mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-18 03:29:30 -04:00
sirikali
This commit is contained in:
parent
6597d786ae
commit
8ae907510f
4 changed files with 13 additions and 13 deletions
|
@ -260,7 +260,7 @@ You should configure your non-Tor qubes to be forced through a reputable [VPN](/
|
||||||
|
|
||||||
>Using a reputable VPN provider can provide more privacy against surveillance from your ISP or government and prevent network injection attacks from those entities. A VPN will also make traffic correlation attacks — especially those targeting messaging apps — more difficult to perform and less effective.
|
>Using a reputable VPN provider can provide more privacy against surveillance from your ISP or government and prevent network injection attacks from those entities. A VPN will also make traffic correlation attacks — especially those targeting messaging apps — more difficult to perform and less effective.
|
||||||
|
|
||||||
There are guides for [the Mullvad app](https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/), [Mullvad without the app](https://forum.qubes-os.org/t/tutorial-4-2-4-1-mullvad-wireguard-with-qubes/21172), and [the IVPN app](https://forum.qubes-os.org/t/ivpn-app-4-2-setup-guide/23804).
|
There are guides for [the Mullvad app](https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/), [Mullvad without the app](https://forum.qubes-os.org/t/tutorial-4-2-4-1-mullvad-wireguard-with-qubes/21172), and [the IVPN app](https://forum.qubes-os.org/t/ivpn-app-4-2-setup-guide/23804). It is possible to buy a voucher card for [Mullvad](https://mullvad.net/en/blog/2022/9/16/mullvads-physical-voucher-cards-are-now-available-in-11-countries-on-amazon/) and [IVPN](https://www.ivpn.net/knowledgebase/billing/voucher-cards-faq/), which makes anonymously purchasing a subscription easier than using a cryptocurrency.
|
||||||
|
|
||||||
## Additional Settings
|
## Additional Settings
|
||||||
|
|
||||||
|
|
|
@ -43,11 +43,11 @@ You can mitigate this second issue by what's called **"compartmentalization"**:
|
||||||
* To prevent an adversary from linking your activities while using Tails, restart Tails between different activities. For example, restart Tails between checking different project emails.
|
* To prevent an adversary from linking your activities while using Tails, restart Tails between different activities. For example, restart Tails between checking different project emails.
|
||||||
* Tails is amnesiac by default, so to save any data from a Tails session, you must save it to a USB. If the files you save could be used to link your activities together, use a different encrypted ([LUKS](/glossary/#luks)) USB stick for each activity. For example, use one Tails USB stick for moderating a website and another for researching actions. Tails has a feature called Persistent Storage, but we do not recommend using it for data storage, which we explain [below](/posts/tails-best/#using-a-write-protect-switch).
|
* Tails is amnesiac by default, so to save any data from a Tails session, you must save it to a USB. If the files you save could be used to link your activities together, use a different encrypted ([LUKS](/glossary/#luks)) USB stick for each activity. For example, use one Tails USB stick for moderating a website and another for researching actions. Tails has a feature called Persistent Storage, but we do not recommend using it for data storage, which we explain [below](/posts/tails-best/#using-a-write-protect-switch).
|
||||||
|
|
||||||
# Limitations of the [Tor network](/glossary/#tor-network)
|
# Limitations of the Tor network
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
> Tails uses the Tor network because it is the strongest and most popular network to protect from surveillance and censorship. But Tor has limitations if you are concerned about:
|
> Tails uses the [Tor network](/glossary/#tor-network) because it is the strongest and most popular network to protect from surveillance and censorship. But Tor has limitations if you are concerned about:
|
||||||
>
|
>
|
||||||
> 1. Hiding that you are using Tor and Tails
|
> 1. Hiding that you are using Tor and Tails
|
||||||
> 2. Protecting your online communications from determined, skilled attackers
|
> 2. Protecting your online communications from determined, skilled attackers
|
||||||
|
@ -298,15 +298,15 @@ If you are using Persistent Storage, this is another passphrase that you will ha
|
||||||
|
|
||||||
[LUKS](/glossary/#luks) is great, but defense-in-depth can't hurt. If the police seize your USB in a house raid, they will try a [variety of tactics to bypass the authentication](https://notrace.how/threat-library/techniques/targeted-digital-surveillance/authentication-bypass.html), so a second layer of defense with a different encryption implementation can be useful for highly sensitive data.
|
[LUKS](/glossary/#luks) is great, but defense-in-depth can't hurt. If the police seize your USB in a house raid, they will try a [variety of tactics to bypass the authentication](https://notrace.how/threat-library/techniques/targeted-digital-surveillance/authentication-bypass.html), so a second layer of defense with a different encryption implementation can be useful for highly sensitive data.
|
||||||
|
|
||||||
Sirikali is an encrypted volume program that uses [Gocryptfs](https://nuetzlich.net/gocryptfs/) behind the scenes. It is [available in the Debian repository](https://packages.debian.org/bookworm/sirikali) and can be easily installed as [additional software](/posts/tails#installing-additional-software). Make sure to also install "suggested packages". If you don't want to reinstall Sirikali every session, you will need to [configure Additional Software in Persistent Storage](/posts/tails-best/#using-a-write-protect-switch). If you are comfortable on the [command line](/glossary/#command-line-interface-cli), you can use gocryptfs instead.
|
SiriKali is an encrypted volume program that uses [gocryptfs](https://nuetzlich.net/gocryptfs/) behind the scenes. It is [available in the Debian repository](https://packages.debian.org/bookworm/sirikali) and can be easily installed as [additional software](/posts/tails#installing-additional-software). Make sure to also install the "suggested package" gocryptfs. If you don't want to reinstall SiriKali every session, you will need to [configure Additional Software in Persistent Storage](/posts/tails-best/#using-a-write-protect-switch). If you are comfortable on the [command line](/glossary/#command-line-interface-cli), you can use gocryptfs instead.
|
||||||
|
|
||||||
The first time you use Sirikali, create a Gocryptfs volume; press "Create Volume", and select the option "Gocryptfs."
|
The first time you use SiriKali, create a gocryptfs volume. First, plyg in the "personal data" USB where you will store this encrypted volume and enter its LUKS passphrase. Then in SiriKali, press "Create Volume" and select the option "gocryptfs."
|
||||||
|
|
||||||
You will be prompted for a password. Create a new entry in your KeepassXC file and generate a password using the Generate Password feature (the dice icon). "Create volume" will create two new directories: the "cipher" directory (`/home/amnesia/example`) where the encrypted files are stored and the "plain" directory where you access your decrypted files once mounted there (`/home/amnesia/.SiriKali/example`)
|
You will be prompted for a password. Create a new entry in your KeepassXC file and generate a password using the Generate Password feature (the dice icon). For the "Volume Path" option, select the "personal data" USB that you just plugged in. Creating a volume will make two new directories: a "cipher" directory (on your "personal data" USB) where the encrypted files are actually stored and a "plain" directory where you access your decrypted files once the volume is mounted there (`/home/amnesia/.SiriKali/VolumeName`).
|
||||||
|
|
||||||
You will need to "mount" the volume every time you use it, which happens automatically when you first create it. You can now add files to your mounted encrypted volume: navigating to the "plain" directory requires selecting "Show Hidden Files" in the File Manager.
|
To decrypt the volume, click "Mount Volume", which happens automatically upon volume creation. You can now add files to your mounted volume: right-click the entry and select "Open folder". You can verify SiriKali is working by creating a test file here. This file will show up encrypted in the cipher directory.
|
||||||
|
|
||||||
When you unmount the volume, the plain directory will just be an empty folder again. Before storing important files in the volume, you should run a test to make sure it works as expected, especially if its your first time using it.
|
Before storing important files in the volume, you should run a test to make sure it works as expected, especially if its your first time using it.
|
||||||
|
|
||||||
## Encrypted Communication
|
## Encrypted Communication
|
||||||
|
|
||||||
|
|
|
@ -174,11 +174,11 @@ Every time you start Tails, right after you connect to the Tor network, the Tail
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### The [automatic upgrade](https://tails.net/doc/upgrade/index.en.html)
|
### The automatic upgrade
|
||||||
|
|
||||||
* A window will appear with information about the upgrade, and you will need to click **Upgrade now**. Wait a while for it to complete, then click 'Apply upgrade' and your internet will be interrupted for a moment. Wait until you see the Restart Tails window. If the upgrade fails (for example, because you shut down before it was finished), your Persistent Storage will not be affected, but you may not be able to restart your Tails USB. If you are using a USB with a write-protect switch, you will need to unlock it for the dedicated session in which you are performing the upgrade.
|
* When an [automatic upgrade](https://tails.net/doc/upgrade/index.en.html) is available, a window will appear with information about the upgrade, and you will need to click **Upgrade now**. Wait a while for it to complete, then click 'Apply upgrade' and your internet will be interrupted for a moment. Wait until you see the Restart Tails window. If the upgrade fails (for example, because you shut down before it was finished), your Persistent Storage will not be affected, but you may not be able to restart your Tails USB. If you are using a USB with a write-protect switch, you will need to unlock it for the dedicated session in which you are performing the upgrade.
|
||||||
|
|
||||||
### The [manual upgrade](https://tails.net/upgrade/tails/index.en.html)
|
### The manual upgrade
|
||||||
|
|
||||||
* Sometimes the upgrade window will tell you that you need to do a manual upgrade. This type of upgrade is only used for major upgrades or if there is a problem with automatic upgrades. See the [documentation for manual upgrades](https://tails.net/upgrade/tails/index.en.html).
|
* Sometimes the upgrade window will tell you that you need to do a manual upgrade. This type of upgrade is only used for major upgrades or if there is a problem with automatic upgrades. See the [documentation for manual upgrades](https://tails.net/upgrade/tails/index.en.html).
|
||||||
|
|
||||||
|
|
|
@ -561,7 +561,7 @@ h1
|
||||||
font-size: 2.8em !important
|
font-size: 2.8em !important
|
||||||
|
|
||||||
h1:not(.title)
|
h1:not(.title)
|
||||||
text-decoration: underline #AE3B8B !important
|
text-decoration: underline black !important
|
||||||
|
|
||||||
h2:not(.title)
|
h2:not(.title)
|
||||||
font-size: 1.8em !important
|
font-size: 1.8em !important
|
||||||
|
@ -640,7 +640,7 @@ body[theme="dark"] h1
|
||||||
color: #c9c7c9 !important
|
color: #c9c7c9 !important
|
||||||
|
|
||||||
body[theme="dark"] h1:not(.title)
|
body[theme="dark"] h1:not(.title)
|
||||||
text-decoration: underline #fa86d8 !important
|
text-decoration: underline #c9c7c9 !important
|
||||||
|
|
||||||
body[theme="dark"] h2
|
body[theme="dark"] h2
|
||||||
color: #c9c7c9 !important
|
color: #c9c7c9 !important
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue