diff --git a/content/posts/e2ee/index.md b/content/posts/e2ee/index.md
index d8d3edd..29fe7d9 100644
--- a/content/posts/e2ee/index.md
+++ b/content/posts/e2ee/index.md
@@ -64,22 +64,21 @@ Any Cwtch user can turn the app on their phone or computer into an untrusted ser
Compare the hash of the file with what is listed on the download page
-As per our Tails Best Practices, personal data should be stored on a second LUKS USB, not on the Tails Persistent Storage. Copy the file to such a personal data LUKS USB and extract it with the file manager (right click, select "Extract Here"). We will not be using the Additional Software Persistent Storage feature - Cwtch is an AppImage so doesn't require it.
+As per our Tails Best Practices, personal data should be stored on a second LUKS USB, and the Persistent Storage is not enabled. Extract the file with the file manager (right click, select "Extract Here"), then copy the folder cwtch
to such a personal data LUKS USB.
+- OPTIONAL - If you do enable Persistent Storage: with Persistent Storage unlocked, in Terminal run
sudo sed -i '$ a /home/amnesia/.cwtch source=cwtch' /live/persistence/TailsData_unlocked/persistence.conf && sudo sed -i '$ a /home/amnesia/.local source=cwtch_install' /live/persistence/TailsData_unlocked/persistence.conf
then reboot Tails for the changes to take effect, again with an Adminstration Password.
+
+
Run the install script
-- In the File Manager, enter to directory you just created,
cwtch
. Right click in the File Manager and select "Open a Terminal Here"
-- Run
install-tails.sh
+- In the File Manager, enter the directory you just created,
cwtch
. Right click in the File Manager and select "Open a Terminal Here"
+- Run
install-tails.sh
and enter the Administration Password when prompted.
As the documentation specifies, "When launching, Cwtch on Tails should be passed the CWTCH_TAILS=true environment variable". In the Terminal, run:
exec env CWTCH_TAILS=true LD_LIBRARY_PATH=~/.local/lib/cwtch/:~/.local/lib/cwtch/Tor ~/.local/lib/cwtch/cwtch
-How you use Cwtch depends on whether you have enabled Persistent Storage:
-- With Persistent Storage disabled, Cwtch must be re-installed every session you need to use it. Backup
`/home/amnesia/.cwtch/`
to the personal data LUKS USB, and copy it back into /home/amnesia/
the next time you install Cwtch.
-- With Persistent Storage enabled and unlocked, in Terminal run
sudo sed -i '$ a /home/amnesia/.cwtch source=cwtch' /live/persistence/TailsData_unlocked/persistence.conf
-
-
-Updates must be made manually - back up your profile first.
+With Persistent Storage disabled, Cwtch must be re-installed every session you need to use it. Backup `/home/amnesia/.cwtch/`
to the personal data LUKS USB, and copy it back into /home/amnesia/
the next time you install Cwtch.
+Updates to new versions must be made manually - back up your profile first.
@@ -175,7 +174,7 @@ https_proxy = 127.0.0.1:8082
* **Peer-to-peer**: No
* **Tor**: Not default
-Element is the name of the application (the client), and Matrix is the name of the network. A comparison to email may be helpful to understand it; Element is the equivalent of Thunderbird, whereas Matrix is the equivalent of the Simple Mail Transfer Protocol (SMTP) which underlies email. Element/Matrix is not peer-to-peer; you need to trust the server. However, unlike Signal, the servers are not centralized but rather federated - anyone can host their own. Unfortunately, the 'federation model' has the trade off that Matrix does [not have metadata protection](https://web.archive.org/web/https://serpentsec.1337.cx/matrix): "Federated networks are naturally more vulnerable to metadata leaks than peer-to-peer or centralized networks". To minimize this, see [Notes on the safe use of the Matrix service from Systemli](https://wiki.systemli.org/howto/matrix/privacy).
+Element is the name of the application (the client), and Matrix is the name of the network. A comparison to email may be helpful to understand it; Element is the equivalent of Thunderbird, whereas Matrix is the equivalent of the Simple Mail Transfer Protocol (SMTP) which underlies email. Element/Matrix is not peer-to-peer; you need to trust the server. However, unlike Signal, the servers are not centralized but rather federated - anyone can host their own. Unfortunately, the 'federation model' has the trade off that Matrix does [not have metadata protection](https://web.archive.org/web/https://serpentsec.1337.cx/matrix): "Federated networks are naturally more vulnerable to metadata leaks than peer-to-peer or centralized networks". To minimize this, see [Notes on the safe use of the Matrix service from Systemli](https://wiki.systemli.org/en/howto/matrix/privacy).
Element will work with Tor if it is used on an operating system that forces it; such as Whonix or Tails.
diff --git a/content/posts/tails-best/index.md b/content/posts/tails-best/index.md
index c43a185..6858b53 100644
--- a/content/posts/tails-best/index.md
+++ b/content/posts/tails-best/index.md
@@ -4,7 +4,7 @@ date=2023-04-08
[taxonomies]
categories = ["Defensive"]
-tags = ["best practice", "linux", "tails", "easy"]
+tags = ["linux", "tails", "easy"]
[extra]
blogimage="/images/tails1.png"
@@ -138,7 +138,7 @@ Another reason to not use Persistent Storage features is that many of them persi
>In the terminology used by KeePassXC, a [*password*](/glossary/#password) is a randomized sequence of characters (letters, numbers and other symbols), whereas a [*passphrase*](/glossary/#passphrase) is a random series of words.
-Never reuse a password/passphrase for multiple things ("password recycling") - KeePassXC makes it easy to save unique ones that are dedicated to one purpose. [LUKS](/glossary/#luks) encryption **is only effective when the device is powered down** - when the device is on, the password can be retrieved from memory. Any encryption can be [brute-force attacked](/glossary#brute-force-attack) with [massive amounts of cloud computing](https://blog.elcomsoft.com/2020/08/breaking-luks-encryption/). The newer version of LUKS (LUKS2 using Argon2id) is [less vulnerable to brute-force attacks](https://mjg59.dreamwidth.org/66429.html); this is the default from [Tails 5.13](https://tails.boum.org/security/argon2id/index.en.html) onwards, and Qubes OS 4.1 onwards. If you'd like to learn more about this change, we recommend [Systemli's overview](https://www.systemli.org/en/2023/04/30/is-linux-hard-disk-encryption-hacked/).
+Never reuse a password/passphrase for multiple things ("password recycling") - KeePassXC makes it easy to save unique ones that are dedicated to one purpose. [LUKS](/glossary/#luks) encryption **is only effective when the device is powered down** - when the device is on, the password can be retrieved from memory. Any encryption can be [brute-force attacked](/glossary#brute-force-attack) with [massive amounts of cloud computing](https://blog.elcomsoft.com/2020/08/breaking-luks-encryption/). The newer version of LUKS (LUKS2 using Argon2id) is [less vulnerable to brute-force attacks](https://mjg59.dreamwidth.org/66429.html); this is the default from Tails 6.0 ([forthcoming](https://gitlab.tails.boum.org/tails/tails/-/issues/19733)) onwards, and Qubes OS 4.1 onwards. If you'd like to learn more about this change, we recommend [Systemli's overview](https://www.systemli.org/en/2023/04/30/is-linux-hard-disk-encryption-hacked/).
Password strength is measured in "[bits of entropy](https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength)". Your passwords/passphrases should ideally have an entropy of around 128 bits (diceware passphrases of approximately **ten words**, or passwords of **21 random characters**, including uppercase, lowercase, numbers and symbols) and shouldn't have less than 90 bits of entropy (approximately seven words).
diff --git a/themes/DeepThought/templates/categories/list.html b/themes/DeepThought/templates/categories/list.html
index c78c7b0..2671db5 100644
--- a/themes/DeepThought/templates/categories/list.html
+++ b/themes/DeepThought/templates/categories/list.html
@@ -13,7 +13,7 @@
{{ terms | length }} categories in total
{% for category in terms %}
-
+
diff --git a/themes/DeepThought/templates/tags/list.html b/themes/DeepThought/templates/tags/list.html
index 4100e8d..74780a8 100644
--- a/themes/DeepThought/templates/tags/list.html
+++ b/themes/DeepThought/templates/tags/list.html
@@ -13,7 +13,7 @@
{{ terms | length }} tags in total
{% for tag in terms %}
-
+