Bob Mottram 9 yıl önce
ebeveyn
işleme
cf16df0e13
2 değiştirilmiş dosya ile 38 ekleme ve 37 silme
  1. 5
    5
      doc/EN/mobile.org
  2. 33
    32
      website/EN/mobile.html

+ 5
- 5
doc/EN/mobile.org Dosyayı Görüntüle

74
 This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
74
 This is a /defense in depth/ approach in which there are multiple hurdles which any adversary must overcome in order to get access to your data in a typical theft scenario. So you have the phone encryption, the lock screen with maximum tries and the ssh key password.
75
 
75
 
76
 * Services
76
 * Services
77
-
78
 For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]].
77
 For information on configuring various apps to work with Freedombone see the [[file:./usage.html][usage section]].
79
 
78
 
79
+* Battery preservation
80
+Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app. Also access the microblog via a browser. Using the browser interfaces means that the electrical energy cost of periodically checking and updating feeds is taken by the server and not by the mobile device itself.
81
+
82
+If you have Syncthing installed then change the settings so that it only syncs when charging and when on wifi. Avoid any apps which might be continuously polling and preventing the device from going into sleep mode when it's not used.
83
+
80
 #+BEGIN_EXPORT html
84
 #+BEGIN_EXPORT html
81
 <center>
85
 <center>
82
 Return to the <a href="index.html">home page</a>
86
 Return to the <a href="index.html">home page</a>
83
 </center>
87
 </center>
84
 #+END_EXPORT
88
 #+END_EXPORT
85
-* Battery preservation
86
-Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app. Also access the microblog via a browser. Using the browser interfaces means that the electrical energy cost of periodically checking and updating feeds is taken by the server and not by the mobile device itself.
87
-
88
-If you have Syncthing installed then change the settings so that it only syncs when charging and when on wifi. Avoid any apps which might be continuously polling and preventing the device from going into sleep mode when it's not used.

+ 33
- 32
website/EN/mobile.html Dosyayı Görüntüle

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-11 Mon 09:26 -->
6
+<!-- 2016-04-11 Mon 09:32 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
186
 </table>
186
 </table>
187
 </center>
187
 </center>
188
 
188
 
189
-<div id="outline-container-orgdb330f4" class="outline-2">
190
-<h2 id="orgdb330f4">Open</h2>
191
-<div class="outline-text-2" id="text-orgdb330f4">
189
+<div id="outline-container-orgc043403" class="outline-2">
190
+<h2 id="orgc043403">Open</h2>
191
+<div class="outline-text-2" id="text-orgc043403">
192
 <p>
192
 <p>
193
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
193
 Use a Linux based phone operating system. Typically this will mean Android, but could also mean Cyanogenmod or Replicant. Cyanogen is the most preferable, because you can usually get an up to date image with a recent kernel which will give you better security against exploits. If you're buying a phone then look for a model which is supported by Cyanogenmod. Replicant is the most free (as in freedom) but only runs on a small number of phone models. If you have a phone which runs a full GNU/Linux system then that's fantastic, and you can probably use it in much the same way as a desktop system and the rest of the advice on this page won't apply. If you don't have a phone capable of running a Linux based operating system then consider selling, giving away or bartering your existing one.
194
 </p>
194
 </p>
199
 </div>
199
 </div>
200
 </div>
200
 </div>
201
 
201
 
202
-<div id="outline-container-org61fe7e6" class="outline-2">
203
-<h2 id="org61fe7e6">Remove</h2>
204
-<div class="outline-text-2" id="text-org61fe7e6">
202
+<div id="outline-container-orgf9531c2" class="outline-2">
203
+<h2 id="orgf9531c2">Remove</h2>
204
+<div class="outline-text-2" id="text-orgf9531c2">
205
 <p>
205
 <p>
206
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
206
 So maybe you're running Android and the phone came with some apps already installed. Almost certainly they'll be proprietary. Go to Settings/Apps and then uninstall or deactivate any apps which you really don't need. Mostly preinstalled apps are intended to send your data to companies who will then sell it to advertisers or governments under the business model of <i>surveillance capital</i>. It's not a good idea to get caught up in that, and to avoid becoming addicted to apps which are surveilling you without consent or installing spyware in the background without your knowledge.
207
 </p>
207
 </p>
208
 </div>
208
 </div>
209
 </div>
209
 </div>
210
 
210
 
211
-<div id="outline-container-org901df0f" class="outline-2">
212
-<h2 id="org901df0f">Encrypt</h2>
213
-<div class="outline-text-2" id="text-org901df0f">
211
+<div id="outline-container-org77a3c95" class="outline-2">
212
+<h2 id="org77a3c95">Encrypt</h2>
213
+<div class="outline-text-2" id="text-org77a3c95">
214
 <p>
214
 <p>
215
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
215
 Encrypt your phone. This can usually be done via <b>Settings/Security</b> and you may need to fully charge the phone first. Encryption means that if you lose your phone or it gets stolen then there is less chance that anyone who picks it up will get access to your data, photos and so on.
216
 </p>
216
 </p>
217
 </div>
217
 </div>
218
 </div>
218
 </div>
219
 
219
 
220
-<div id="outline-container-org3c0d255" class="outline-2">
221
-<h2 id="org3c0d255">Apps</h2>
222
-<div class="outline-text-2" id="text-org3c0d255">
220
+<div id="outline-container-org99a9077" class="outline-2">
221
+<h2 id="org99a9077">Apps</h2>
222
+<div class="outline-text-2" id="text-org99a9077">
223
 <p>
223
 <p>
224
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
224
 Installing <b>F-droid</b> and only adding any new apps via F-droid will ensure that you are always using free and open source software. Open source is not a panacea, since bugs can and do still occur, but it will help you to avoid the worst security and privacy pitfalls.
225
 </p>
225
 </p>
226
 </div>
226
 </div>
227
 </div>
227
 </div>
228
 
228
 
229
-<div id="outline-container-orgb5d6814" class="outline-2">
230
-<h2 id="orgb5d6814">Lock</h2>
231
-<div class="outline-text-2" id="text-orgb5d6814">
229
+<div id="outline-container-org5693175" class="outline-2">
230
+<h2 id="org5693175">Lock</h2>
231
+<div class="outline-text-2" id="text-org5693175">
232
 <p>
232
 <p>
233
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
233
 Add a lock screen, preferably with a password which is not easy for other people to guess or for quicker access with a PIN number. Install an app called <b>Locker</b>, activate it and set the maximum number of password guesses to ten (or whatever you feel comfortable with). If bad people get hold of your phone then they may try to brute force your lock screen password or PIN (i.e. automatically trying millions of common word and number combinations) and the locker app will prevent them from succeeding by resetting the phone back to its factory default condition and wiping the data.
234
 </p>
234
 </p>
235
 </div>
235
 </div>
236
 </div>
236
 </div>
237
 
237
 
238
-<div id="outline-container-org1e9f840" class="outline-2">
239
-<h2 id="org1e9f840">Onion</h2>
240
-<div class="outline-text-2" id="text-org1e9f840">
238
+<div id="outline-container-org48d5555" class="outline-2">
239
+<h2 id="org48d5555">Onion</h2>
240
+<div class="outline-text-2" id="text-org48d5555">
241
 <p>
241
 <p>
242
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
242
 Both governments and corporations want to compile matadata dossiers about you. Who you communicated with, when and how often. They want this so that they can data mine, simulate, predict and then ultimately influence (sometimes also called "nudge") your actions and preferences in the directions they prefer. By routing your connections through a number of proxy servers (Tor routers) you can make it perhaps not <i>theoretically</i> impossible but at least <i>very hard</i> for them to have a complete and accurate list of who your friends are, your religion, politics, likely health issues, sexual orientation and what news sites or books you read.
243
 </p>
243
 </p>
248
 </div>
248
 </div>
249
 </div>
249
 </div>
250
 
250
 
251
-<div id="outline-container-org3b2873" class="outline-2">
252
-<h2 id="org3b2873">ssh</h2>
253
-<div class="outline-text-2" id="text-org3b2873">
251
+<div id="outline-container-org3dcaf02" class="outline-2">
252
+<h2 id="org3dcaf02">ssh</h2>
253
+<div class="outline-text-2" id="text-org3dcaf02">
254
 <p>
254
 <p>
255
 The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
255
 The most secure way to access email is via an ssh connection and shell interface. This is not highly convenient, but it does keep your email and GPG key off of the phone which improves your security. If your phone is subsequently stolen then even if an adversary can get past the lock screen <i>there are no emails stored on the phone</i>. Install <b>Connectbot</b>, generate an RSA key of at least 2048 bits and give it a password. Copy and paste the ssh public key to a pastebin and then add it to <i>home/myusername</i>.ssh/authorized keys on Freedombone. Then add an ssh account for the Freedombone, using port 2222. Before you log in you will need to ensure that the ssh key is unlocked. If you lose your phone then you can remove that public key from <i>authorized_keys</i> and anyone in possession of the phone will no longer be able to get ssh access to your system.
256
 </p>
256
 </p>
261
 </div>
261
 </div>
262
 </div>
262
 </div>
263
 
263
 
264
-<div id="outline-container-org9cfdb06" class="outline-2">
265
-<h2 id="org9cfdb06">Services</h2>
266
-<div class="outline-text-2" id="text-org9cfdb06">
264
+<div id="outline-container-org475918e" class="outline-2">
265
+<h2 id="org475918e">Services</h2>
266
+<div class="outline-text-2" id="text-org475918e">
267
 <p>
267
 <p>
268
 For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>.
268
 For information on configuring various apps to work with Freedombone see the <a href="./usage.html">usage section</a>.
269
 </p>
269
 </p>
270
-
271
-<center>
272
-Return to the <a href="index.html">home page</a>
273
-</center>
274
 </div>
270
 </div>
275
 </div>
271
 </div>
276
-<div id="outline-container-orgdaddcf5" class="outline-2">
277
-<h2 id="orgdaddcf5">Battery preservation</h2>
278
-<div class="outline-text-2" id="text-orgdaddcf5">
272
+
273
+<div id="outline-container-orgc70f8bd" class="outline-2">
274
+<h2 id="orgc70f8bd">Battery preservation</h2>
275
+<div class="outline-text-2" id="text-orgc70f8bd">
279
 <p>
276
 <p>
280
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app. Also access the microblog via a browser. Using the browser interfaces means that the electrical energy cost of periodically checking and updating feeds is taken by the server and not by the mobile device itself.
277
 Even with free software apps it's not difficult to get into a situation where your battery doesn't last for long. To maximize battery life access RSS feeds via the onion-based mobile reader within a Tor-compatible browser and not from a locally installed RSS app. Also access the microblog via a browser. Using the browser interfaces means that the electrical energy cost of periodically checking and updating feeds is taken by the server and not by the mobile device itself.
281
 </p>
278
 </p>
283
 <p>
280
 <p>
284
 If you have Syncthing installed then change the settings so that it only syncs when charging and when on wifi. Avoid any apps which might be continuously polling and preventing the device from going into sleep mode when it's not used.
281
 If you have Syncthing installed then change the settings so that it only syncs when charging and when on wifi. Avoid any apps which might be continuously polling and preventing the device from going into sleep mode when it's not used.
285
 </p>
282
 </p>
283
+
284
+<center>
285
+Return to the <a href="index.html">home page</a>
286
+</center>
286
 </div>
287
 </div>
287
 </div>
288
 </div>
288
 </div>
289
 </div>