The following commit has been merged in the master branch:
commit 0a03bc2fffc3b8eff017ce8a7171342cbe208dfe
Author: DocOcassi <[email protected]>
Date: Tue Dec 30 10:50:44 2014 +0000
Added more tools/sites/description.
diff --git a/doc/index.wiki b/doc/index.wiki
index 75ccc79..ebaaa39 100644
--- a/doc/index.wiki
+++ b/doc/index.wiki
@@ -1,31 +1,28 @@
-= Debian-freedom =
+= Debian-Sanctuary =
Change name to Debian Sanctuary
-A Pure Blend that will allow the installation of privacy tools on Debian.
+A Pure Blend that will provide specific privacy protections by the
installation of privacy tools on Debian.
-Using Tasks, The system will install tools for providing the best privacy
protection, for a specific task
+The system will present tasks related to use cases for the user. It will
install tools for providing the best user protection for a specific task
-I have used a modified risk assessment for identifying the Threats, and
controls, which will identify the tools required:
- `Risk.odt`
+I have used a modified risk assessment for identifying the Threats, and
Controls Measures, which will in turn identify the tools required: see
[[Risk.odt]]
== links ==
Project home
http://wiki.debian.org/DebianFreedom
-Info Regarding the Pure blends
-http://blends.debian.org/blends
-
-Ham Radio Example of build page:
-http://blends.debian.org/hamradio
-
The Original Repo
http://anonscm.debian.org/cgit/blends/projects/freedom.git/
The Git page for edits.
https://github.com/debian-freedom/debian-freedom.git
+Info Regarding the Pure blends
+http://blends.debian.org/blends
+
+
== Risk Assessment ==
=== Task ===
@@ -56,38 +53,72 @@ In an environment with *no* protection the possibility of
compromise.
=== Control Measures ===
Based on the Hazard and the Information threatened, define countermeasures to
use to mitigate risk.
-| 1 | OS Choice | A Secure OS with minimal
active exploits |
-| 2 | Firewall | Protect yourself by blocking
direct attacks |
-| 3 | Anti-virus/Malware | Ensure you have Updated and
active virus/malware protection, this may be provided by the OS |
-| 4 | Computer Use Training / User Competanccy | When using a computer to
acieve tasks safely. |
-| 5 | Cache Purging | Ensure any processed
information is not left where it can be recovered |
-| 6 | Password Safe | If you have access
passwords/keys, ensure they are stored in a safe location |
-| 7 | Disk Encryption | Protect your sensitive
information from being recovered from silenced disks |
-| 8 | Transport Encryption | Encrypt data during transit,
must be to an acceptable* standard |
-| 9 | Out of Band Authentication | Authentication where a
shared secret had been securely passed and verified |
-| 10 | Authenticated Encryption | Encryption that has been
secured by an Authenticated secret |
-| 11 | Transport Anonymity | A transport to prevent
identification of actors communication |
-| 12 | Perfect Forward Secrecy. | Encryption which ,even if
intercepted, cannot be decrypted with any key |
-| 13 | Anonymity | Communication cannot be
identified or authenticated. |
-| 14 | Platform Selection | Choice of platform/network
to use based on protection given (https://tosdr.org) |
-| 15 | Authentication | Authentication (less strong
then OOB?) |
-| 16 | System Use Training | A Specific system needs to
give special information to the user |
+| # | Control Measure | Description
|
+| --- | --- | ---
|
+| 1 | OS Choice | A Secure OS with minimal
active exploits |
+| 2 | Firewall | Protect yourself by
blocking direct attacks |
+| 3 | Anti-virus/Malware | Ensure you have Updated and
active virus/malware protection, this may be provided by the OS |
+| 4 | Computer Use Training / User Competanccy | When using a computer to
acieve tasks safely. |
+| 5 | Cache Purging | Ensure any processed
information is not left where it can be recovered |
+| 6 | Password Safe | If you have access
passwords/keys, ensure they are stored in a safe location |
+| 7 | Disk Encryption | Protect your sensitive
information from being recovered from silenced disks |
+| 8 | Transport Encryption | Encrypt data during
transit, must be to an acceptable* standard |
+| 9 | Out of Band Authentication | Authentication where a
shared secret had been securely passed and verified |
+| 10 | Authenticated Encryption | Encryption that has been
secured by an Authenticated secret |
+| 11 | Transport Anonymity | A transport to prevent
identification of actors communication |
+| 12 | Perfect Forward Secrecy. | Encryption which ,even if
intercepted, cannot be decrypted with any key |
+| 13 | Anonymity | Communication cannot be
identified or authenticated. |
+| 14 | Platform Selection | Choice of platform/network
to use based on protection given (https://tosdr.org) |
+| 15 | Authentication | Authentication (less strong
then OOB?) |
+| 16 | System Use Training | A Specific system needs to
give special usage information to the user |
+| 17 | Censorship Resistance |
|
+| | |
|
+
(* If it is good enough for trade agreements.)
== Tools ==
-Tools available brief description and control measures implemented
-| GnuPG | Public Private key encryption | 15, 10 |
-| OTR | Private communications over instant messaging | 13, 12, 15, 10 |
-| Mix Master | Anonymous Remailer | 11, |
-
-
-== tools ==
-
-
-
-=== Development ===
+Tools available brief description and control measures implemented, I have
just taken this from my limited uderstanding of these systems, and will need
further investigation to be sure of these claims.
+There are also grades of protection provided by packages, which isn't
investigated here, but an implementation of some kind of grading may be useful
but also difficult.
+
+| Name | info | Description
| Implementes |
+| ---- | ---- | ----
| ---- |
+| GnuPG | https://gnupg.org | Public-Private Key
Cryptography | 15, 10 |
+| OTR | https://otr.cypherpunks.ca | Private
communications over instant messaging | 13, 12, 15, 10 |
+| MixMaster | https://sourceforge.net/projects/mixmaster | Anonymous Remailer
| 11, 13 |
+| Mixminion | https://mixminion.net | Anonymous Remailer
| 11, 13 |
+| Freenet | https://freenetproject.org | Decentralised node
driven encrypted network | 8, 11, 13 |
+| Gnunet | https://gnunet.org | Encrypted peer to
peer Network | 11, 8 |
+| I2P | https://geti2p.net | Anonymous network
layer | 11, 13 |
+| Tor | https://torproject.org | Decentralised Node
driven Encrypted Network | |
+| Namecoin | http://namecoin.info | Anonymous registry
| |
+| shred | see apt | Secure file
deletion | 5 |
+| tinc | http://www.tinc-vpn.org | encrypted peer to
peer network | 11 |
+| zyre | https://github.com | Proximity based
Peer to peer framework | |
+| Retroshare | https://retroshare.sourceforge.net | friend to friend
secure decentralised net | |
+| Briar | https://briarproject.org | Proximity based
encrypted peer to peer network | |
+| Pond | https://pond.imperialviolet.org | Forward secure
async messaging (Experimental) | |
+| cjdns | http://cjdns.info | Encrypted IPv6
with PPK for address allocation | |
+| Mumble | http://mumble.info | Encrypted VoIP
| |
+| Jitsi | |
| |
+| CCNx | |
| |
+| Tahoe-LAFS | |
| |
+| Blackadder | |
| |
+| Tribler | |
| |
+| PSYC | |
| |
+| Bittorrent | |
| |
+| tox | |
| |
+| linphone | |
| |
+| | |
| |
+
+These are preliminary and there is a definite need to have thouruogh analysis
of these tools bassed on their claims.
+
+== Use Training ==
+The Largest point of failure in all these systems is the user, through
misconfiguration of misuse, we need a method to engage the user and their
thought process when using these tools. from general computer use to using a
specific tool, these should be easily accessible to the user and available from
Context of use use, the language must be as clear as possibly and accessibly to
users of all levels.
+
+
+== Development ==
`blends-dev`
Tools to build metapackages from template
@@ -97,3 +128,9 @@ Tools available brief description and control measures
implemented
Debian Live
For Building live images
+
+== Examples ==
+Ham Radio Example of build page:
+http://blends.debian.org/hamradio
+
+
--
Debian Privacy Tools Pure Blend
_______________________________________________
Blends-commit mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/blends-commit