Re: [Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section
On Mon, 20 Mar 2017 13:05:58 +0100 Wolfgang Wiedmeyer wrote: [...] > > You acked v1 and not v2. I guess v2 is ok, too? It only has orWall > removed again because it is EOL. For V2: Acked-by: Denis 'GNUtoo' Carikli > Best regards, > Wolfgang Denis. pgpYyNLCC_mtP.pgp Description: OpenPGP digital signature ___ Replicant mailing list Replicant@lists.osuosl.org http://lists.osuosl.org/mailman/listinfo/replicant
Re: [Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section
Denis 'GNUtoo' Carikli writes: > From: Wolfgang Wiedmeyer > > - Clarify that the storage should be encrypted using a strong passphrase. > - Chatsecure doesn't seem to be maintained anymore and it's not part of > F-Droid anymore, so recommend Conversations instead. > - AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9 > - Mail website is updated. > - Add orWall to the Android Tor setup. > - Add Silence for encrypting SMS. > - Remove the Tor project's Android hardening guide: The guide was > updated and there is a link to the updated guide at the beginning of > the old guide. The new guide has extensive sections about CopperheadOS > and recommends to use it and donate to the project. CopperheadOS is > nonfree software. They not only use blobs like LineageOS does, but > their entire source code changes have a nonfree licence[1]. > > [1] https://copperhead.co/android/downloads > > Signed-off-by: Wolfgang Wiedmeyer > Acked-by: Denis 'GNUtoo' Carikli You acked v1 and not v2. I guess v2 is ok, too? It only has orWall removed again because it is EOL. Best regards, Wolfgang > --- > freedom-privacy-security-issues.php | 9 + > 1 file changed, 5 insertions(+), 4 deletions(-) > > diff --git a/freedom-privacy-security-issues.php > b/freedom-privacy-security-issues.php > index 7def689..0400d81 100644 > --- a/freedom-privacy-security-issues.php > +++ b/freedom-privacy-security-issues.php > @@ -154,13 +154,14 @@ > Some general good advice to ensure the best > possible respect of freedom and privacy/security on mobile devices includes: > > Installing only free software > applications, from trusted sources such as F-Droid on Replicant. > - Encrypting the device's storage, to > prevent some unauthorized access to the device's data. > - Using software that provides secure > peer-to-peer-encrypted communications such as href="//dev.guardianproject.info/projects/gibberbot">ChatSecure for > instant messaging and AGP with > K-9 Mail for emails on > Replicant. > - Using href="//www.torproject.org/">Tor to achieve reliable anonymity, for > instance with Orbot > on Replicant. > + Encrypting the device's storage > with a strong passphrase, to prevent some unauthorized access to the device's > data. > + Using software that provides secure > encrypted communications such as href="https://conversations.im/";>Conversations for instant messaging and > https://www.openkeychain.org/";>OpenKeychain with href="https://k9mail.github.io/";>K-9 Mail for emails on Replicant. > + Using href="//www.torproject.org/">Tor to achieve reliable anonymity, for > instance with Orbot > and https://orwall.org/";>orWall on Replicant. > + Using href="https://silence.im/";>Silence to encrypt SMS messages. > If the device is telephony-enabled, > switching the modem to airplane mode or (when possible) turning it off when > not in use, to avoid being tracked at all times. > Browsers using the webview > framework (such as the browser shipped with Replicant and href="https://github.com/anthonycr/Lightning-Browser";>Lightning) are > subject to href="https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various > security flaws in Replicant 4.2. > > - In addition, the Free > Software Foundation provides a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help > protect freedom and privacy and the Tor project an article entitled href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission > Impossible: Hardening Android for Security and Privacy. > + In addition, the Free > Software Foundation provides a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help > protect freedom and privacy. > > > -- Website: https://fossencdi.org OpenPGP: 0F30 D1A0 2F73 F70A 6FEE 048E 5816 A24C 1075 7FC4 Key download: https://wiedmeyer.de/keys/ww.asc signature.asc Description: PGP signature ___ Replicant mailing list Replicant@lists.osuosl.org http://lists.osuosl.org/mailman/listinfo/replicant
[Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section
From: Wolfgang Wiedmeyer - Clarify that the storage should be encrypted using a strong passphrase. - Chatsecure doesn't seem to be maintained anymore and it's not part of F-Droid anymore, so recommend Conversations instead. - AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9 - Mail website is updated. - Add orWall to the Android Tor setup. - Add Silence for encrypting SMS. - Remove the Tor project's Android hardening guide: The guide was updated and there is a link to the updated guide at the beginning of the old guide. The new guide has extensive sections about CopperheadOS and recommends to use it and donate to the project. CopperheadOS is nonfree software. They not only use blobs like LineageOS does, but their entire source code changes have a nonfree licence[1]. [1] https://copperhead.co/android/downloads Signed-off-by: Wolfgang Wiedmeyer Acked-by: Denis 'GNUtoo' Carikli --- freedom-privacy-security-issues.php | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php index 7def689..0400d81 100644 --- a/freedom-privacy-security-issues.php +++ b/freedom-privacy-security-issues.php @@ -154,13 +154,14 @@ Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes: Installing only free software applications, from trusted sources such as F-Droid on Replicant. - Encrypting the device's storage, to prevent some unauthorized access to the device's data. - Using software that provides secure peer-to-peer-encrypted communications such as ChatSecure for instant messaging and AGP with K-9 Mail for emails on Replicant. - Using Tor to achieve reliable anonymity, for instance with Orbot on Replicant. + Encrypting the device's storage with a strong passphrase, to prevent some unauthorized access to the device's data. + Using software that provides secure encrypted communications such as https://conversations.im/";>Conversations for instant messaging and https://www.openkeychain.org/";>OpenKeychain with https://k9mail.github.io/";>K-9 Mail for emails on Replicant. + Using Tor to achieve reliable anonymity, for instance with Orbot and https://orwall.org/";>orWall on Replicant. + Using https://silence.im/";>Silence to encrypt SMS messages. If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times. Browsers using the webview framework (such as the browser shipped with Replicant and https://github.com/anthonycr/Lightning-Browser";>Lightning) are subject to https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various security flaws in Replicant 4.2. - In addition, the Free Software Foundation provides a comprehensive guide to help protect freedom and privacy and the Tor project an article entitled Mission Impossible: Hardening Android for Security and Privacy. + In addition, the Free Software Foundation provides a comprehensive guide to help protect freedom and privacy. -- 2.12.0 ___ Replicant mailing list Replicant@lists.osuosl.org http://lists.osuosl.org/mailman/listinfo/replicant
[Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section
Clarify that the storage should be encrypted using a strong passphrase. Chatsecure doesn't seem to be maintained anymore and it's not part of F-Droid anymore, so recommend Conversations instead. AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9 Mail website is updated. Add orWall to the Android Tor setup. Add Silence for encrypting SMS. Remove the Tor project's Android hardening guide: The guide was updated and there is a link to the updated guide at the beginning of the old guide. The new guide has extensive sections about CopperheadOS and recommends to use it and donate to the project. CopperheadOS is nonfree software. They not only use blobs like LineageOS does, but their entire source code changes have a nonfree licence[1]. [1] https://copperhead.co/android/downloads Signed-off-by: Wolfgang Wiedmeyer --- freedom-privacy-security-issues.php | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php index 7def689..0400d81 100644 --- a/freedom-privacy-security-issues.php +++ b/freedom-privacy-security-issues.php @@ -154,13 +154,14 @@ Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes: Installing only free software applications, from trusted sources such as F-Droid on Replicant. - Encrypting the device's storage, to prevent some unauthorized access to the device's data. - Using software that provides secure peer-to-peer-encrypted communications such as ChatSecure for instant messaging and AGP with K-9 Mail for emails on Replicant. - Using Tor to achieve reliable anonymity, for instance with Orbot on Replicant. + Encrypting the device's storage with a strong passphrase, to prevent some unauthorized access to the device's data. + Using software that provides secure encrypted communications such as https://conversations.im/";>Conversations for instant messaging and https://www.openkeychain.org/";>OpenKeychain with https://k9mail.github.io/";>K-9 Mail for emails on Replicant. + Using Tor to achieve reliable anonymity, for instance with Orbot and https://orwall.org/";>orWall on Replicant. + Using https://silence.im/";>Silence to encrypt SMS messages. If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times. Browsers using the webview framework (such as the browser shipped with Replicant and https://github.com/anthonycr/Lightning-Browser";>Lightning) are subject to https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various security flaws in Replicant 4.2. - In addition, the Free Software Foundation provides a comprehensive guide to help protect freedom and privacy and the Tor project an article entitled Mission Impossible: Hardening Android for Security and Privacy. + In addition, the Free Software Foundation provides a comprehensive guide to help protect freedom and privacy. -- 2.11.0 ___ Replicant mailing list Replicant@lists.osuosl.org http://lists.osuosl.org/mailman/listinfo/replicant