Re: [Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section

2017-03-23 Thread Denis 'GNUtoo' Carikli
On Mon, 20 Mar 2017 13:05:58 +0100
Wolfgang Wiedmeyer  wrote:

[...]
> 
> You acked v1 and not v2. I guess v2 is ok, too? It only has orWall
> removed again because it is EOL.
For V2:
Acked-by: Denis 'GNUtoo' Carikli 

> Best regards,
> Wolfgang
Denis.


pgpYyNLCC_mtP.pgp
Description: OpenPGP digital signature
___
Replicant mailing list
Replicant@lists.osuosl.org
http://lists.osuosl.org/mailman/listinfo/replicant


Re: [Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section

2017-03-20 Thread Wolfgang Wiedmeyer

Denis 'GNUtoo' Carikli writes:

> From: Wolfgang Wiedmeyer 
>
> - Clarify that the storage should be encrypted using a strong passphrase.
> - Chatsecure doesn't seem to be maintained anymore and it's not part of
>   F-Droid anymore, so recommend Conversations instead.
> - AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9
> - Mail website is updated.
> - Add orWall to the Android Tor setup.
> - Add Silence for encrypting SMS.
> - Remove the Tor project's Android hardening guide: The guide was
>   updated and there is a link to the updated guide at the beginning of
>   the old guide. The new guide has extensive sections about CopperheadOS
>   and recommends to use it and donate to the project. CopperheadOS is
>   nonfree software. They not only use blobs like LineageOS does, but
>   their entire source code changes have a nonfree licence[1].
>
> [1]  https://copperhead.co/android/downloads
>
> Signed-off-by: Wolfgang Wiedmeyer 
> Acked-by: Denis 'GNUtoo' Carikli 

You acked v1 and not v2. I guess v2 is ok, too? It only has orWall
removed again because it is EOL.

Best regards,
Wolfgang

> ---
>  freedom-privacy-security-issues.php | 9 +
>  1 file changed, 5 insertions(+), 4 deletions(-)
>
> diff --git a/freedom-privacy-security-issues.php 
> b/freedom-privacy-security-issues.php
> index 7def689..0400d81 100644
> --- a/freedom-privacy-security-issues.php
> +++ b/freedom-privacy-security-issues.php
> @@ -154,13 +154,14 @@
>   Some general good advice to ensure the best 
> possible respect of freedom and privacy/security on mobile devices includes:
>   
>   Installing only free software 
> applications, from trusted sources such as F-Droid on Replicant.
> - Encrypting the device's storage, to 
> prevent some unauthorized access to the device's data.
> - Using software that provides secure 
> peer-to-peer-encrypted communications such as  href="//dev.guardianproject.info/projects/gibberbot">ChatSecure for 
> instant messaging and AGP with 
> K-9 Mail for emails on 
> Replicant.
> - Using  href="//www.torproject.org/">Tor to achieve reliable anonymity, for 
> instance with Orbot 
> on Replicant.
> + Encrypting the device's storage 
> with a strong passphrase, to prevent some unauthorized access to the device's 
> data.
> + Using software that provides secure 
> encrypted communications such as  href="https://conversations.im/";>Conversations for instant messaging and 
> https://www.openkeychain.org/";>OpenKeychain with  href="https://k9mail.github.io/";>K-9 Mail for emails on Replicant.
> + Using  href="//www.torproject.org/">Tor to achieve reliable anonymity, for 
> instance with Orbot 
> and https://orwall.org/";>orWall on Replicant.
> + Using  href="https://silence.im/";>Silence to encrypt SMS messages.
>   If the device is telephony-enabled, 
> switching the modem to airplane mode or (when possible) turning it off when 
> not in use, to avoid being tracked at all times.
>   Browsers using the webview 
> framework (such as the browser shipped with Replicant and  href="https://github.com/anthonycr/Lightning-Browser";>Lightning) are 
> subject to  href="https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various
>  security flaws in Replicant 4.2.
>   
> - In addition, the Free 
> Software Foundation provides a  href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help 
> protect freedom and privacy and the Tor project an article entitled  href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission
>  Impossible: Hardening Android for Security and Privacy.
> + In addition, the Free 
> Software Foundation provides a  href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help 
> protect freedom and privacy.
>   
>   
>   


-- 
Website: https://fossencdi.org
OpenPGP: 0F30 D1A0 2F73 F70A 6FEE  048E 5816 A24C 1075 7FC4
Key download: https://wiedmeyer.de/keys/ww.asc


signature.asc
Description: PGP signature
___
Replicant mailing list
Replicant@lists.osuosl.org
http://lists.osuosl.org/mailman/listinfo/replicant


[Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section

2017-03-20 Thread Denis 'GNUtoo' Carikli
From: Wolfgang Wiedmeyer 

- Clarify that the storage should be encrypted using a strong passphrase.
- Chatsecure doesn't seem to be maintained anymore and it's not part of
  F-Droid anymore, so recommend Conversations instead.
- AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9
- Mail website is updated.
- Add orWall to the Android Tor setup.
- Add Silence for encrypting SMS.
- Remove the Tor project's Android hardening guide: The guide was
  updated and there is a link to the updated guide at the beginning of
  the old guide. The new guide has extensive sections about CopperheadOS
  and recommends to use it and donate to the project. CopperheadOS is
  nonfree software. They not only use blobs like LineageOS does, but
  their entire source code changes have a nonfree licence[1].

[1]  https://copperhead.co/android/downloads

Signed-off-by: Wolfgang Wiedmeyer 
Acked-by: Denis 'GNUtoo' Carikli 
---
 freedom-privacy-security-issues.php | 9 +
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/freedom-privacy-security-issues.php 
b/freedom-privacy-security-issues.php
index 7def689..0400d81 100644
--- a/freedom-privacy-security-issues.php
+++ b/freedom-privacy-security-issues.php
@@ -154,13 +154,14 @@
Some general good advice to ensure the best 
possible respect of freedom and privacy/security on mobile devices includes:

Installing only free software 
applications, from trusted sources such as F-Droid on Replicant.
-   Encrypting the device's storage, to 
prevent some unauthorized access to the device's data.
-   Using software that provides secure 
peer-to-peer-encrypted communications such as ChatSecure for instant 
messaging and AGP with K-9 Mail for emails on Replicant.
-   Using Tor to achieve reliable anonymity, for 
instance with Orbot on 
Replicant.
+   Encrypting the device's storage 
with a strong passphrase, to prevent some unauthorized access to the device's 
data.
+   Using software that provides secure 
encrypted communications such as https://conversations.im/";>Conversations for instant messaging and https://www.openkeychain.org/";>OpenKeychain with https://k9mail.github.io/";>K-9 Mail for emails on Replicant.
+   Using Tor to achieve reliable anonymity, for 
instance with Orbot and 
https://orwall.org/";>orWall on Replicant.
+   Using https://silence.im/";>Silence to encrypt SMS messages.
If the device is telephony-enabled, 
switching the modem to airplane mode or (when possible) turning it off when not 
in use, to avoid being tracked at all times.
Browsers using the webview 
framework (such as the browser shipped with Replicant and https://github.com/anthonycr/Lightning-Browser";>Lightning) are 
subject to https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various
 security flaws in Replicant 4.2.

-   In addition, the Free 
Software Foundation provides a comprehensive guide to help protect 
freedom and privacy and the Tor project an article entitled Mission
 Impossible: Hardening Android for Security and Privacy.
+   In addition, the Free 
Software Foundation provides a comprehensive guide to help protect 
freedom and privacy.



-- 
2.12.0

___
Replicant mailing list
Replicant@lists.osuosl.org
http://lists.osuosl.org/mailman/listinfo/replicant


[Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section

2017-03-15 Thread Wolfgang Wiedmeyer
Clarify that the storage should be encrypted using a strong passphrase.
Chatsecure doesn't seem to be maintained anymore and it's not part of
F-Droid anymore, so recommend Conversations instead.
AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9
Mail website is updated.
Add orWall to the Android Tor setup.
Add Silence for encrypting SMS.
Remove the Tor project's Android hardening guide: The guide was
updated and there is a link to the updated guide at the beginning of
the old guide. The new guide has extensive sections about CopperheadOS
and recommends to use it and donate to the project. CopperheadOS is
nonfree software. They not only use blobs like LineageOS does, but
their entire source code changes have a nonfree licence[1].

[1]  https://copperhead.co/android/downloads

Signed-off-by: Wolfgang Wiedmeyer 
---
 freedom-privacy-security-issues.php | 9 +
 1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/freedom-privacy-security-issues.php 
b/freedom-privacy-security-issues.php
index 7def689..0400d81 100644
--- a/freedom-privacy-security-issues.php
+++ b/freedom-privacy-security-issues.php
@@ -154,13 +154,14 @@
Some general good advice to ensure the best 
possible respect of freedom and privacy/security on mobile devices includes:

Installing only free software 
applications, from trusted sources such as F-Droid on Replicant.
-   Encrypting the device's storage, to 
prevent some unauthorized access to the device's data.
-   Using software that provides secure 
peer-to-peer-encrypted communications such as ChatSecure for instant 
messaging and AGP with K-9 Mail for emails on Replicant.
-   Using Tor to achieve reliable anonymity, for 
instance with Orbot on 
Replicant.
+   Encrypting the device's storage 
with a strong passphrase, to prevent some unauthorized access to the device's 
data.
+   Using software that provides secure 
encrypted communications such as https://conversations.im/";>Conversations for instant messaging and https://www.openkeychain.org/";>OpenKeychain with https://k9mail.github.io/";>K-9 Mail for emails on Replicant.
+   Using Tor to achieve reliable anonymity, for 
instance with Orbot and 
https://orwall.org/";>orWall on Replicant.
+   Using https://silence.im/";>Silence to encrypt SMS messages.
If the device is telephony-enabled, 
switching the modem to airplane mode or (when possible) turning it off when not 
in use, to avoid being tracked at all times.
Browsers using the webview 
framework (such as the browser shipped with Replicant and https://github.com/anthonycr/Lightning-Browser";>Lightning) are 
subject to https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior";>various
 security flaws in Replicant 4.2.

-   In addition, the Free 
Software Foundation provides a comprehensive guide to help protect 
freedom and privacy and the Tor project an article entitled Mission
 Impossible: Hardening Android for Security and Privacy.
+   In addition, the Free 
Software Foundation provides a comprehensive guide to help protect 
freedom and privacy.



-- 
2.11.0

___
Replicant mailing list
Replicant@lists.osuosl.org
http://lists.osuosl.org/mailman/listinfo/replicant