Browse Source

Update hexchat screen shot

Bob Mottram 8 years ago
parent
commit
abc7826f6c
No account linked to committer's email
4 changed files with 117 additions and 118 deletions
  1. 2
    2
      doc/EN/usage.org
  2. BIN
      img/hexchat_setup.jpg
  3. BIN
      img/xchat_setup.jpg
  4. 115
    116
      website/EN/usage.html

+ 2
- 2
doc/EN/usage.org View File

@@ -199,7 +199,7 @@ The easiest way to use irssi is to connect to your system, like this:
199 199
 ssh myusername@mydomain -p 2222
200 200
 #+END_SRC
201 201
 
202
-Then select *IRC* from the menu. However, other than via this method using ssh, irssi isn't a very good IRC client because it doesn't have the capability to onion route messages, and therefore leaks metadata. For the best security when using your IRC server, use XChat or client which supports Tor.
202
+Then select *IRC* from the menu. However, other than via this method using ssh, irssi isn't a very good IRC client because it doesn't have the capability to onion route messages, and therefore leaks metadata. For the best security when using your IRC server, use HexChat or client which supports Tor.
203 203
 *** HexChat
204 204
 HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
205 205
 
@@ -322,7 +322,7 @@ ssh username@mydomainname -p 2222
322 322
 
323 323
 Select Administrator options, then *About this system* and make a note of the onion address for IRC. Also select the *IRC Menu* and take a note of the login password.
324 324
 
325
-[[file:images/xchat_setup.jpg]]
325
+[[file:images/hexchat_setup.jpg]]
326 326
 
327 327
 Run HexChat.
328 328
 

BIN
img/hexchat_setup.jpg View File


BIN
img/xchat_setup.jpg View File


+ 115
- 116
website/EN/usage.html View File

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-05-03 Tue 09:50 -->
6
+<!-- 2016-05-03 Tue 11:15 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -170,15 +170,15 @@ for the JavaScript code in this tag.
170 170
 </colgroup>
171 171
 <tbody>
172 172
 <tr>
173
-<td class="org-left"><a href="#org6612024">Readme</a></td>
173
+<td class="org-left"><a href="#org9077c5e">Readme</a></td>
174 174
 </tr>
175 175
 
176 176
 <tr>
177
-<td class="org-left"><a href="#org26be483">Improving ssh security</a></td>
177
+<td class="org-left"><a href="#orge45bf5b">Improving ssh security</a></td>
178 178
 </tr>
179 179
 
180 180
 <tr>
181
-<td class="org-left"><a href="#org1c4ec39">Administrating the system via an onion address (Tor)</a></td>
181
+<td class="org-left"><a href="#orgbfd590b">Administrating the system via an onion address (Tor)</a></td>
182 182
 </tr>
183 183
 
184 184
 <tr>
@@ -190,38 +190,38 @@ for the JavaScript code in this tag.
190 190
 </tr>
191 191
 
192 192
 <tr>
193
-<td class="org-left"><a href="#org9ff08c0">Syncing to the Cloud</a></td>
193
+<td class="org-left"><a href="#orgace58c4">Syncing to the Cloud</a></td>
194 194
 </tr>
195 195
 
196 196
 <tr>
197
-<td class="org-left"><a href="#org3d15a36">Play Music</a></td>
197
+<td class="org-left"><a href="#org81aca49">Play Music</a></td>
198 198
 </tr>
199 199
 
200 200
 <tr>
201
-<td class="org-left"><a href="#org8c8fc0d">Microblogging (GNU Social)</a></td>
201
+<td class="org-left"><a href="#orgd09b032">Microblogging (GNU Social)</a></td>
202 202
 </tr>
203 203
 
204 204
 <tr>
205
-<td class="org-left"><a href="#orgff04fd5">Social Network</a></td>
205
+<td class="org-left"><a href="#orgc2fd8e1">Social Network</a></td>
206 206
 </tr>
207 207
 
208 208
 <tr>
209
-<td class="org-left"><a href="#org1e24252">Chat Services</a></td>
209
+<td class="org-left"><a href="#org2dd17c6">Chat Services</a></td>
210 210
 </tr>
211 211
 
212 212
 <tr>
213
-<td class="org-left"><a href="#org685ac90">RSS Reader</a></td>
213
+<td class="org-left"><a href="#org5bc9649">RSS Reader</a></td>
214 214
 </tr>
215 215
 
216 216
 <tr>
217
-<td class="org-left"><a href="#orgf21ff78">Adding or removing users</a></td>
217
+<td class="org-left"><a href="#orge81ee74">Adding or removing users</a></td>
218 218
 </tr>
219 219
 </tbody>
220 220
 </table>
221 221
 
222
-<div id="outline-container-org6612024" class="outline-2">
223
-<h2 id="org6612024">Readme</h2>
224
-<div class="outline-text-2" id="text-org6612024">
222
+<div id="outline-container-org9077c5e" class="outline-2">
223
+<h2 id="org9077c5e">Readme</h2>
224
+<div class="outline-text-2" id="text-org9077c5e">
225 225
 <p>
226 226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
227 227
 </p>
@@ -242,9 +242,9 @@ To exit you can either just close the terminal or use <b>CTRL-x CTRL-c</b> follo
242 242
 </p>
243 243
 </div>
244 244
 </div>
245
-<div id="outline-container-org26be483" class="outline-2">
246
-<h2 id="org26be483">Improving ssh security</h2>
247
-<div class="outline-text-2" id="text-org26be483">
245
+<div id="outline-container-orge45bf5b" class="outline-2">
246
+<h2 id="orge45bf5b">Improving ssh security</h2>
247
+<div class="outline-text-2" id="text-orge45bf5b">
248 248
 <p>
249 249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
250 250
 </p>
@@ -297,9 +297,9 @@ If you wish to only use ssh keys then log in to the Freedombone, become the root
297 297
 </div>
298 298
 </div>
299 299
 
300
-<div id="outline-container-org1c4ec39" class="outline-2">
301
-<h2 id="org1c4ec39">Administrating the system via an onion address (Tor)</h2>
302
-<div class="outline-text-2" id="text-org1c4ec39">
300
+<div id="outline-container-orgbfd590b" class="outline-2">
301
+<h2 id="orgbfd590b">Administrating the system via an onion address (Tor)</h2>
302
+<div class="outline-text-2" id="text-orgbfd590b">
303 303
 <p>
304 304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
305 305
 </p>
@@ -345,9 +345,9 @@ Subsequently even if dynamic DNS isn't working you may still be able to administ
345 345
 </p>
346 346
 </div>
347 347
 </div>
348
-<div id="outline-container-org9ff08c0" class="outline-2">
349
-<h2 id="org9ff08c0">Syncing to the Cloud</h2>
350
-<div class="outline-text-2" id="text-org9ff08c0">
348
+<div id="outline-container-orgace58c4" class="outline-2">
349
+<h2 id="orgace58c4">Syncing to the Cloud</h2>
350
+<div class="outline-text-2" id="text-orgace58c4">
351 351
 <p>
352 352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
353 353
 </p>
@@ -357,9 +357,9 @@ Freedombone provides Syncthing shared directories for each user on the system, p
357 357
 </p>
358 358
 </div>
359 359
 
360
-<div id="outline-container-org41367ab" class="outline-3">
361
-<h3 id="org41367ab">On a laptop</h3>
362
-<div class="outline-text-3" id="text-org41367ab">
360
+<div id="outline-container-org972f0d4" class="outline-3">
361
+<h3 id="org972f0d4">On a laptop</h3>
362
+<div class="outline-text-3" id="text-org972f0d4">
363 363
 <p>
364 364
 Install syncthing:
365 365
 </p>
@@ -414,9 +414,9 @@ Now wait for a few minutes. Eventually you will see two messages appear within t
414 414
 </p>
415 415
 </div>
416 416
 </div>
417
-<div id="outline-container-org12a7cf9" class="outline-3">
418
-<h3 id="org12a7cf9">On Android</h3>
419
-<div class="outline-text-3" id="text-org12a7cf9">
417
+<div id="outline-container-org1b5a480" class="outline-3">
418
+<h3 id="org1b5a480">On Android</h3>
419
+<div class="outline-text-3" id="text-org1b5a480">
420 420
 <p>
421 421
 Install Syncthing and Connectbot from F-droid.
422 422
 </p>
@@ -447,12 +447,12 @@ Now wait for a few minutes or more. Eventually you should receive two notificati
447 447
 </div>
448 448
 </div>
449 449
 </div>
450
-<div id="outline-container-org3d15a36" class="outline-2">
451
-<h2 id="org3d15a36">Play Music</h2>
452
-<div class="outline-text-2" id="text-org3d15a36">
453
-</div><div id="outline-container-org782b524" class="outline-3">
454
-<h3 id="org782b524">With the DLNA service</h3>
455
-<div class="outline-text-3" id="text-org782b524">
450
+<div id="outline-container-org81aca49" class="outline-2">
451
+<h2 id="org81aca49">Play Music</h2>
452
+<div class="outline-text-2" id="text-org81aca49">
453
+</div><div id="outline-container-orgdf01119" class="outline-3">
454
+<h3 id="orgdf01119">With the DLNA service</h3>
455
+<div class="outline-text-3" id="text-orgdf01119">
456 456
 <p>
457 457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
458 458
 </p>
@@ -493,9 +493,9 @@ The DLNA service will only work within your local home network, and isn't remote
493 493
 </div>
494 494
 </div>
495 495
 
496
-<div id="outline-container-org8c8fc0d" class="outline-2">
497
-<h2 id="org8c8fc0d">Microblogging (GNU Social)</h2>
498
-<div class="outline-text-2" id="text-org8c8fc0d">
496
+<div id="outline-container-orgd09b032" class="outline-2">
497
+<h2 id="orgd09b032">Microblogging (GNU Social)</h2>
498
+<div class="outline-text-2" id="text-orgd09b032">
499 499
 <p>
500 500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
501 501
 </p>
@@ -524,20 +524,20 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
524 524
 </div>
525 525
 </div>
526 526
 
527
-<div id="outline-container-orgff04fd5" class="outline-2">
528
-<h2 id="orgff04fd5">Social Network</h2>
529
-<div class="outline-text-2" id="text-orgff04fd5">
530
-</div><div id="outline-container-org58b8d5b" class="outline-3">
531
-<h3 id="org58b8d5b">Domains</h3>
532
-<div class="outline-text-3" id="text-org58b8d5b">
527
+<div id="outline-container-orgc2fd8e1" class="outline-2">
528
+<h2 id="orgc2fd8e1">Social Network</h2>
529
+<div class="outline-text-2" id="text-orgc2fd8e1">
530
+</div><div id="outline-container-org3c65936" class="outline-3">
531
+<h3 id="org3c65936">Domains</h3>
532
+<div class="outline-text-3" id="text-org3c65936">
533 533
 <p>
534 534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
535 535
 </p>
536 536
 </div>
537 537
 </div>
538
-<div id="outline-container-org426b91b" class="outline-3">
539
-<h3 id="org426b91b">Initial install</h3>
540
-<div class="outline-text-3" id="text-org426b91b">
538
+<div id="outline-container-orgff113ee" class="outline-3">
539
+<h3 id="orgff113ee">Initial install</h3>
540
+<div class="outline-text-3" id="text-orgff113ee">
541 541
 <p>
542 542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
543 543
 </p>
@@ -551,19 +551,19 @@ On first visiting your Hubzilla site you'll see the login screen. The first thin
551 551
 </div>
552 552
 </div>
553 553
 
554
-<div id="outline-container-org1e24252" class="outline-2">
555
-<h2 id="org1e24252">Chat Services</h2>
556
-<div class="outline-text-2" id="text-org1e24252">
557
-</div><div id="outline-container-orgc371afa" class="outline-3">
558
-<h3 id="orgc371afa">IRC</h3>
559
-<div class="outline-text-3" id="text-orgc371afa">
554
+<div id="outline-container-org2dd17c6" class="outline-2">
555
+<h2 id="org2dd17c6">Chat Services</h2>
556
+<div class="outline-text-2" id="text-org2dd17c6">
557
+</div><div id="outline-container-org766ebde" class="outline-3">
558
+<h3 id="org766ebde">IRC</h3>
559
+<div class="outline-text-3" id="text-org766ebde">
560 560
 <p>
561 561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
562 562
 </p>
563 563
 </div>
564
-<div id="outline-container-org23ad9da" class="outline-4">
565
-<h4 id="org23ad9da">Irssi</h4>
566
-<div class="outline-text-4" id="text-org23ad9da">
564
+<div id="outline-container-org1f5b875" class="outline-4">
565
+<h4 id="org1f5b875">Irssi</h4>
566
+<div class="outline-text-4" id="text-org1f5b875">
567 567
 <p>
568 568
 The easiest way to use irssi is to connect to your system, like this:
569 569
 </p>
@@ -575,13 +575,13 @@ The easiest way to use irssi is to connect to your system, like this:
575 575
 </div>
576 576
 
577 577
 <p>
578
-Then select <b>IRC</b> from the menu. However, other than via this method using ssh, irssi isn't a very good IRC client because it doesn't have the capability to onion route messages, and therefore leaks metadata. For the best security when using your IRC server, use XChat or client which supports Tor.
578
+Then select <b>IRC</b> from the menu. However, other than via this method using ssh, irssi isn't a very good IRC client because it doesn't have the capability to onion route messages, and therefore leaks metadata. For the best security when using your IRC server, use HexChat or client which supports Tor.
579 579
 </p>
580 580
 </div>
581 581
 </div>
582
-<div id="outline-container-orgc3a1e65" class="outline-4">
583
-<h4 id="orgc3a1e65">HexChat</h4>
584
-<div class="outline-text-4" id="text-orgc3a1e65">
582
+<div id="outline-container-org512a50c" class="outline-4">
583
+<h4 id="org512a50c">HexChat</h4>
584
+<div class="outline-text-4" id="text-org512a50c">
585 585
 <p>
586 586
 HexChat (formerly XChat) is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
587 587
 </p>
@@ -701,7 +701,6 @@ mkdir -p ~/.config/hexchat
701 701
 </pre>
702 702
 </div>
703 703
 
704
-
705 704
 <p>
706 705
 Now look up the onion address for your IRC server
707 706
 </p>
@@ -718,7 +717,7 @@ Select Administrator options, then <b>About this system</b> and make a note of t
718 717
 
719 718
 
720 719
 <div class="figure">
721
-<p><img src="images/xchat_setup.jpg" alt="xchat_setup.jpg" />
720
+<p><img src="images/hexchat_setup.jpg" alt="hexchat_setup.jpg" />
722 721
 </p>
723 722
 </div>
724 723
 
@@ -760,9 +759,9 @@ Click <b>close</b> and then <b>connect</b>.
760 759
 </div>
761 760
 </div>
762 761
 
763
-<div id="outline-container-orgba98014" class="outline-4">
764
-<h4 id="orgba98014">Changing or removing the IRC password</h4>
765
-<div class="outline-text-4" id="text-orgba98014">
762
+<div id="outline-container-orgb079292" class="outline-4">
763
+<h4 id="orgb079292">Changing or removing the IRC password</h4>
764
+<div class="outline-text-4" id="text-orgb079292">
766 765
 <p>
767 766
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
768 767
 </p>
@@ -780,12 +779,12 @@ Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the pa
780 779
 </div>
781 780
 </div>
782 781
 
783
-<div id="outline-container-org99478e9" class="outline-3">
784
-<h3 id="org99478e9">XMPP/Jabber</h3>
785
-<div class="outline-text-3" id="text-org99478e9">
786
-</div><div id="outline-container-org1b87a41" class="outline-4">
787
-<h4 id="org1b87a41">Using with Profanity</h4>
788
-<div class="outline-text-4" id="text-org1b87a41">
782
+<div id="outline-container-orgc4bb93d" class="outline-3">
783
+<h3 id="orgc4bb93d">XMPP/Jabber</h3>
784
+<div class="outline-text-3" id="text-orgc4bb93d">
785
+</div><div id="outline-container-org441e0bb" class="outline-4">
786
+<h4 id="org441e0bb">Using with Profanity</h4>
787
+<div class="outline-text-4" id="text-org441e0bb">
789 788
 <p>
790 789
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
791 790
 </p>
@@ -875,9 +874,9 @@ When accessed via the user control panel the client is automatically routed thro
875 874
 </p>
876 875
 </div>
877 876
 </div>
878
-<div id="outline-container-orgf2ff3cc" class="outline-4">
879
-<h4 id="orgf2ff3cc">Using with Jitsi</h4>
880
-<div class="outline-text-4" id="text-orgf2ff3cc">
877
+<div id="outline-container-org5cbcb15" class="outline-4">
878
+<h4 id="org5cbcb15">Using with Jitsi</h4>
879
+<div class="outline-text-4" id="text-org5cbcb15">
881 880
 <p>
882 881
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
883 882
 </p>
@@ -907,9 +906,9 @@ You can also <a href="https://www.youtube.com/watch?v=vgx7VSrDGjk">see this vide
907 906
 </p>
908 907
 </div>
909 908
 </div>
910
-<div id="outline-container-orgc1ad0fb" class="outline-4">
911
-<h4 id="orgc1ad0fb">Using with Ubuntu</h4>
912
-<div class="outline-text-4" id="text-orgc1ad0fb">
909
+<div id="outline-container-org9aa50d6" class="outline-4">
910
+<h4 id="org9aa50d6">Using with Ubuntu</h4>
911
+<div class="outline-text-4" id="text-org9aa50d6">
913 912
 <p>
914 913
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
915 914
 </p>
@@ -927,17 +926,17 @@ Click on <b>Advanced</b> and make sure that <b>Encryption required</b> and <b>Ig
927 926
 </p>
928 927
 </div>
929 928
 </div>
930
-<div id="outline-container-org6a5f16e" class="outline-4">
931
-<h4 id="org6a5f16e">Using Tor Messenger</h4>
932
-<div class="outline-text-4" id="text-org6a5f16e">
929
+<div id="outline-container-org2dc983" class="outline-4">
930
+<h4 id="org2dc983">Using Tor Messenger</h4>
931
+<div class="outline-text-4" id="text-org2dc983">
933 932
 <p>
934 933
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
935 934
 </p>
936 935
 </div>
937 936
 </div>
938
-<div id="outline-container-orgfbae828" class="outline-4">
939
-<h4 id="orgfbae828">Using with Android</h4>
940
-<div class="outline-text-4" id="text-orgfbae828">
937
+<div id="outline-container-orgc295f15" class="outline-4">
938
+<h4 id="orgc295f15">Using with Android</h4>
939
+<div class="outline-text-4" id="text-orgc295f15">
941 940
 <p>
942 941
 Install <a href="https://f-droid.org/">F-Droid</a>
943 942
 </p>
@@ -973,16 +972,16 @@ Then select <b>Next</b>. When chatting you can use the lock icon to encrypt your
973 972
 </div>
974 973
 </div>
975 974
 </div>
976
-<div id="outline-container-orgd9baee4" class="outline-3">
977
-<h3 id="orgd9baee4">Tox</h3>
978
-<div class="outline-text-3" id="text-orgd9baee4">
975
+<div id="outline-container-org7988223" class="outline-3">
976
+<h3 id="org7988223">Tox</h3>
977
+<div class="outline-text-3" id="text-org7988223">
979 978
 <p>
980 979
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
981 980
 </p>
982 981
 </div>
983
-<div id="outline-container-orgd598cc" class="outline-4">
984
-<h4 id="orgd598cc">Using the Toxic client</h4>
985
-<div class="outline-text-4" id="text-orgd598cc">
982
+<div id="outline-container-org4e94a1b" class="outline-4">
983
+<h4 id="org4e94a1b">Using the Toxic client</h4>
984
+<div class="outline-text-4" id="text-org4e94a1b">
986 985
 <p>
987 986
 Log into your system with:
988 987
 </p>
@@ -1006,12 +1005,12 @@ Then from the menu select <b>Tox Chat</b>. Tox is encrypted by default and also
1006 1005
 </div>
1007 1006
 </div>
1008 1007
 
1009
-<div id="outline-container-org3e54e14" class="outline-3">
1010
-<h3 id="org3e54e14">VoIP (Voice chat)</h3>
1011
-<div class="outline-text-3" id="text-org3e54e14">
1012
-</div><div id="outline-container-orgc073efb" class="outline-4">
1013
-<h4 id="orgc073efb">Using with Ubuntu</h4>
1014
-<div class="outline-text-4" id="text-orgc073efb">
1008
+<div id="outline-container-orgbd8ef4b" class="outline-3">
1009
+<h3 id="orgbd8ef4b">VoIP (Voice chat)</h3>
1010
+<div class="outline-text-3" id="text-orgbd8ef4b">
1011
+</div><div id="outline-container-orgb7d26cb" class="outline-4">
1012
+<h4 id="orgb7d26cb">Using with Ubuntu</h4>
1013
+<div class="outline-text-4" id="text-orgb7d26cb">
1015 1014
 <p>
1016 1015
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1017 1016
 </p>
@@ -1025,9 +1024,9 @@ Click on "add new" to add a new server and enter the default domain name for the
1025 1024
 </p>
1026 1025
 </div>
1027 1026
 </div>
1028
-<div id="outline-container-org95243ca" class="outline-4">
1029
-<h4 id="org95243ca">Using with Android</h4>
1030
-<div class="outline-text-4" id="text-org95243ca">
1027
+<div id="outline-container-orgc4a14f1" class="outline-4">
1028
+<h4 id="orgc4a14f1">Using with Android</h4>
1029
+<div class="outline-text-4" id="text-orgc4a14f1">
1031 1030
 <p>
1032 1031
 Install <a href="https://f-droid.org/">F-Droid</a>
1033 1032
 </p>
@@ -1054,24 +1053,24 @@ Selecting the server by pressing on it then connects you to the server so that y
1054 1053
 </div>
1055 1054
 </div>
1056 1055
 </div>
1057
-<div id="outline-container-org48387e1" class="outline-3">
1058
-<h3 id="org48387e1">SIP phones</h3>
1059
-<div class="outline-text-3" id="text-org48387e1">
1056
+<div id="outline-container-orgf220b08" class="outline-3">
1057
+<h3 id="orgf220b08">SIP phones</h3>
1058
+<div class="outline-text-3" id="text-orgf220b08">
1060 1059
 <p>
1061 1060
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1062 1061
 </p>
1063 1062
 </div>
1064
-<div id="outline-container-org34ab3dc" class="outline-4">
1065
-<h4 id="org34ab3dc">About ZRTP</h4>
1066
-<div class="outline-text-4" id="text-org34ab3dc">
1063
+<div id="outline-container-org7e3ecce" class="outline-4">
1064
+<h4 id="org7e3ecce">About ZRTP</h4>
1065
+<div class="outline-text-4" id="text-org7e3ecce">
1067 1066
 <p>
1068 1067
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1069 1068
 </p>
1070 1069
 </div>
1071 1070
 </div>
1072
-<div id="outline-container-orgc015dde" class="outline-4">
1073
-<h4 id="orgc015dde">Using with CSIPSimple</h4>
1074
-<div class="outline-text-4" id="text-orgc015dde">
1071
+<div id="outline-container-org730d959" class="outline-4">
1072
+<h4 id="org730d959">Using with CSIPSimple</h4>
1073
+<div class="outline-text-4" id="text-org730d959">
1075 1074
 <p>
1076 1075
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1077 1076
 </p>
@@ -1127,9 +1126,9 @@ If everything is working the account should appear in green with a status of <b>
1127 1126
 </p>
1128 1127
 </div>
1129 1128
 </div>
1130
-<div id="outline-container-org605e58f" class="outline-4">
1131
-<h4 id="org605e58f">Using with Ring</h4>
1132
-<div class="outline-text-4" id="text-org605e58f">
1129
+<div id="outline-container-org1c535a8" class="outline-4">
1130
+<h4 id="org1c535a8">Using with Ring</h4>
1131
+<div class="outline-text-4" id="text-org1c535a8">
1133 1132
 <p>
1134 1133
 From the menu select <b>Manage accounts</b>.
1135 1134
 </p>
@@ -1182,9 +1181,9 @@ Select the <b>Security</b> tab. Under <b>SRTP Key Exchange</b> select <b>ZRTP</b
1182 1181
 </div>
1183 1182
 </div>
1184 1183
 
1185
-<div id="outline-container-org685ac90" class="outline-2">
1186
-<h2 id="org685ac90">RSS Reader</h2>
1187
-<div class="outline-text-2" id="text-org685ac90">
1184
+<div id="outline-container-org5bc9649" class="outline-2">
1185
+<h2 id="org5bc9649">RSS Reader</h2>
1186
+<div class="outline-text-2" id="text-org5bc9649">
1188 1187
 <p>
1189 1188
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1190 1189
 </p>
@@ -1228,9 +1227,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
1228 1227
 </blockquote>
1229 1228
 </div>
1230 1229
 </div>
1231
-<div id="outline-container-orgf21ff78" class="outline-2">
1232
-<h2 id="orgf21ff78">Adding or removing users</h2>
1233
-<div class="outline-text-2" id="text-orgf21ff78">
1230
+<div id="outline-container-orge81ee74" class="outline-2">
1231
+<h2 id="orge81ee74">Adding or removing users</h2>
1232
+<div class="outline-text-2" id="text-orge81ee74">
1234 1233
 <p>
1235 1234
 Log into the system with:
1236 1235
 </p>