Sfoglia il codice sorgente

Update documentation for profanity

Bob Mottram 9 anni fa
parent
commit
77b4865d2b
2 ha cambiato i file con 91 aggiunte e 11 eliminazioni
  1. 34
    4
      doc/EN/usage.org
  2. 57
    7
      website/EN/usage.html

+ 34
- 4
doc/EN/usage.org Vedi File

@@ -196,9 +196,7 @@ The [[http://profanity.im][Profanity]] shell based user interface and is perhaps
196 196
 ssh username@domain -p 2222
197 197
 #+END_SRC
198 198
 
199
-Then select XMPP and enter your password (for the admin user this can also be found in the README in your home directory).
200
-
201
-Generate an [[https://en.wikipedia.org/wiki/Off-the-Record_Messaging][OTR]] key with:
199
+Then select XMPP. Generate an [[https://en.wikipedia.org/wiki/Off-the-Record_Messaging][OTR]] key with:
202 200
 
203 201
 #+BEGIN_SRC bash
204 202
 /otr gen
@@ -210,7 +208,39 @@ Then to start a conversation using OTR:
210 208
 /otr start otherusername@otheruserdomain
211 209
 #+END_SRC
212 210
 
213
-It's automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
211
+or if you're already in an insecure chat with someone just use:
212
+
213
+#+BEGIN_SRC bash
214
+/otr start
215
+#+END_SRC
216
+
217
+Set a security question and answer:
218
+
219
+#+BEGIN_SRC bash
220
+/otr question "What is the name of your best friends rabbit?" fiffi
221
+#+END_SRC
222
+
223
+On the other side the user can enter:
224
+
225
+#+BEGIN_SRC bash
226
+/otr answer fifi
227
+#+END_SRC
228
+
229
+For the most paranoid you can also obtain your fingerprint:
230
+
231
+#+BEGIN_SRC bash
232
+/otr myfp
233
+#+END_SRC
234
+
235
+and quote that.  If they quote their back you can check it with:
236
+
237
+#+BEGIN_SRC bash
238
+/otr theirfp
239
+#+END_SRC
240
+
241
+If the fingerprints match then you can be pretty confident that unless you have been socially engineered via the question and answer you probably are talking to who you think you are, and that it will be difficult for mass surveillance systems to know the content of the conversation. For more details see [[http://www.profanity.im/otr.html][this guide]].
242
+
243
+ When accessed via the user control panel the client is automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
214 244
 *** Using with Jitsi
215 245
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the /off the record/ (OTR) feature which provides some additional security beyond the usual SSL certificates.
216 246
 

+ 57
- 7
website/EN/usage.html Vedi File

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-02-27 Sat 23:14 -->
6
+<!-- 2016-02-28 Sun 10:59 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -600,11 +600,7 @@ The <a href="http://profanity.im/">Profanity</a> shell based user interface and
600 600
 </div>
601 601
 
602 602
 <p>
603
-Then select XMPP and enter your password (for the admin user this can also be found in the README in your home directory).
604
-</p>
605
-
606
-<p>
607
-Generate an <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> key with:
603
+Then select XMPP. Generate an <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> key with:
608 604
 </p>
609 605
 
610 606
 <div class="org-src-container">
@@ -624,7 +620,61 @@ Then to start a conversation using OTR:
624 620
 </div>
625 621
 
626 622
 <p>
627
-It's automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
623
+or if you're already in an insecure chat with someone just use:
624
+</p>
625
+
626
+<div class="org-src-container">
627
+
628
+<pre class="src src-bash">/otr start
629
+</pre>
630
+</div>
631
+
632
+<p>
633
+Set a security question and answer:
634
+</p>
635
+
636
+<div class="org-src-container">
637
+
638
+<pre class="src src-bash">/otr question <span class="org-string">"What is the name of your best friends rabbit?"</span> fiffi
639
+</pre>
640
+</div>
641
+
642
+<p>
643
+On the other side the user can enter:
644
+</p>
645
+
646
+<div class="org-src-container">
647
+
648
+<pre class="src src-bash">/otr answer fifi
649
+</pre>
650
+</div>
651
+
652
+<p>
653
+For the most paranoid you can also obtain your fingerprint:
654
+</p>
655
+
656
+<div class="org-src-container">
657
+
658
+<pre class="src src-bash">/otr myfp
659
+</pre>
660
+</div>
661
+
662
+<p>
663
+and quote that.  If they quote their back you can check it with:
664
+</p>
665
+
666
+<div class="org-src-container">
667
+
668
+<pre class="src src-bash">/otr theirfp
669
+</pre>
670
+</div>
671
+
672
+<p>
673
+If the fingerprints match then you can be pretty confident that unless you have been socially engineered via the question and answer you probably are talking to who you think you are, and that it will be difficult for mass surveillance systems to know the content of the conversation. For more details see <a href="http://www.profanity.im/otr.html">this guide</a>.
674
+</p>
675
+
676
+<p>
677
+When accessed via the user control panel the client is automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
628 678
 </p>
629 679
 </div>
630 680
 </div>