mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-08-01 10:56:11 -04:00
miscellaneous feedback integration
This commit is contained in:
parent
5755584357
commit
8afa5b96a8
9 changed files with 74 additions and 181 deletions
|
@ -25,13 +25,6 @@ See [When to Use Tails vs. Qubes OS](/posts/qubes/#when-to-use-tails-vs-qubes-os
|
|||
|
||||
We do not offer "harm reduction" advice for Windows or macOS computers, as this is already widespread and gives a false sense of privacy and security. If you need to use one of these operating systems, see The Hitchhiker’s Guide to Online Anonymity for tutorials on [Windows](https://anonymousplanet.org/guide.html#windows-host-os) and [macOS](https://anonymousplanet.org/guide.html#macos-host-os).
|
||||
|
||||
## Your Home Network
|
||||
>**[Operating system](/glossary#operating-system-os) (router)**: [**OpenWrt**](https://www.privacyguides.org/en/router/#openwrt). [GL-iNet](https://www.gl-inet.com/) sells affordable OpenWrt routers that are easy to use - the 'Travel' models are sufficient for an apartment sized residence.
|
||||
|
||||
>**[Operating system](/glossary#operating-system-os) (hardware firewall)**: [**OPNsense**](https://www.privacyguides.org/en/router/#opnsense). Although you can get by with just a router, a hardware firewall allows you to further segment your network and provides other security enhancements.
|
||||
|
||||
If an adversary compromises your router, [they can use it to compromise any device connected to it](https://arstechnica.com/information-technology/2022/06/a-wide-range-of-routers-are-under-attack-by-new-unusually-sophisticated-malware/), so it's important not to use the [closed-source](/glossary#open-source) router your Internet Service Provider provides. Guide coming soon.
|
||||
|
||||
## Encrypted Messaging
|
||||
|
||||
See [Encrypted Messaging for Anarchists](/posts/e2ee/)
|
||||
|
@ -42,7 +35,7 @@ See [Make Your Electronics Tamper-Evident](/posts/tamper/).
|
|||
|
||||
## Preparation for Crossing Borders
|
||||
|
||||
If you risk taking the phone or computer you use every day across a border (not recommended), make sure that Full Disk Encryption is enabled, that it is turned off, and that you are prepared to deny password access and accept the consequences of doing so. It is not enough to delete files (or messages, apps, etc.) before crossing the border and then unlock your device. In fact, the first thing a border team will check is whether anything was recently deleted. To prevent data recovery, you must perform a Factory Reset and then reinstall the operating system.
|
||||
It is not recommended to risk taking the phone or computer you use every day across a border. If you do, make sure that Full Disk Encryption is enabled, that it is turned off, and that you are prepared to deny password access and accept the consequences of doing so. It is not enough to delete files (or messages, apps, etc.) before crossing the border and then unlock your device. In fact, the first thing a border team will check is whether anything was recently deleted. To prevent data recovery, you must perform a Factory Reset and then reinstall the operating system.
|
||||
|
||||
A better approach is to have a dedicated travel device that you can unlock for border agents, since you always cross with a fresh operating system installation. Stock Android can be [easily installed (flashed)](https://flash.android.com) on [certain phone models](https://source.android.com/docs/setup/build/flash#device-requirements) after a factory reset. The fresh phone can be populated with benign contacts such as family. Once across the border, you can use the phone normally, but redo the flashing before crossing the border again. If the phone is taken out of your sight at any point, don’t even turn it back on before trashing it, as it may now send your password to the authorities and be infected with spyware.
|
||||
A better approach is to have a dedicated travel device that you can unlock for border agents, since you always cross with a fresh operating system installation. For phones, stock Android can be [easily installed (flashed)](https://flash.android.com) on [certain phone models](https://source.android.com/docs/setup/build/flash#device-requirements) after a factory reset. The fresh phone can be populated with benign contacts such as family. Once across the border, you can restore your data and use the phone normally, but redo this process before crossing the border again. The same principle applies to computers - reinstall the operating system, make it look normal, then restore the data you need once you have crossed. If the device is taken out of your sight at any point, don’t even turn it back on before trashing it, as it may now send your password to the authorities and be infected with spyware.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue