f" class="outline-2">
1185
-<h2 id="org1a5bd9f">RSS Reader</h2>
1186
-<div class="outline-text-2" id="text-org1a5bd9f">
1185
+<div id="outline-container-org685ac90" class="outline-2">
1186
+<h2 id="org685ac90">RSS Reader</h2>
1187
+<div class="outline-text-2" id="text-org685ac90">
1187 1188
 <p>
1188 1189
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1189 1190
 </p>
@@ -1227,9 +1228,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
1227 1228
 </blockquote>
1228 1229
 </div>
1229 1230
 </div>
1230
-<div id="outline-container-org3063ad5" class="outline-2">
1231
-<h2 id="org3063ad5">Adding or removing users</h2>
1232
-<div class="outline-text-2" id="text-org3063ad5">
1231
+<div id="outline-container-orgf21ff78" class="outline-2">
1232
+<h2 id="orgf21ff78">Adding or removing users</h2>
1233
+<div class="outline-text-2" id="text-orgf21ff78">
1233 1234
 <p>
1234 1235
 Log into the system with:
1235 1236
 </p>