resolve TODOs, remove SVGs, various updates
|
@ -14,11 +14,13 @@ Several different options are available for [end-to-end encrypted](/glossary/#en
|
|||
<!-- more -->
|
||||
There are some concepts that need to be understood before going further, in order to distinguish the various options.
|
||||
* **End-to-end encryption** means that only you, and the person you communicate with, can read messages. However, not all [encryption](/glossary/#encryption) is created equal. The quality of the encryption is determined by the *encryption protocol* that is used, and how it is implemented at the software level.
|
||||
* **Metadata protection** means whether the [*metadata*](/glossary/#metadata) (the data about the data) about the communication is obscured. Even if the message itself is encrypted, metadata can reveal who is communicating with whom, when, how often, the sizes of whatever files may have been transferred, etc. Metadata exposure is [a major concern](https://docs.openprivacy.ca/cwtch-security-handbook/risk.html#threat-model).
|
||||
* **Metadata protection** means whether the [*metadata*](/glossary/#metadata) (the data about the data) about the communication is obscured. Even if the message itself is encrypted, metadata can reveal who is communicating with whom, when, how often, the sizes of whatever files may have been transferred, etc. Metadata exposure is [a major concern](https://docs.cwtch.im/security/risk#threat-model).
|
||||
* **Peer-to-peer** means that there is no centralized server that you need to trust.
|
||||
* **Tor** is an [anonymity network](/glossary/#tor-network), and some applications route your messages through it by default.
|
||||
|
||||
For a longer form look at these different considerations, we recommend [The Guide to Peer-to-Peer, Encryption, and Tor: New Communication Infrastructure for Anarchists](https://www.csrc.link/#the-guide-to-peer-to-peer-encryption-and-tor). This text criticizes Signal for not being peer-to-peer and not using Tor by default, and goes on to compare Signal, Cwtch, and Briar. The following options for encrypted messaging are listed from most metadata protection to least.
|
||||
For a longer form look at these different considerations, we recommend [The Guide to Peer-to-Peer, Encryption, and Tor: New Communication Infrastructure for Anarchists](https://www.csrc.link/#the-guide-to-peer-to-peer-encryption-and-tor). This text criticizes Signal for not being peer-to-peer and not using Tor by default, and goes on to compare Signal, Cwtch, and Briar.
|
||||
|
||||
The following options for encrypted messaging are listed from most metadata protection to least.
|
||||
|
||||
<br>
|
||||
|
||||
|
@ -33,7 +35,7 @@ For a longer form look at these different considerations, we recommend [The Guid
|
|||
* **Peer-to-peer**: Yes
|
||||
* **Tor**: Yes
|
||||
|
||||
Cwtch is our preference, by a long shot. It is currently in transition from [beta to stable versions](https://docs.cwtch.im/blog/path-to-cwtch-stable). For an overview of how Cwtch works, see their [video explainer](https://cwtch.im/#how-it-works). The [Cwtch Handbook](https://docs.cwtch.im/) will tell you everything you need to know for using it. Cwtch is designed with metadata protection in mind; it is peer-to-peer, uses the Tor network as a shield and stores everything locally on-device, encrypted.
|
||||
Cwtch is our preference, by a long shot. It is currently in transition from [beta to stable versions](https://docs.cwtch.im/blog/path-to-cwtch-stable). For an overview of how Cwtch works, watch the video above. The [Cwtch Handbook](https://docs.cwtch.im/) will tell you everything you need to know for using it. Cwtch is designed with metadata protection in mind; it is peer-to-peer, uses the Tor network as a shield and stores everything locally on-device, encrypted.
|
||||
|
||||
Like all peer-to-peer communication, Cwtch requires *synchronous* communication, meaning that both peers are online simultaneously. However, their server feature allows *asynchronous* communication as well by providing offline delivery:
|
||||
|
||||
|
|
|
@ -65,31 +65,31 @@ They still make MP3 players! For a way cheaper price, you can play music and pod
|
|||
# Appendix: Against the Smartphone
|
||||
*From [Fernweh (#24)](https://fernweh.noblogs.org/texte/24-ausgabe/gegen-das-smartphone/)*
|
||||
|
||||
It's ubiquitous, it's always on, no matter where we are or what we're doing. It informs us about everything and everyone: what our friends are doing, when the next subway leaves and what the weather will be tomorrow. It cares about us, wakes us up in the morning, reminds us of important appointments and listens to us all the time. It knows everything about us, when we go to bed, where and when we stop, who we communicate with, who our best friends are, what music we listen to and what our favorite pastimes are. And all it needs is a little electricity from time to time?
|
||||
It's always with us, it's always on, no matter where we are or what we're doing. It informs us about everything and everyone: what our friends are doing, when the next subway leaves and what the weather will be like tomorrow. It takes cares of us, wakes us up in the morning, reminds us of important appointments and always listens to us. It knows everything about us, when we go to bed, where we are and when, who we communicate with, who our best friends are, what music we listen to and what our hobbies are. And all it asks for is a little electricity now and then?
|
||||
|
||||
When I stroll through the neighborhood or take the subway, I observe almost everyone and no one lasts more than a few seconds without putting their hand in their pocket with a sudden gesture: quickly the cell phone is out, a message is sent, an email is checked, a photo is liked. It is put away again, a short break, and here we go again, skimming over the news of the day and looking at what all the friends are doing...
|
||||
When I stroll through an area or take the subway, I see it with almost everyone and no one can last more than a few seconds without frantically reaching for their pocket: the cellphone whipped out, a message sent, an email checked, a photo liked. It is put away again, a short break, and here we go again, skimming over today's news and looking at what all the friends are doing...
|
||||
|
||||
It's our companion when we're on the toilet, at work or at school, and it apparently helps against boredom while we're waiting or working, etc. Perhaps this is one of the reasons for the success of all these technological devices that surround us, that real life is so damn boring and monotonous that a screen of a few square centimeters is almost always more exciting than the world and the people around us. Is it like an addiction (at least there are people who have withdrawal syndromes...) or is it even already part of our bodies, without it not knowing how to orientate ourselves, and feeling that we are missing something? It has even become more than an aid or a toy but a part of us that also exerts a certain control over us, to which we adapt, for example through the fact that we leave our home only once after having fully charged the battery? The smartphone as a first step to blur the differences between human and robot? When we see what technocrats of all kinds are prophesying to us (Google Glasses, implanted chips, etc.), it seems that we are almost on the way to becoming Cyborgs, people with implanted smartphones that we control by our thoughts (until our thoughts are eventually controlled themselves one day). That the spokesmen of domination, the media, only show us the positive aspects of this development is not surprising, but it is shocking that hardly anyone questions this view, not even on principle. This is probably the most exciting dream for all domination: to be able to surveil everyone's thoughts and actions all the time and to intervene immediately at any disturbance. To allow the good workers to have a little (virtual) fun as a reward while a few fill their pockets.
|
||||
It's our companion when we're on the toilet, at work or at school, and it apparently helps to fight boredom while we're waiting or working, etc. Is this perhaps one of the reasons for the success of all these technological devices, that real life is so damn boring and monotonous that a screen of a few square centimeters is almost always more exciting than the world and the people around us? Is it like an addiction (people definitely have withdrawal symptoms...) or has it even become part of our bodies? Without it we no longer know how to orientate ourselves, and feel that something is missing? So it no longer just an aid or a toy but a part of us that also exerts a certain control over us, to which we adapt, for example by not leaving the house until the battery is fully charged? The smartphone as a first step in blurring the line between human and robot?
|
||||
|
||||
Social control and surveillance has also reached a whole new level with the huge amounts of data that are so easily available to everyone and everything at any time of day. This now goes far beyond tapping cell phones or sifting through messages (like during the 2011 London riots). By having access to an incredible amount of information, intelligence agencies are able to define a status that is "normal." They can tell which places we stay are "normal," which contacts are "normal," etc. In short, they can establish immediately and in almost real time whether people are deviating from their "normal" way of acting. This gives enormous power to some people, which will be used whenever there is an opportunity to take advantage of this power (i.e. to surveil people). Technology is part of power, it results from it and needs it. It requires a world where people have a lot of power in order to make it possible to produce something like the smartphone. All technology is a product of the current oppressive world, is part of it and will reinforce it.
|
||||
When we see what technocrats of all kinds are prophesying (Google Glasses, implanted chips, etc.), it almost seems as if we are heading towards becoming Cyborgs, people with implanted smartphones that we control through our thoughts (until our thoughts themselves are eventually controlled). It is not surpising that the spokesmen of domination, the media, only show us the positive aspects of this development, but it is shocking that virtually no one questions this view. This is probably the wildest dream of any ruler: to be able to monitor everyone's thoughts and actions at all times and to be able to intervene immediately in the event of any disturbance. Completely controlled and monitored worker bees, who are allowed to have a little (virtual) fun as a reward while a few profit.
|
||||
|
||||
Nothing is neutral in today's world, everything that is or has been developed so far serves both to extend control and to make money. Many of the innovations of the last decades (like GPS, nuclear power or the internet) even come directly from the military.
|
||||
With the vast amounts of data now so readily available from anyone and everyone at any time of day, social control and surveillance has also reached a whole new level. This now goes far beyond tapping cell phones or sifting through messages (like during the 2011 UK riots). By having access to an incredible amount of information, intelligence agencies are able to define a status that is "normal." They can tell which locations are "normal" for us, which contacts are "normal," etc. In short, they can establish immediately and in almost real time whether people are deviating from their "normal" behaviour. This gives enormous power to some people, which will be used whenever there is an opportunity to take advantage of this power (i.e. to surveil people). Technology is part of power, it emerges from it and needs it. It takes a world where people have extreme power in order to enable the production of something like the smartphone in the first place. All technology is a product of the current oppressive world, is part of it and will reinforce it.
|
||||
|
||||
Most of the time, these two aspects go hand in hand, but the "welfare of humanity" is surely not a reason to develop anything, and especially not when it is developed by the military.
|
||||
Nothing is neutral in today's world. To date, everything that has been or is being developed serves both to extend control and to make money. Many of the innovations of the last decades (like GPS, nuclear power or the internet) even come directly from the military. Most of the time, these two aspects go hand in hand, but the "welfare of humanity" is surely not a motivation, and especially not if it is developed by the military.
|
||||
|
||||
It is possible that by taking the example of architecture this better illustrates something as complex as technology: let's take an empty and disused prison, what should be done with this building, if not demolish it? Its architecture alone, its walls, its watchtowers and its cells already contain the purpose of this building: to lock people up and destroy them psychologically. To live there would be impossible for me, simply because the building already carries the oppression in it.
|
||||
It is possible that by taking the example of architecture this better illustrates something as complex as technology: let's take an empty and disused prison, what should be done with this structure except tear it down? Its architecture alone, its walls, its watchtowers and its cells already contain the purpose of this building: to lock people up and destroy them psychologically. It would be impossible for me to live there, simply because the building already carries oppression within it.
|
||||
|
||||
It is the same with all technologies, which are presented to us as progress and something that makes life easier. They have been developed with the intention of making money and controlling us and will always carry that. No matter how many supposed benefits your smartphone brings you, those who get rich by collecting your data and monitoring you will always benefit more than you.
|
||||
It is the same with all technologies today which are presented to us as progress and something that makes life easier. They have been developed with the intention of making money and controlling us and will always carry that. No matter how many supposed benefits your smartphone brings you, those who get rich by collecting your data and monitoring you will always benefit more than you.
|
||||
|
||||
If in the past it was said "knowledge is power", today it should be said "information is power". The more the rulers know about their sheep, the more they can dominate them - in this sense, technology as a whole is a powerful instrument of control to predict and indeed prevent people from finding each other and attacking what oppresses them.
|
||||
If in the past it was said "knowledge is power", today it should be said "information is power". The more the rulers know about their flocks, the better they can dominate them - in this sense, technology as a whole is a powerful instrument of control to predict and thereby prevent people from coming together to attack what oppresses them.
|
||||
|
||||
These smartphones seem after all to require a little more than just a little electricity... In our generation, which at least knew the world without smartphones, there are maybe still some people who understand what I'm talking about, who still know what it's like to hold a discussion without looking at your cell phone every thirty seconds, to get lost while walking around and thus discover new places or to debate about something without being immediately given the answer by Google. But I don't want to go back to the past, even if it wouldn't be possible anyway, but the more technology interferes in our lives, the harder it will be to destroy it. What if we were one of the last generations still able to stop this evolution of human beings becoming completely controlled robots?
|
||||
These smartphones seem to require a bit more than just a little electricity... In our generation, which at least still knew a world without smartphones, there are maybe still some people who understand what I'm talking about, who still know what it's like to hold a discussion without looking at their cellphone every thirty seconds, to get lost and thus discover new places or to debate about something without immediately asking Google for the answer. But I don't want to go back to the past, even if it wouldn't be possible anyway, but the more technology penetrates our lives, the harder it becomes to destroy it. What if we are one of the last generations still able to stop this evolution of human beings becoming completely controlled robots?
|
||||
|
||||
And what if, sooner or later, we could no longer reverse this evolution? In view of history, humanity has reached a new stage with technology. A stage where it is able to annihilate all human life (atomic energy) or to modify it (genetic manipulation). This fact underlines once again the need to act today to destroy this society. To do this, we need to encounter other people and communicate our ideas.
|
||||
And what if at some point we could no longer reverse this development? Humanity has reached a historically new stage with technology. A stage where it is able to annihilate all human life (nuclear energy) or to modify it (genetic manipulation). This fact underlines once again the need to act today to destroy this society. To do this, we need to encounter other people and communicate our ideas.
|
||||
|
||||
However, it should be obvious that it will have long term effects if, instead of talking to each other, we communicate in messages of five sentences maximum. This is apparently not the case. First of all, our thinking influences our speaking. And the reverse is also true: just as our way of speaking and communicating influences our way of thinking. If we are only able to exchange the shortest and most concise messages possible, how can we talk about a totally different world? And if we can't even talk about a different world anymore, how can we reach for it?
|
||||
Isn't it obvious that it will have a long term impact if, instead of talking to each other, we only communicate in messages of no more than five sentences. Apparently not. First of all, our way of thinking influences our way of speaking, and the reverse is also true - our way of speaking and communicating influences our way of thinking. If we are only able to exchange the shortest and most concise messages possible, how can we talk about a totally different world? And if we can't even talk about a different world anymore, how can we reach for it?
|
||||
|
||||
Direct communication between autonomous individuals is the basis of any common rebellion, it is the starting point of shared dreams and common struggles. Without unmediated communication, a struggle against this world and for freedom is impossible.
|
||||
Direct communication between autonomous individuals is the basis of any shared rebellion, it is the starting point of shared dreams and common struggles. Without unmediated communication, a struggle against this world and for freedom is impossible.
|
||||
|
||||
Therefore, let's get rid of the smartphones and meet face to face in an insurgency against this world! Let's become uncontrollable!
|
||||
|
||||
|
|
BIN
content/posts/tails-best/identity.png
Normal file
After Width: | Height: | Size: 27 KiB |
Before Width: | Height: | Size: 20 KiB |
|
@ -23,7 +23,7 @@ Let's start by looking at the [Tails Warnings page](https://tails.boum.org/doc/a
|
|||
|
||||
#### Protecting your identity when using Tails
|
||||
|
||||

|
||||

|
||||
|
||||
> Tails is designed to hide your identity. But some of your activities could reveal your identity:
|
||||
> 1. Sharing files with [metadata](/glossary#metadata), such as date, time, location, and device information
|
||||
|
@ -39,7 +39,7 @@ The second issue can be mitigated by what's called **'compartmentalization'**:
|
|||
|
||||
#### Limitations of the [Tor network](/glossary#tor-network)
|
||||
|
||||

|
||||

|
||||
|
||||
> Tails uses the Tor network because it is the strongest and most popular network to protect from surveillance and censorship. But Tor has limitations if you are concerned about:
|
||||
> 1. Hiding that you are using Tor and Tails
|
||||
|
@ -59,7 +59,7 @@ The second issue is mitigated by **not using an Internet connection that could d
|
|||
|
||||
#### Reducing risks when using untrusted computers
|
||||
|
||||

|
||||

|
||||
|
||||
> Tails can safely run on a computer that has a virus. But Tails cannot always protect you when:
|
||||
> 1. Installing from an infected computer
|
||||
|
@ -120,7 +120,7 @@ On a USB with a write-protect switch, you will not be able to make any changes t
|
|||
|
||||
Where can we store personal data for use between Tails sessions, if the write-protect switch prevents us from using Persistent Storage? We recommend storing personal data on a second LUKS USB. This 'personal data' USB should not look identical to your Tails USB, to avoid confusing them. To make this separate USB, see [Creating and using LUKS encrypted volumes](https://tails.boum.org/doc/encryption_and_privacy/encrypted_volumes/index.en.html). If you happen to be reading this from a country like the UK where not providing encryption passwords can land you in jail, this second drive should be a HDD containing a [Veracrypt Hidden Volume](https://www.veracrypt.fr/en/Hidden%20Volume.html) (SDD and USB drives are not appropriate for Hidden Volumes).
|
||||
|
||||
![diagram-tailsusb-2projectusbs]
|
||||

|
||||
|
||||
Compartmentalization is an approach that cleanly separates different identities - in Tails session #1 you do activities related to moderating a website, and in Tails session #2 you do activities related to research for an action. This approach also comes into play for your 'personal data' USBs. If the files that you save could be used to link your activities together, use a different 'personal data' USB for each activity. For a 'personal data' USB that stores very sensitive files (like the text of a communique), once you no longer need the files it is best to reformat then destroy the USB (see [Really delete data from a USB drive](/posts/tails/#really-delete-data-from-a-usb)). This is another reason to use a separate USB for any files that need to be saved - you don't accumulate the forensic history of all of your files on your Tails Persistent Storage, and can simply destroy USBs as needed.
|
||||
|
||||
|
@ -142,6 +142,7 @@ Never reuse a password/passphrase for multiple things ("password recycling") - K
|
|||
|
||||
Password strength is measured in "[bits of entropy](https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength)". Your passwords/passphrases should ideally have an entropy of around 128 bits (diceware passphrases of approximately **ten words**, or passwords of **21 random characters**, including uppercase, lowercase, numbers and symbols) and shouldn't have less than 90 bits of entropy (approximately seven words).
|
||||
|
||||

|
||||
|
||||
What is a diceware passphrase? As [Privacy Guides notes](https://www.privacyguides.org/en/basics/passwords-overview/#diceware-passphrases), "Diceware passphrases are a great option when you need to memorize or manually input your credentials, such as for your password manager's master password or your device's encryption password. An example of a diceware passphrase is `viewable fastness reluctant squishy seventeen shown pencil`." The Password Generator feature in KeePassXC can generate diceware passphrases and random passwords. If you prefer to generate diceware passphrases using real dice, see [Privacy Guides](https://www.privacyguides.org/en/basics/passwords-overview/#diceware-passphrases).
|
||||
|
||||
|
|
BIN
content/posts/tails-best/luks.png
Normal file
After Width: | Height: | Size: 177 KiB |
BIN
content/posts/tails-best/passphrase.png
Normal file
After Width: | Height: | Size: 23 KiB |
BIN
content/posts/tails-best/tor.png
Normal file
After Width: | Height: | Size: 42 KiB |
Before Width: | Height: | Size: 26 KiB |
BIN
content/posts/tails-best/warning_compromisedpc.png
Normal file
After Width: | Height: | Size: 39 KiB |
|
@ -1 +0,0 @@
|
|||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 600 350"><defs><style>.cls-1{fill:#58595b;}.cls-2{fill:#ffd500;}.cls-3{opacity:0.44;}.cls-4{fill:#9c6bad;}.cls-5{fill:#363436;}.cls-6{fill:#a0a2a5;}.cls-7{fill:#dadbdc;}</style></defs><title>warning_compromisedpc</title><g id="Layer_3" data-name="Layer 3"><path class="cls-1" d="M415.3,338.94a8.93,8.93,0,0,1-4.19-1l-222-117.31a9,9,0,1,1,8.41-15.91l222,117.3a9,9,0,0,1-4.22,17Z"/><path class="cls-2" d="M21.36,206l10.5,26.25,9.88-37.68L55.64,224l17.29-39,20.25,30.58L118,174.53,141.79,206l13.85-37.95,23.88,35.56,13.95-2,10.79-.82,13.22-38.29,25,36.08,17.71-36.51,17.29,35.48L304.3,160l21.54,37.11,20.69-35.51,24.08,37.06,16.06-36.13,25.63,39.83,21.93-33.66,24.08,36.44,17-31.19L504,215l17.6-28.72L535.51,220l6.9-31.29,11.32,40.45L566.09,198l9.57,41.69,11.89-29.84,5.88,45.93v22.49l-.08.59c-3.1-33.89-133.09-61.15-293-61.15-161.87,0-293.1,27.93-293.1,62.38V259.74Z"/><g class="cls-3"><path class="cls-4" d="M21.36,206l10.5,26.25,9.88-37.68L55.64,224l17.29-39,20.25,30.58L118,174.53,141.79,206l13.85-37.95,23.88,35.56,13.95-2,10.79-.82,13.22-38.29,25,36.08,17.71-36.51,17.29,35.48L304.3,160l21.54,37.11,20.69-35.51,24.08,37.06,16.06-36.13,25.63,39.83,21.93-33.66,24.08,36.44,17-31.19L504,215l17.6-28.72L535.51,220l6.9-31.29,11.32,40.45L566.09,198l9.57,41.69,11.89-29.84,5.88,45.93v22.49l-.08.59c-3.1-33.89-133.09-61.15-293-61.15-161.87,0-293.1,27.93-293.1,62.38V259.74Z"/></g><polygon class="cls-5" points="286.19 321.21 486.36 298.31 485.92 288.99 94.13 224.35 94.56 233.67 286.19 321.21"/><polygon class="cls-6" points="285.76 311.88 485.92 288.99 294.3 201.45 94.13 224.35 285.76 311.88"/><polygon class="cls-1" points="294.3 201.45 485.92 288.99 514.47 103.49 322.31 17.14 294.3 201.45"/><polygon class="cls-5" points="302.54 197.82 479.82 278.8 506.22 107.21 328.46 27.32 302.54 197.82"/><path class="cls-7" d="M220.74,277.18l-.13-.06-55-25.12,61.44-7.42.13.06,55,25.12Zm-51.49-24.62,51.64,23.59,57.64-6.95-51.64-23.59Z"/><path class="cls-7" d="M353.19,297.92l-.13-.05-170.74-78L295.25,207.5l.12.06,170.75,78ZM186,220.47,353.35,296.9,462.4,285,295.08,208.52Z"/><path class="cls-2" d="M7.24,224V228l5.88,45.94,7.52-31.2,6.28,41.22L38.47,252l10.2,41.35L58.8,259.34l11,40.6L86,267.27l11.53,39.32,24.29-33.35,30.47,42L177,275.11l40.48,46.31,20-46.31,37.06,47.13,22.64-43.4,38.29,41.75,28.41-49.3,27.13,49.11,2.52-.22L424,316.89l19.39-49.5,32.49,43.05,17.29-47.9,20.59,41.17L530.68,258l22.23,35.82,11.53-46.11,15.23,32.37L593.43,224v56.09c0,18.89-52.34,62.39-293.09,62.39C35,342.48,7.24,301.14,7.24,280.09"/><g class="cls-3"><circle class="cls-4" cx="413.78" cy="329.85" r="5.87"/></g></g></svg>
|
Before Width: | Height: | Size: 2.6 KiB |
BIN
content/posts/tails/database.png
Normal file
After Width: | Height: | Size: 152 KiB |
BIN
content/posts/tails/desktop-label.png
Normal file
After Width: | Height: | Size: 254 KiB |
BIN
content/posts/tails/entry.png
Normal file
After Width: | Height: | Size: 160 KiB |
|
@ -110,9 +110,7 @@ In the Welcome Screen, select your language and keyboard layout in the **Languag
|
|||
|
||||
When you have enabled Persistent Storage, the passphrase to unlock it will appear in this window. If you haven't enabled Persistent Storage, no data will persist on your Tails USB beyond this session. Click **Start Tails**. After 15 to 30 seconds, the Tails desktop appears."
|
||||
|
||||

|
||||
|
||||
TODO label / update
|
||||

|
||||
|
||||
#### Using the Tails desktop
|
||||
|
||||
|
@ -138,17 +136,26 @@ The principle is to create a second storage area (called a partition) on your Ta
|
|||
|
||||
A window opens where you have to type a passphrase; see [Tails Best Practices](/posts/tails-best/#passwords) for notes on passphrase strength. You'll then [configure](https://tails.boum.org/doc/persistent_storage/configure/index.en.html) what you need to keep in Persistent Storage. Persistent Storage can be enabled for several types of data:
|
||||
|
||||
**Personal Documents:**
|
||||
* **Persistent Folder**: Data such as your personal files, documents, or images that you're working on can be saved in the Persistent Storage on the Tails USB.
|
||||
|
||||
**System Settings:**
|
||||
* **Welcome Screen**: Settings from the Welcome Screen can be saved in the Persistent Storage: language, keyboard, and additional settings.
|
||||
* **Printers**: [Printer configuration](https://tails.boum.org/doc/sensitive_documents/printing_and_scanning/index.en.html) can be saved in the Persistent Storage.
|
||||
|
||||
**Network:**
|
||||
* **Network Connections**: The passwords for Wi-Fi networks can be saved in the Persistent Storage, so you don't have to type them every time.
|
||||
* **Tor Bridge**: When the Tor Bridge feature is turned on (for users in countries that censor Tor), the last Tor Bridge that you used is saved in the Persistent Storage.
|
||||
|
||||
**Applications:**
|
||||
* **Tor Browser Bookmarks**: Tor Browser bookmarks can be saved in the Persistent Storage.
|
||||
* **Electrum Bitcoin Wallet**: The bitcoin wallet and preferences can be saved in the Persistent Storage.
|
||||
* **Thunderbird Email Client**: The email inbox, feeds, and OpenPGP keys of Thunderbird can be saved in the Persistent Storage.
|
||||
* **GnuPG**: The OpenPGP keys that you create or import into GnuPG and Kleopatra can be saved in the Persistent Storage.
|
||||
* **Pidgin**: The account files of this chat application (using the XMPP protocol) can be saved in the Persistent Storage.
|
||||
* **SSH Client**: SSH is used to connect to servers. All files related to SSH can be saved in the Persistent Storage.
|
||||
|
||||
**Advanced Settings:**
|
||||
* **Additional Software**: With this feature enabled, a list of additional software of your choice is automatically installed every time you start Tails. The corresponding software packages are stored in the Persistent Storage. They are automatically upgraded after a network connection is established. [Be careful with what you install](https://tails.boum.org/doc/persistent_storage/additional_software/index.en.html#warning).
|
||||
* **Dotfiles**: On Tails and Linux in general, the name of configuration files often starts with a dot and are sometimes called "dotfiles" for this reason. These can be saved in the Persistent Storage. Be careful about what configuration settings you change, because altering default settings can break your anonymity.
|
||||
|
||||
|
@ -266,17 +273,22 @@ Tails includes [many applications](https://tails.boum.org/doc/about/features/ind
|
|||
#### Password Manager (KeePassXC)
|
||||
If you're going to need to know a lot of passwords, it can be nice to have a secure way to store them (i.e. not a piece of paper next to your computer). KeePassXC is a password manager included in Tails (Application ▸ Favorites ▸ KeePassXC). In the terminology used by KeePassXC, a password is a randomized sequence of characters (letters, numbers, and other symbols), whereas a passphrase is a random series of words.
|
||||
|
||||

|
||||
|
||||
When you [create a new KeePassXC database](https://tails.boum.org/doc/encryption_and_privacy/manage_passwords/index.en.html#index1h1), in the **Encryption settings** window, increase the **Decryption time** from the default to the maximum (5 seconds). Then, select a [strong passphrase](/posts/tails-best/#passwords) and then save your KeePassXC file. This file will contain all your passwords/passphrases, and needs to persist between sessions on your Persistent Storage or on a second LUKS-encrypted USB as described in [Tails Best Practices](/posts/tails-best/#using-a-write-protect-switch). The decryption time setting of a pre-existing KeePassXC file can be updated: Database > Database Security > Encryption Settings.
|
||||
|
||||
As soon as you close KeePassXC, or if you don't use it for a few minutes, it will lock. Be careful not to forget your main passphrase. We recommend against using the auto-fill feature, because it is easy to fill your password into the wrong window by mistake.
|
||||
|
||||
![diagram]TODO
|
||||

|
||||
|
||||
* Right-click on the Root to organize groups
|
||||
* Create a new entry
|
||||
* Copy the username
|
||||
* Copy the password
|
||||
* Here you can use the Password Generator
|
||||
1) Right-click on a folder to add sub-groups
|
||||
2) Create a new entry
|
||||
3) Copy the username
|
||||
4) Copy the password
|
||||
|
||||

|
||||
|
||||
5) Use the Password Generator when editing an entry
|
||||
|
||||
#### Really delete data from a USB
|
||||
|
||||
|
|
BIN
content/posts/tails/seconds.png
Normal file
After Width: | Height: | Size: 50 KiB |
|
@ -47,7 +47,7 @@ If you ever need to remove the nail polish to access the internal of the laptop,
|
|||
|
||||
Now that you understand the concept, you need a tamper-evident storage solution for all sensitive electronics when you are out of the house (laptops, external drives, USBs, phones, external keyboards, and mice). Safes are often used to protect valuable items, but they can be bypassed in several ways, and some of these bypasses are difficult to detect (see the [Appendix](#appendix-cracking-safes)). It is not trivial or inexpensive to make a safe tamper-evident, if it can be done at all.
|
||||
|
||||
TODO photo
|
||||

|
||||
|
||||
A better and cheaper solution is to implement the guide of [dys2p](https://dys2p.com/en/2021-12-tamper-evident-protection.html#kurzzeitige-lagerung):
|
||||
> When we need to leave a place and leave items or equipment behind, we can store them in a box that is transparent from all sides. Then we fill the box with our colorful mixture so that our devices are covered. The box should be stored in such a way that shocks or other factors do not change the mosaic. For example, the box can be positioned on a towel or piece of clothing on an object in such a way that this attenuates minor vibrations of the environment, but the box cannot slide off it.
|
||||
|
|
BIN
content/posts/tamper/linsen.jpg
Normal file
After Width: | Height: | Size: 86 KiB |