diff --git a/opsec/closedsource/index.html b/opsec/closedsource/index.html index 4c2f2d9..3c845ce 100644 --- a/opsec/closedsource/index.html +++ b/opsec/closedsource/index.html @@ -8,7 +8,7 @@ -
"Hey, i just wrote this code, i compiled it, it gave me this .exe file, run it on your computer!
-What? You want the source code ? Hell no, just trust me bro!"
-Or in other words, why can't i trust an adversary to not look at me when i install one of his cameras in my bedroom ?
+"Hey, I just wrote this code, I compiled it, it gave me this .exe file, run it on your computer!
+What? You want the source code? Hell no, just trust me bro!"
+Or in other words, why can't I trust an adversary to not look at me when i install one of his cameras in my bedroom?
To briefly explain, any software out there was first written (a developer wrote some source code, for example in the go language), it was then compiled, and then the compilation produced a binary file (for example it became a .exe file on windows)
+To briefly explain, any software out there was first written (a developer wrote some source code, for example in the Go language), it was then compiled, and then the compilation produced a binary file (for example it became a .exe file on windows)
The catch here is that when you try to reverse-engineer binary files, it's going to be very hard to figure out what the original source code was. This practice is called Reverse Engineering, a niche in cybersecurity, where someone tries to figure out what the original sourcecode was intended to be, with only the binary to work with.
One thing is for sure: you can't arrive at the original sourcecode from just the binary. It's mostly guess work.
@@ -97,7 +97,7 @@Like we have explained previously, Privacy is binary, you are either being watched, or you are not being watched.
+Like we have explained previously, privacy is binary, you are either being watched, or you are not being watched.
Whoever tries to tell you that "Privacy is a spectrum" are just trying to justify that you should leave at least some closed source software on your computer if you don't feel like it, in the name of convenience.
No you should not, you either have privacy or you don't. You definitely do not have privacy when there are 100 cameras from 100 different adversaries in your bedroom, and it is the same thing as with leaving ONE camera from ONE adversary in your bedroom, the simple fact remains, you do not have privacy as long as there is at a camera pointed at you.
@@ -121,9 +121,9 @@Privacy as a usecase on your computer requires that you only run software from which you are able to read the sourcecode of:
-I can just as easily write a software (let's say a chat application like Telegram), I can make that software grab as much information as possible like save the Computer model, serial number, get information on what other apps are running on your computer, what's the public IP address, take screenshots of what you're doing on your computer, and I can make that application send all of that sensitive information to a remote server, while officially pretend that the additional network traffic is for "for telemetry purposes".
+I can just as easily write a software (let's say a chat application like Telegram), I can make that software grab as much information as possible like save the computer model, serial number, get information on what other apps are running on your computer, what's the public IP address, take screenshots of what you're doing on your computer, and I can make that application send all of that sensitive information to a remote server, while officially pretend that the additional network traffic is for "for telemetry purposes".
All i need is to simply prevent you from being able to read the sourcecode, that way you have no way to disprove that this isn't actually telemetry.
What's happening is that you have no visibility on what the software is doing, it is not transparent
That's why the first step is always to ONLY use software that is fully free and open source (FOSS), so that you are at least ABLE to know what the software you are running is actually doing. To be able to achieve Transparent use.
@@ -134,7 +134,7 @@Keep that in mind, as this is the ABC of OPSEC you'll have to remember throughout the rest of the next blogposts i write, On any device of yours, there is only one type of acceptable software for Privacy, and that is FOSS software. It has always been this way, and will always remain this way.
-If at any point in time you see people recommend closed-source software for privacy purposes, you need to realize that they are either misled or are actively trying to mislead you into a false sense of security, and you should remind them that privacy and closed-source software are mutually exclusive. hence the non-negociable need of using FOSS software for privacy.
+If at any point in time you see people recommend closed-source software for privacy purposes, you need to realize that they are either misled or are actively trying to mislead you into a false sense of security, and you should remind them that privacy and closed-source software are mutually exclusive. hence the non-negotiable need of using FOSS software for privacy.
To conclude, here are the requirements you need to look for, for any software that you use:
It must be FULLY free and open source (FOSS)
Ideally, if servers are involved, It must be self-hostable (for decentralisation) (meaning the serverside code must also be fully opensource)
(see how this is no longer the case with Signal)It must implement privacy features like encryption
Ideally, if servers are involved, it must be self-hostable (for decentralisation) (meaning the serverside code must also be fully open-source)
(see how this is no longer the case with Signal)It must implement privacy features like encryption.
It should not contain any telemetry, or any spyware.
It should ONLY do what it was originally meant to do.