====== Crypto-anonymity knowbase ====== {{template>:project:infobox| name=Crypto-anonymity knowbase| image=anonymiss_logo.jpg?200| sw=-| hw=-| founder=[[user:overdrive]]| interested=[[user:ruza]]\\ [[user:kxt]]| }} ~~META: status = active &relation firstimage = :project:anonymiss_logo.jpg ~~ Aim of this project is to create knowledge base for everybody who need or want to behave in secure way, because "Informations want to be free!" but "Privacy does matter!" I [we] want to collect all privacy and cryptography related projects of BRMLAB here, too. Do not hesitate to contribute. ===== NewZzz and BRMLAB related projects ===== * [[..:opensourcecrypto:start]] * [[..:tor:start|BrmTor]] * [[..:chaosvpn:start]] * [[..:cryptotoken:start]] * [[..:laser_eavesdrop:start|Laser Eavesdropping]] * [[http://www.bitcointrezor.com/ |TREZOR : BitCoin Hardware wallet]] * [[https://brmlab.cz/user/jenda/linux-insecurity |Linux Insecurity by Jenda]] * {{:event:flag-cze.png}}: [[https://www.nyx.cz/index.php?l=topic;l2=1;id=10436;n=1cca| Nyx auditorium about Anonymity and Cryptography ]] - cooperative place for people who care about this topic * {{:event:flag-cze.png}}: [[http://www.root.cz/n/let-s-encrypt/#ic=text-labels&icc=let-s-encrypt | Root.cz tag Let's encrypt]] - news about Let's encrypt ===== Trainings and keynotes ===== * [[https://events.ccc.de/congress/2015/wiki/Static:How_To_Survive|Extensive guide of everyday computer security by CCC]] * [[http://youtu.be/poCt6xKzWQs|YouTube Tutorial for PIDGIN + OTR]] * {{:event:flag-cze.png}}: [[http://nat.brmlab.cz/talks/video/scf10/rosol-elipticke-krivky.ogg|Elliptic curves for beginners]] - video * {{:event:flag-cze.png}}: [[http://www.cryptofest.cz/?node=video2013|Videos from Siliconhill Cryptofest 2013]] * {{:event:flag-cze.png}}: [[https://www.youtube.com/playlist?list=PLofm6RaC_O5pNm8HCGZQsDdqKsatdc3tt|Videos from Siliconhill Cryptofest 2015]] * {{:event:flag-cze.png}}: [[https://www.youtube.com/watch?v=IMIdlED36q4&feature=youtu.be|DNSSEC pro běžného uživatele (Ondřej Caletka) – Mírně pokročilí]] * {{:event:flag-cze.png}}: [[http://nat.brmlab.cz/talks/lightning_talks/lt-2013-07/2013-07-04-everyday-crypto-overdrive.mkv|Overdrive's notes to everyday cryptography]] [long, 1h] ===== Useful Software for different platforms ===== ==== PGP ==== {{ :project:pgp_xkcd.png|...and this is how does it work ;]}} * [[user:ruza:gpg2-modern|GPG 2.1 with Elliptic curves]] ==== Smart devices ==== ^ email client ^ crypto provider ^ PGP/MIME ^ PGP inline ^ S/MIME ^ | K-9 | APG | not yet | yes | no | | Kaiten | Openkeychain| ||| | Mailvelope | Flipdog plugin | yes | no | yes | | Squeaky mail | APG / Openkeychain | yes | yes | * Encrypted e-mail for Android: K9 Mail + AGP[GnuPG]: https://play.google.com/store/apps/details?id=com.fsck.k9 * Telegram IM - pretty easy and multi-platform chat client [opensource with API]: https://telegram.org/ * IM for [A]droid - https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im * SMS and VOIP for Apple and [A]droid - https://whispersystems.org/ * TOR [A]droid: https://play.google.com/store/apps/details?id=org.torproject.android * reclaim Android applications access with [[http://repo.xposed.info/module/biz.bokhorst.xprivacy|XPrivacy]] * interactive firewall for communication initiated by applications [[https://play.google.com/store/apps/details?id=app.greyshirts.firewall|NoRoot FireWall]] ==== PC : Email ==== * PGP for Thunderbird : https://www.enigmail.net/home/index.php ==== Browser plugins ==== * google randomization Firefox ad-on: https://addons.mozilla.org/en-us/firefox/addon/googlesharing/ * https everywhere plugin: https://www.eff.org/https-everywhere * PrivacyBadger - do-not-track : https://www.eff.org/en-gb/node/73969 * AdBlocker: https://www.ublock.org/ * Ghostery [do not track]: https://addons.mozilla.org/en-us/firefox/addon/ghostery/ * turun off JavaScript selectively [Firefox ad-on]: https://addons.mozilla.org/en-us/firefox/addon/noscript/ ==== search engine ==== * https://duckduckgo.com * https://startpage.com/ ==== tor and ssh ==== * TOR powered Firefox: https://www.torproject.org/projects/torbrowser.html.en * SSH like client over UDP [for unstable networks]: https://mosh.mit.edu/ ==== filesystem encryption ==== * encrypted partition [file] - pc: truecrypt * encrypted -"- - [A]Droid: - ??? ==== Metadata ==== * https://mat.boum.org/ - MAT: Metadata Anonymisation Toolkit ==== Server ==== * Let's encrypt : https for every web : https://letsencrypt.org/ * Server side testing, config, SSL/TSL : https://bettercrypto.org/ * SSL test : https://www.ssllabs.com/ === Privacy oriented OS distros === * https://tails.boum.org/ - Tails - Debian based TOR powered Live GNU/LINUX ===== Crypto / Anonymity networks ===== * https://github.com/rossjones/alternative-internet - really complex list of alternatives to Open Intenet * https://github.com/cryptosphere/cryptosphere * tor * MNet * Freenet * Tahoe-LAFS ===== Crypto Hardware ===== * [[https://www.yubico.com/|Yubico hardware U2F authentication key]] * {{:event:flag-cze.png}}: [[http://www.root.cz/clanky/yubikey-neo-po-dvou-letech/|YubiKey authentication key]] ===== Crypto ===== * http://www.hacker10.com/...puting/how-egyptian-police-quickly-cracked-journalists-computer-password/ - How Egyptian police quickly cracked journalist’s computer password - This is important. Sometimes cryptography is not enough, when you could be tortured. * https://en.wikipedia.org/wiki/Bitmessage - something, that could be potentially used instead of email - test and try to understand, question is traffic shaping too [IMHO] * https://bitmessage.org/forum/index.php?topic=1666.0 - BitMessage analysis * https://we.riseup.net/riseuplabs+paow/openpgp-best-practices - OpenPGP best practices * https://www.imperialviolet.org/ - Andam Langley is HTTPS infrastructure designer for google, blog is about Cryptography theory and more ===== Multi-party Off-the-Record Messaging ===== * http://www.cypherpunks.ca/~iang/pubs/mpotr.pdf - reserch papers * https://github.com/DrWhax/mpOTR - prozkoumat * http://tools.ietf.org/html/draft-brown-pgp-pfs-03 - forward secrecy pro GnuPG [draft] * http://schleuder2.nadir.org/ - Schleuder is a gpg-enabled mailinglist with remailer-capabilities. It is designed to serve as a tool for group communication: subscribers can communicate encrypted (and pseudonymously) among themselves, receive emails from non-subscribers and send emails to non-subscribers via the list. Schleuder takes care of all de- and encryption, stripping of headers, formatting conversions, etc. Further schleuder can send out its own public key upon request and receive administrative commands by email. ==== Configure email for Multi-party messanging ==== Have a server with a master key that decrypts incoming mail, re-encrypts with board members' individual subkeys? If it *has* to be the same email account, does it support IMAP? If so, IMAP behaves like a folder; you can take stuff out, and put it back in again. A Python script could be written to scan over new mail, remove "master key" mail and deposit "subkey-re-encrypted" mail. When members access the mail, it will usually have been accessed, re-encrypted and replaced with one they can decrypt. If not, they'll have to wait a few minutes and try again. ===== Privacy ===== ===== What to do, when police come/summon you ===== Police in democratic-law following country play a game with you, they are sure, you are afraid and unsure of law and situation, keep it in mind This howto is based on Overdrive's experience, not really universal * keep in mind, that you are suppose to but you must pay visit of em' if cops summon you not testyfy [according Czech law] * do not afraid and be sure of what are you talking about * do not tell them anything, they are not asking directly, yes, now or I do not know is answer too * do not carry electronic devices full of data with you [if possible] * lawyer number in wallet could be usefull, in case you go to prisson, debts are no prob., in case he will help, you will get some money to pay * do not do small-talks with cops, even personal talks will allow them to get a lot more info, than you recognize at first [kind of good/bad cop game] * to not play cheeky monkey, do not try to outsmart them, do not by aggresive just cooperate, but minimally * BTW it is not necessary to answer all of the questions, e.g. you want to answer some, because you think, it can help in case [think twice of course], but they are asking about something, that can harm you or partner/best friend - than you have right not to talk, use this right [here is text - CZ only - about this topic: (Ne)podání vysvětlení: http://www.dfens-cz.com/view.php?cisloclanku=2013010605 ] this howto is ment for moments, when they want something from you, in case you need them, use it is oppsite way [not only last point ;] ===== Useful/BRLABERS Public Keys ===== * [[http://overdrive.dronezone.eu/overdrive.txt | Overdrive's key, Fingerprint: 08EA E4DC EF85 0F02 9267 5B48 2E58 6902 C5F8 794C ]] TODO: * dead linx * http://overdrive.anhedonia.xxx/crypto-pidgin.html - HOWTO for Instant Messaging - OTR + Pidgin - example for Facebook and GoogleTalk * http://overdrive.anhedonia.xxx/crypto-email.html - HOWTO Encrypt e-mail -Thunderbird + GnuPG + Enigmail * find truth about filesystem encryption tools for different platforms * add YubiKey