PrivacyGroup: Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
Line 97: Line 97:
* [https://help.riseup.net/en/security/message-security/openpgp/gpg-keys Get a GPG key]
* [https://help.riseup.net/en/security/message-security/openpgp/gpg-keys Get a GPG key]
* [[installing the latest GPG]]
* [[installing the latest GPG]]
* [http://www.fsij.org/doc-gnuk/intro.html#development-environment Get a Gnuk token!] -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself <span style="color:RED">NEW</span>
* [http://www.fsij.org/doc-gnuk/intro.html#development-environment Get a Gnuk token!] -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself  
* [https://stribika.github.io/2015/01/04/secure-secure-shell.html secure SSH]
* [https://stribika.github.io/2015/01/04/secure-secure-shell.html secure SSH]
** [[Using gpg-agent]] instead of ssh-agent
** [[Using gpg-agent]] instead of ssh-agent

Revision as of 23:48, 19 September 2017

This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!

Calendar

Events in this calendar are to privacy-related events. Click an event for more details, and links. <EventCalendar> namespace = PrivacyGroup_Event aspectratio = 1.35 </EventCalendar>

News

Tools help

People often tell me they are unsure about which privacy-enhancing technologies to use, and how to set them up. Here are some suggestions.

operating systems

censorship resistance

anonymous browsing

  • Tor (go to the "Tor Browser Sandbox" section) -- I suggest subscribing to the RSS feed of the blog of the Tor project to be sure you stay up to date. The hardened version includes AddressSanitizer (ASan) to detect memory corruption, and use of domain sockets to further protect your IP. The hardened version of Tor has been discontinued; the Tor project recommends moving to the sandboxed version for increased security. Details on this version are in the documentation in the Tor Wiki. A highlight from the Q&A:
    Q: How do I install Flash/Siverlight/etc?
    A: Your tears are delicious, and your plugins will burn.
    :-)
  • Also who uses Tor?

browsers

  • Icecat -- It's like Firefox, but better. Does not support DRM with encrypted media extension technology, unlike Firefox.
  • Why not Chrome/Chromium? -- It does have a sandbox, but it is also the most privacy invasive browser (of the major ones). Also Google controls the extensions for it, and they are sometimes unjust.

browser tools

these all work with Icecat, or Firefox. They may also work with other FF variants; I haven't checked.

  • Random Agent Spoofer (blocks a variety of fingerprinting attacks)
  • RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
  • NoScript
  • PrivacyBadger (EFF)
  • Self-Destructing Cookies
  • HTTPS Everywhere (EFF)
  • BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache)
  • decentraleyes - runs CDN scripts locally, rather than using remote CDNs (which is trackable)
  • Privacy Settings (the plugin) -- Gives quick access to useful privacy settings in the browser, with toggle switches.
  • Update Scanner -- Useful for watching privacy policies for changes (since that is your obligation, as a continuing user of the site. Often such changes are not highlighted; only a new version is posted).

testing for problems

facial recognition

other tools

  • Protecting against baseband firmware backdoors, and provider backdoors-- A little outdated, but still full of good stuff. This is a comprehensive approach' for specific tools see below.NEW
  • Silence SMS/MMS. Recommended
  • Noise is just like Signal, but without the hard dependency on Google Play Store. It is therefore better! But Silence is better still...
  • Get an RSS feed reader to keep up to date on privacy-related sites. For example *cough* subscribe to the PrivacyGroup's feed (It's good to use a secure RSS reader. For mobile there is Courier from The Guardian Project).
  • Youtube-dl -- Downloads a variety of streaming formats -- not just for youtube! Can be used with torify (see below) to anonymously view streaming video/audio that otherwise compromises privacy (e.g., flash). Note the version in packages is often not up to date--install the latest with pip to get a version that actually works.
  • Torify -- A SOCKS proxy to the Tor network, and a wrapper to use it, so you can e.g. look up GPG keys, or perform WHOIS queries, anonymously.
  • Get a GPG key
  • installing the latest GPG
  • Get a Gnuk token! -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself
  • secure SSH

Other Sites with Tools for Protecting Your Digital Rights

Tools for Making Consent to Privacy Policies More Informed

Why care about privacy?

Giving up privacy

How universities can help

Videos

Miscellaneous

Privacy theme music!