fixed repos
|
@ -85,7 +85,6 @@
|
|||
|
||||
<p>The most popular example out there is Windows, they would definitely not like their sourcecode to be leaked/reversed like it with <a href="https://www.theverge.com/2018/2/8/16992626/apple-github-dmca-request-ios-iboot-source-code">Apple's IOS</a>.</p>
|
||||
|
||||
<<<<<<< HEAD
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
|
@ -137,40 +136,12 @@
|
|||
<p>Keep that in mind, as this is the ABC of OPSEC you'll have to remember throughout the rest of the next blogposts i write, On any device of yours, there is only one type of acceptable software for Privacy, and that is FOSS software. It has always been this way, and will always remain this way.</p>
|
||||
<p>If at any point in time you see people recommend closed-source software for privacy purposes, <b>you need to realize that they are either misled or are actively trying to mislead you into a false sense of security</b>, and you should remind them that <b><a href="https://discuss.privacyguides.net/t/should-privacy-guides-require-open-source-source-first-or-source-available-as-a-criteria-for-all-tools/22684/62">privacy and closed-source software are mutually exclusive.</a></b> hence the non-negociable need of using FOSS software for privacy.</p>
|
||||
|
||||
=======
|
||||
>>>>>>> c68d4acf1d9205e517000694f41f60b38a8d3542
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
</div><!-- /white -->
|
||||
|
||||
|
||||
<!-- +++++ Second Post +++++ -->
|
||||
<div id="anon2">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<h2><b>Why is this relevant for Privacy ?</b></h2> </br> </br>
|
||||
<p>Privacy as a usecase on your computer requires that you only run software from which you are able to read the sourcecode of:</p>
|
||||
<p>I can just as easily write a software (let's say a chat application like Telegram), <b>I can make that software grab as much information as possible</b> like save the Computer model, serial number, get information on what other apps are running on your computer, what's the public IP address, take screenshots of what you're doing on your computer, <b>and I can make that application send all of that sensitive information to a remote server, while officially pretend that the additional network traffic is for "for telemetry purposes"</b>. </p>
|
||||
<p>All i need is to simply prevent you from being able to read the sourcecode, that way you have no way to disprove that this isn't actually telemetry.</p>
|
||||
<p>What's happening is that you have no visibility on what the software is doing, <b>it is not transparent</b></p>
|
||||
<p>That's why the first step is always to ONLY use software that is fully free and open source (FOSS), <b>so that you are at least ABLE to know what the software you are running is actually doing.</b> To be able to achieve Transparent use.</p>
|
||||
<img src="3.png" class="imgRz">
|
||||
<p>Once that's in check, you should spend some time to read the sourcecode of the software you are running. Or at the very least listen to what other privacy-minded people have to say about each piece of software. <b>So that you are able to know that the software does not contain any spying mechanism.</b></p>
|
||||
<p>If you find any software that actually does telemetry or any other spying mechanism, <b>you should remove it from your computer, if you intend to have privacy there</b>.</p>
|
||||
<p>It is only once you destroy all the cameras in your bedroom, and once you close all the blinds that the adversary outside can't peek into what you're doing in your bedroom. <b>In the same way, closed-source software is exactly the same, a camera for an adversary (the manufacturer of that software, or the government that they act on behalf of) to peek into what you're doing on your computer.</b></p>
|
||||
<img src="../privacy/3.png">
|
||||
|
||||
<p>Keep that in mind, as this is the ABC of OPSEC you'll have to remember throughout the rest of the next blogposts i write, On any device of yours, there is only one type of acceptable software for Privacy, and that is FOSS software. It has always been this way, and will always remain this way.</p>
|
||||
<p>If at any point in time you see people recommend closed-source software for privacy purposes, <b>you need to realize that they are either misled or are actively trying to mislead you into a false sense of security</b>, and you should remind them that <b><a href="https://discuss.privacyguides.net/t/should-privacy-guides-require-open-source-source-first-or-source-available-as-a-criteria-for-all-tools/22684/62">privacy and closed-source software are mutually exclusive.</a></b> hence the non-negociable need of using FOSS software for privacy.</p>
|
||||
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
</div><!-- /white -->
|
||||
|
||||
<div id="anon1">
|
||||
<div id="anon2">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
|
@ -193,7 +164,7 @@
|
|||
|
||||
|
||||
<!-- +++++ Second Post +++++ -->
|
||||
<div id="anon2">
|
||||
<div id="anon1">
|
||||
<div class="container">
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
|
|
0
opsec/qubesos/Screenshot From 2024-12-05 11-20-03.png
Executable file → Normal file
Before Width: | Height: | Size: 162 KiB After Width: | Height: | Size: 162 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-26-38.png
Executable file → Normal file
Before Width: | Height: | Size: 11 KiB After Width: | Height: | Size: 11 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-28-18.png
Executable file → Normal file
Before Width: | Height: | Size: 178 KiB After Width: | Height: | Size: 178 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-28-40.png
Executable file → Normal file
Before Width: | Height: | Size: 137 KiB After Width: | Height: | Size: 137 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-28-51.png
Executable file → Normal file
Before Width: | Height: | Size: 74 KiB After Width: | Height: | Size: 74 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-00.png
Executable file → Normal file
Before Width: | Height: | Size: 82 KiB After Width: | Height: | Size: 82 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-12.png
Executable file → Normal file
Before Width: | Height: | Size: 96 KiB After Width: | Height: | Size: 96 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-23.png
Executable file → Normal file
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 94 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-33.png
Executable file → Normal file
Before Width: | Height: | Size: 143 KiB After Width: | Height: | Size: 143 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-47.png
Executable file → Normal file
Before Width: | Height: | Size: 38 KiB After Width: | Height: | Size: 38 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-29-57.png
Executable file → Normal file
Before Width: | Height: | Size: 134 KiB After Width: | Height: | Size: 134 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-39-09.png
Executable file → Normal file
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 94 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-39-27.png
Executable file → Normal file
Before Width: | Height: | Size: 7.4 KiB After Width: | Height: | Size: 7.4 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-40-07.png
Executable file → Normal file
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 94 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-40-34.png
Executable file → Normal file
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 79 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 16-40-42.png
Executable file → Normal file
Before Width: | Height: | Size: 91 KiB After Width: | Height: | Size: 91 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 17-40-25.png
Executable file → Normal file
Before Width: | Height: | Size: 37 KiB After Width: | Height: | Size: 37 KiB |
0
opsec/qubesos/Screenshot From 2024-12-05 17-40-39.png
Executable file → Normal file
Before Width: | Height: | Size: 33 KiB After Width: | Height: | Size: 33 KiB |
0
opsec/qubesosnetwork/QubesManager.png
Executable file → Normal file
Before Width: | Height: | Size: 184 KiB After Width: | Height: | Size: 184 KiB |
0
opsec/qubesosnetwork/banking.png
Executable file → Normal file
Before Width: | Height: | Size: 322 KiB After Width: | Height: | Size: 322 KiB |
0
opsec/qubesosnetwork/copy_destination.png
Executable file → Normal file
Before Width: | Height: | Size: 109 KiB After Width: | Height: | Size: 109 KiB |
0
opsec/qubesosnetwork/copy_in_vm.png
Executable file → Normal file
Before Width: | Height: | Size: 67 KiB After Width: | Height: | Size: 67 KiB |
0
opsec/qubesosnetwork/create.png
Executable file → Normal file
Before Width: | Height: | Size: 212 KiB After Width: | Height: | Size: 212 KiB |
0
opsec/qubesosnetwork/destination_paste.png
Executable file → Normal file
Before Width: | Height: | Size: 80 KiB After Width: | Height: | Size: 80 KiB |
0
opsec/qubesosnetwork/disp_whonix.png
Executable file → Normal file
Before Width: | Height: | Size: 188 KiB After Width: | Height: | Size: 188 KiB |
0
opsec/qubesosnetwork/dom0_exec.png
Executable file → Normal file
Before Width: | Height: | Size: 110 KiB After Width: | Height: | Size: 110 KiB |
0
opsec/qubesosnetwork/file_arrived.png
Executable file → Normal file
Before Width: | Height: | Size: 131 KiB After Width: | Height: | Size: 131 KiB |
0
opsec/qubesosnetwork/file_await_transfer.png
Executable file → Normal file
Before Width: | Height: | Size: 84 KiB After Width: | Height: | Size: 84 KiB |
0
opsec/qubesosnetwork/firewall-net.png
Executable file → Normal file
Before Width: | Height: | Size: 112 KiB After Width: | Height: | Size: 112 KiB |
0
opsec/qubesosnetwork/firewall-service.png
Executable file → Normal file
Before Width: | Height: | Size: 137 KiB After Width: | Height: | Size: 137 KiB |
0
opsec/qubesosnetwork/manager.png
Executable file → Normal file
Before Width: | Height: | Size: 186 KiB After Width: | Height: | Size: 186 KiB |
0
opsec/qubesosnetwork/master_pasteboard.png
Executable file → Normal file
Before Width: | Height: | Size: 70 KiB After Width: | Height: | Size: 70 KiB |
0
opsec/qubesosnetwork/master_pasteboard_wiped.png
Executable file → Normal file
Before Width: | Height: | Size: 65 KiB After Width: | Height: | Size: 65 KiB |
0
opsec/qubesosnetwork/template_install.png
Executable file → Normal file
Before Width: | Height: | Size: 168 KiB After Width: | Height: | Size: 168 KiB |
0
opsec/qubesosnetwork/template_shutdown.png
Executable file → Normal file
Before Width: | Height: | Size: 295 KiB After Width: | Height: | Size: 295 KiB |
0
opsec/qubesosnetwork/terminal.png
Executable file → Normal file
Before Width: | Height: | Size: 48 KiB After Width: | Height: | Size: 48 KiB |
0
opsec/qubesosnetwork/text_arrived.png
Executable file → Normal file
Before Width: | Height: | Size: 68 KiB After Width: | Height: | Size: 68 KiB |
0
opsec/qubesosnetwork/torrent_transmission.png
Executable file → Normal file
Before Width: | Height: | Size: 246 KiB After Width: | Height: | Size: 246 KiB |
0
opsec/qubesosnetwork/torrent_vm.png
Executable file → Normal file
Before Width: | Height: | Size: 224 KiB After Width: | Height: | Size: 224 KiB |
0
opsec/qubesosnetwork/transmission_on.png
Executable file → Normal file
Before Width: | Height: | Size: 192 KiB After Width: | Height: | Size: 192 KiB |
0
opsec/qubesosnetwork/whonix-usage.png
Executable file → Normal file
Before Width: | Height: | Size: 153 KiB After Width: | Height: | Size: 153 KiB |
0
opsec/qubesosnetwork/whonix_dread.png
Executable file → Normal file
Before Width: | Height: | Size: 78 KiB After Width: | Height: | Size: 78 KiB |