[Replicant] [PATCH] freedom-privacy-security-issues: Update general advice section
Wolfgang Wiedmeyer
wreg at wiedmeyer.de
Mon Mar 20 12:05:58 UTC 2017
Denis 'GNUtoo' Carikli writes:
> From: Wolfgang Wiedmeyer <wolfgit at wiedmeyer.de>
>
> - Clarify that the storage should be encrypted using a strong passphrase.
> - Chatsecure doesn't seem to be maintained anymore and it's not part of
> F-Droid anymore, so recommend Conversations instead.
> - AGP was replaced with OpenKeychain in K-9 Mail. The link to the K-9
> - Mail website is updated.
> - Add orWall to the Android Tor setup.
> - Add Silence for encrypting SMS.
> - Remove the Tor project's Android hardening guide: The guide was
> updated and there is a link to the updated guide at the beginning of
> the old guide. The new guide has extensive sections about CopperheadOS
> and recommends to use it and donate to the project. CopperheadOS is
> nonfree software. They not only use blobs like LineageOS does, but
> their entire source code changes have a nonfree licence[1].
>
> [1] https://copperhead.co/android/downloads
>
> Signed-off-by: Wolfgang Wiedmeyer <wolfgit at wiedmeyer.de>
> Acked-by: Denis 'GNUtoo' Carikli <GNUtoo at no-log.org>
You acked v1 and not v2. I guess v2 is ok, too? It only has orWall
removed again because it is EOL.
Best regards,
Wolfgang
> ---
> freedom-privacy-security-issues.php | 9 +++++----
> 1 file changed, 5 insertions(+), 4 deletions(-)
>
> diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php
> index 7def689..0400d81 100644
> --- a/freedom-privacy-security-issues.php
> +++ b/freedom-privacy-security-issues.php
> @@ -154,13 +154,14 @@
> Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:
> <ul>
> <li>Installing only free software applications, from trusted sources such as F-Droid on Replicant.</li>
> - <li>Encrypting the device's storage, to prevent some unauthorized access to the device's data.</li>
> - <li>Using software that provides secure peer-to-peer-encrypted communications such as <a href="//dev.guardianproject.info/projects/gibberbot">ChatSecure</a> for instant messaging and <a href="//thialfihar.org/projects/apg/">AGP</a> with <a href="//code.google.com/p/k9mail">K-9 Mail</a> for emails on Replicant.</li>
> - <li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> on Replicant.</li>
> + <li>Encrypting the device's storage with a strong passphrase, to prevent some unauthorized access to the device's data.</li>
> + <li>Using software that provides secure encrypted communications such as <a href="https://conversations.im/">Conversations</a> for instant messaging and <a href="https://www.openkeychain.org/">OpenKeychain</a> with <a href="https://k9mail.github.io/">K-9 Mail</a> for emails on Replicant.</li>
> + <li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> and <a href="https://orwall.org/">orWall</a> on Replicant.</li>
> + <li>Using <a href="https://silence.im/">Silence</a> to encrypt SMS messages.</li>
> <li>If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.</li>
> <li>Browsers using the webview framework (such as the browser shipped with Replicant and <a href="https://github.com/anthonycr/Lightning-Browser">Lightning</a>) are subject to <a href="https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior">various security flaws</a> in Replicant 4.2.</li>
> </ul>
> - In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a> and the Tor project an article entitled <a href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission Impossible: Hardening Android for Security and Privacy</a>.
> + In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a>.
> </p>
> </div>
> </div>
--
Website: https://fossencdi.org
OpenPGP: 0F30 D1A0 2F73 F70A 6FEE 048E 5816 A24C 1075 7FC4
Key download: https://wiedmeyer.de/keys/ww.asc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 818 bytes
Desc: not available
URL: <http://lists.osuosl.org/pipermail/replicant/attachments/20170320/0ab2874b/attachment.asc>
More information about the Replicant
mailing list