1776_Linux

1776_Linux
(I'm forgetting where I sourced this quote. I'll find it again on Wiki-source.)

Privacy wasn't valuable enough to protect at each encounter until decades after loosing it. Subtle instances of sharing usage data were negligible until over time the consequences meant privacy wasn't possible; even when desired.

'1776' Silliness aside, here are tools, tips, tricks to regain your online sense of self-respect.

MUCH of my technical segments I credit to Michael Bazzell.
There's SO MUCH MORE in his PDFs which go beyond the scope, here.
VOIP Services | Email Domain Services | SO MUCH MORE
Extreme Privacy series ~ Linux Devices - Digital Edition (2024)
Michael Bazzell shared his own personal Linux setup (pg. 12, yr. 2022).
These are linked in the Appendix.

I'm going to cite as much as possible, an effort inspired from the efforts made by Whitney Webb and by Mark Goodwin in their long-form article 'Unmasking Farmington: FTX, Fluent Finance and the Coming Digital Dollar'.

Unfortunately, I do not know how to remove the reference breadcrumb added to the URLs you'll find on this page. ((Perhaps I could add a DNS filter-tool for removing it along with Share ID's from social media platforms.....))


Details, Accuracy, and Concepts are updating in real time. Subtleties in word-choice are improving day-to-day.

Editorial Examples

This verbose paragraph:
- The tool used to guide this electricity around is called the kernel. IDK where people got these names. The kernel (Linux) guides the electricity from the stroke of a keyboard to trigger letters being displayed on your computer screen. It sends the electricity around the to get processed by computer chips that then send it back out to your screen so you can read what you're typing.he kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen. It's FAST! It sends the electricity around the to get processed by computer chips that then send it back out to your screen so you can read what you're typing.

Was re-written in brevity:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen. It's FAST!

Then re-written for a more accurate, smoother reading experience: Then was re-written to have a more accurate, smoother reading experience: smoother cognitive processing:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until the screen displays those letters. It's FAST!

Then re-written again for prioritize the result over the initiating behavior:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen

Then re-written for grammatical consistency:
- The kernel (Linux) guides electricity from your stroke of the keyboard through your laptop's computer-chips until the letter displays on your screen.

Then re-written to consider what the reader may prefer from my perspective:
- The kernel (Linux) guides electricity from your stroke of the keyboard through your computer-chips (on the motherboard) until that letter displays on your screen.

It reads as if "your" was used too much. but I'll wait for feedback before assuming.

This is how I write
- concept
- brevity
- accuracy
- theory of mind
- proof-reading


Note to Self

Check for missing nuances (in your notes) before considering this a final template ready to grow from.

Sources: where do these shine?
beginning or end? (for sure throughout)
- source material
- material from which I was lead to the source.

Values ( find an acronym for this.)
- Avoid Mistakes
- Reliability
- Verify
find which values, or each, to instill as the reason for these approaches.
It's not about he tools, or tech, it's about he human stories (we are humans, after all).
Find the notes in the Star Trek scripts on this mentioned by Steve Gibson (IIRC).

  • Invidious - instead of a Firefox addon, can this be made as a network software to trigger when network speeds drop-for-a-duration-during-video-download to avoid further fingerprinting the browser? To avoid further trusting outside software?
    - https://news.ycombinator.com/item?id=36589002
  • Flatpak might need flatpak.builder setup.
    • Visual is technically incorrect. fix this with notes you made about it.
  • suggest, aliasing plurals in with singulars.
    It's plural for remotes.

"" Manage remote repositories
"" remotes List all configured remotes

  • Offer documentation edits to Flatpak.
  • test Kloak as a service.
    • turn this (and the rest) into a screenshot of the source wording. the commands then placed in one code-block.)
    • add an exception as to when the software is desired. i.e. the web-page with each window interacting with moving graphics.
    • where's the notes on baseline software loaded, like flatpak... I get the complicated nature with languages as interpreted from lower-level behaviors, but still, landscape lacks fences for laymen?
  • Firefox (complete overhaul, walkthrough)
    • Podman - learn to export Firefox Profiles.
    • Podman - learn to import Firefox Profiles.
    • Repeat to values
  • Flatpak
    • De-clutter: remove the "libraries of commands" out from under 'APT' side.
  • Organize into Coherency, the 'Population Targeting ~ Social Targeting' segment.
  • Nala adds color <- re-write to as "(author(s) added color...)"
  • Further simplify the segment on '~ Reason Behind Each Command ~ (click to expand)' using the words {apt, repository, key} without first introducing those concepts in the first step.
  • Add UI process of pinning software to the taskbar.
  • Add DNS filter to remove references or Share ID's from social media platforms.
  • Kloak
    • add hash-checks on downloaded material.
  • Wire
    - Which was it I installed, .deb or .appimage?
    - Get the Screen Sharing Feature working.
    - Test the Screen Sharing Feature
    - Does it share the screen to a mobile app?
  • Make sure 'What You'll Get' segment has its pieces provided to completion. and each tool in it's benefit-purpose-category.
  • make an Anki-set for remembering what you (mostly for myself) have setup and to remember all these darn reasons for each reasons. locally running quiz like Signal Messenger provides for remembering its PIN code.
  • Reminder for the story time and passwords, have reminders set up on phone/computer. It'll be as important as doing your personal access to your computer depends on it. Who knows when you'll go three months without your computer. Don't let 3 months of vacation (chosen or coerced) keep you forever locked out. Yeh, you'll have those written out, and yet --- shit happens.
  • ((Don't say 'sandbox')) not yet sure what to say instead.
  • In with - Nala and - Bat, sent to friend in Wire, Look at that terminal-lady's work.
  • KISS - Keep It Separate, Silly <- add to security field as a phrase. Simple and Separate, key concepts. - regarding how I manage updates for this walk-through. - Can I share how I plan to do this?
  • When presenting an Image or Gallery of Screenshots, don't hyperlink the images. Avoid misunderstanding what it means to click/tap an image. What's the UX with hyperlinked vs not hyperlinked.
  • Michael Bazzell still using MailSpring rather than Thunderbird?
    What's the longevity for MailSpring?
    Portion of UNREDACTED ISSUE 003 <- read from here.
  • Start Classifying Software as Identity Archiving Software, the products requiring ID-Proxies.
  • Show where LLM's were useful for me in elucidating CLI. Which of that was generated, which of that I re-wrote. I recall having re-written it all buuuut not sure, need to double-check.
  • ...

What You'll Have

Memory Toolkit
- EFF Diceware
- STORY TIME!!
(better than what "professionals" are giving you)
(I need to re-check the entropy, IIRC it's higher than expected.... but I don't do maths.)

Operating System
- Pop!_OS

Networking
- NextDNS
- ProtonVPN
- Firefox
- Root CA Trimmer (custom built, to do)

Readable Terminal
- Nala
- Bat

Hardware Obfuscators
- Kloak
- Macchanger
- Host-name Swap-Script

Password Managers
- KeePassXC
- Bitwarden
- Organized Folder Templating ((where are my notes for this one?))

Application Managers
- AppImageLauncher
- Flatseal

Messaging
- Signal
- Wire

Document Sanitizer
- DangerZone
- Metadata Cleaner

Note Taking
- Diagramming tools (add from other book - also cite that book)

Scan and Generate QR Codes
-
Decoder - link

Maintenance & Updates
- scripts & apps you build ((phew that'll be a segment, eh, cracks knuckles))

My Go-To Sources
- (the people & materials) not sure if this will differ from the appendix, or the appendix will format to this purpose.

Figure Out Where These Go
- Thunderbird, EteSync, EteBase?
- Are these relevant?
- GNOME Boxes
- GNOME Apps
- Newsfeed
- Podcasts
- Obsidian?
- PDFArranger and more
- Kdenlive with automated transcriptions
- LLM Studio if applicable


Your Research ~ Tools for Your Tool-belt:


Invidious


Mitigating Risk

Here are various risks happening right now, to help motivate you into seeing this through.

Population Targeting ~ Social Targeting

  • What is going on?
  • All of this I need to verify, until then, here's interesting leads.
  • ((make this one gallery or a series of galleries. reduce the amount of emphasis.))
    • keep the first photo as the single, and the rest into a gallery.
    • when making the gallery, re-snapshot those articles to have the brand in photo, to compensate for not being able to caption individual photos in a gallery.
Abigail Devereaux and Linan Peng ~ Give us a little social credit: to design or to discover personal ratings in the era of Big Data ~ Jan 15, 2020 [Cambridge link]

Websites Smuggling Malware ~ Dog-Piling

(( need to cite this carefully ))

From Wikipedia - UBlock_Origin

When software exports your information without consent – it's malware.

Operating systems continue to improve (fingers crossed) as more people become aware of the tools we use {Email, Browsers, Backups, . . .}. Until we see improvements in restrictions, browsers will bloat to serve features-and-code both nullifying privacy or introducing security-mistakes. uBlock Origin is a tool for restricting Firefox closer to its core-feature, a GUI into servers (i.e. loading webpages, facilitating logins). uBlock Origin prohibits Firefox from loading categories of software known-to-be-malicious without our consent.

Help yourself avoid malware with uBlock Origin ~ by Raymond Hill

More on this, later. Let's continue.

Falling Out-of-Date

((the segment on Security Now! on this, Cetrix(?) second-coverage within past 3 months?))

This was intrusive. The current state of our operating systems continue to improve as more of us become aware of the tools we use (i.e. our computers, our internet).

It's a simple way to stay in the loop of any updates or changes which will effect you. As Vector Databases (multi-matrix) become more feasible to self-host, Generative Ai will shorten the gap between updates-&-exploits. It'll be important to update before you get exploited. It's not as difficult for you as it sounds – I hope.
((did I introduce LLM, Ai (machine learning) with technical accuracy?))

Shown later on, you'll learn to curate a news-feed listening for
- security patches ((need to find these))
- additional features ((need to find these))
- maintenance updates. ((need to find these))

Closed Source Operating Systems Compromised by with Ai

If Ai can make video this passable before March 2024, what do you think people are up to behind the scenes with ((suspicious-of-being)) Government Malware?

More on efforts to build tools which throw off Machine Learning (a.k.a Ai) for people wanting to poison data-models using their art without consent. Best of luck to you who strive to achieve those efforts. I have no idea where events go from here.


What is Linux?

Linux is a tool used to guide electricity around, like how switches on a wall turn the lights on and off. Microsoft's {Windows OS} & Apple's {macOS, iOS} are also tools to guide electricity around except those have the explicit intent to to install, modify, and extract both the software or data in-and-out without your consent. ((time pull up sources from years of notes, don't let me forget. must be as direct-source-heavy as possible))

Essentially, those operating systems are corporate malware.

But, that's just an opinion, of course, based on the fact that it takes data without consent, installs software without consent, and injects data without consent. – just my naive, non-educated, unemployed, not-professional opinion.

The tool used to guide this electricity around is called the kernel.
I do not know where this name came from.

The kernel (Linux) guides electricity from your stroke of the keyboard through your computer-chips (on the motherboard) until that letter displays on your screen. It's FAST!

Linux also manages the proverbial light-switches popping on-and-off-and-on automatically behind the scenes {adjusting the clock, maintaining WiFi-connection, loading video game graphics}.

More on this later, when I've got my notes further transposed.

This operating system setup uses Pop!_OS which is a modified version of Ubuntu, which is a modified version of Debian. When you read Debian, think 'yes that's me!'


((move up above the "What Is Linux" segment))

Pop_OS!

Keep It Simple Silly!

Pop_OS!
- automates updates
- intuitive interface
- meets familiar expectations

From https://pop.system76.com/ click "DOWNLOAD". Do NOT download the NVIDIA option, it doesn't work for my 6+ yr old laptop. If you have a newer hardware, go for it. It's a simple process if you need the other option. The issue may be a decreased screen-resolution and mind-numbing-slow speeds.

((Grab my own screenshot highlighting the Intel option))

((walk-through setup process, username))


Reduce Dependencies on any one Tech-Stack

((introduce the philosophy,
- here the mobile apps that sell out from underneath users,
- ransomware causing service outages
- etc.))
((do make reminders about this philosophy throughout this walk-through))


Leave Negativity For The Traumatized

Don't whine.

Rather than assuming people don't care about privacy, it's far more likely people didn't realize their privacy existed, i.e. I didn't know my privacy online was thing until people me about efforts to remove it.


account naming convention

Here, it's Privacy that's not Reproducible.

Software and Applications are given access to cognitive fingerprinting {naming-conventions, stylography,

((needs adjusting and op-sec assessing))

Privacy needs to be a bit clearer.
It's not private if you don't realize when nor where that info is actively leaked.

People won't respect their privacy if they don't know it ever existed. Just because you're writing a document does not by default mean you want people to identify the computer's account stylography with the document. To put it into simple terms for the simpletons in the front of the class – double check what names to use and when for first time setups. People won't respect their privacy if they didn't know it ever existed.

In "Document Viewer" application, is that the account name being leaked to internal programs. and what say you, would people name their accounts..... their actual names perhaps?

Looks like a similar situation of lacking the will to confront the how-things-are for how-things-ought-to-be (which are very-very different) to the situation of timestamps being littered throughout Debian-based packages preventing Reproducibility.

((grab one of those videos, preferably one given inside and watch it for sentiment - clear sentiment.))


Making a Archive of Your Original Packages

Compare with What You're About to Prepare.
((could look at Pop!_OS GitHub, eh?))

Distinguishing default software from your chosen software is a quick confidence-booster activity. First, you list what Debian, Ubuntu, Ssytem76 have installed.

Make a text file.

((not yet organized on these.))

user@pop-os:~$ comm -23 <(apt-mark showmanual | sort -u) <(gzip -dc /var/log/installer/initial-status.gz | sed -n 's/^Package: //p' | sort -u)

user@pop-os:~$ sudo apt list --installed | less

user@pop-os:~$ dpkg --get-selections | grep -v deinstall | less

These don't yet create list-files.


((configure system's DNS before this or any other installations.))

Kloak

I put this here because you'll want to know sooner than later if it causes issues with your keyboard. ((add troubleshooting segment-page.))

Websites put software on your computer, without your consent, without you knowing.
((what was the reason for putting that sentence here?))

Duh, but... to track your keyboard strokes?

Your typing is unique.
Finger muscles developed differently.
A person who plays guitar types differently.
A person who can knit types differently
A person who can do both types differently.
A person who does neither types differently.

Image from Kloak's GitHub

Below are commands & comments quoted from GitHub.
. . . . What is GitHub? → [here's a clue] ← . . . . Shout out to that guy!

Install Kloak ~ Run as a Service

Services are running behind the scenes. Running automatically, you don't need to activate any. You simply specify on which mile-stone (a.k.a. a target) the service will activate.

For example, when computers boot up there are mile-stones along the way; much like checkpoints in a video-game. These are called targets. At least in Pop!_OS, these are targets.

Kloak Service Configuration
        [Install]
        WantedBy=multi-user.target
    

((screenshot the .service file, and blur the rest of it to focus on this bit, use the blur tool?))

That is from the .service file on Kloak's GitHub.

Reach your target, start your Kloak. It's a service running in the background.

When the computer reaches the target of finally being ready for people to start using it, the operating system looks for services asking to start at this specific mile-stone. Kloak is one of those services.

Kloak kicks into gear, identifying the keyboard, grabbing-and-releasing keystrokes.

How it works
The time between key press and release events are typically used to identify users by their typing behavior. kloak obfuscates these time intervals by introducing a random delay between the physical key events and the arrival of key events at the application, for example a web browser.
kloak grabs the input device and writes delayed key events to the output device. Grabbing the device disables any other application from reading the events. Events are scheduled to be released in a separate thread, where a random delay is introduced before they are written to a user-level input device via uinput. This was inspired from kbd-mangler.

((clarify the language here?))

Terminal Commands quoted from Whonix GitHub page.

Temporary Kloak ~ Run as an Application

Applications are like phone apps. Apps on your phone start running when you open the app. Immediately after turning your phone on, your apps don't try to open up all at once. You have to tap an app to use it. Same with Linux software.

"Apps" is a word to describe software that requires manual activation.

sudo apt install devscripts


sudo mk-build-deps --remove --install


make all


sudo ./kloak

Terminal Commands quoted from Whonix GitHub page.

If you use the Application method, every time you turn you computer back on you'll need to manually activate Kloak.

I have to start Kloak manually. Eventually I'll install it "As a service".

You'll need to have your terminal pointed to the same directory as the built Kloak file.
((Use this as the moment to share how this is a commonly unspoken requirement. sth.))

Segment quoted from https://github.com/Whonix/kloak

Reason for Commands

Pop!_OS is made from Debian.
Debian references are for you.

This are for installing as an app (which needs starting on every boot).
I've not installed it myself yet as a "As a service" which runs all the time.

Segment quoted from https://github.com/Whonix/kloak

Debian:
$ sudo apt install devscripts
$ sudo mk-build-deps --remove --install

First, compile kloak and the event capture tool eventcap:
$ make all

Next, start kloak as root. This typically must run as root because kloak reads from and writes to device files:
$ sudo ./kloak

If you start kloak and lose control of your keyboard, pressing RShift + LShift + Esc will exit. You can specify the rescue key combination with the -k option.

Segment quoted from https://github.com/Whonix/kloak

Applications are the programs you apply like paint, tape, or makeup. You temporarily apply and then later remove.
- Manual Activation and icons you click on. a bed and breakfast, it can be running in the background serving strangers. it's the service that starts upon waking up the computer – much like breakfast being serviced upon people waking up at a Bed and Breakfast).

((remove application portion?))

Trust Then Verify

Is Kloak running on it's own, "enabled"?

Try this terminal command. Hope you see "enabled" returned to you,
user@pop-os:~$ systemctl is-enabled kloak.service
enabled

If you received "disabled" it was not triggered to start, or simply didn't start.

((add more nuance to that last statement, and nuance to what enabled means - as far as running or signaled to run. What is the way to verify the outputs are reaching me, i.e. obfuscation is actually happening rather than being implicitly reported as 'should be happening'?))

Check Kloak's listing in SystemD

user@pop-os:~$ systemctl list-dependencies multi-user.target
multi-user.target
 ├─apport.service
 ├─avahi-daemon.service
 ├─binfmt-support.service
 ├─chrony.service
 ├─com.system76.PowerDaemon.service
 ├─com.system76.Scheduler.service
 ├─com.system76.SystemUpdater.service
 ├─console-setup.service
 ├─cron.service
 ├─cups-browsed.service
 ├─cups.path
 ├─cups.service
 ├─dbus-broker.service
○ ├─dmesg.service
○ ├─e2scrub_reap.service
○ ├─grub-common.service
○ ├─grub-initrd-fallback.service
 ├─kloak.service
 ├─ModemManager.service
 ├─networkd-dispatcher.service
 ├─networking.service
 ├─NetworkManager.service
user@pop-os:~$ 


Flatpak Packages

(you likely won't have these yet. consider this foreshadowing).

user@pop-os:~$ sudo apt list --installed | less
user@pop-os:~$ ls
 anaconda3                            Pictures
 app                                  popos-22.04-intel
 Applications                         popos-22.04-intel.conf
'Calibre Library'                     Projects
 derivative.asc                       Public
 Desktop                              README.md
 Documents                            requirements.txt
 Downloads                            sfdsafsaf.cmb
 fpf-apt-tools-archive-keyring.gpg~   sfdsafsaf.ui
 HCFlow_Assets                        signal-desktop-keyring.gpg
 kloak                                Templates
 less                                 tests
 main.py                             'Untitled Document 1'
 Monero                               Upscale_Images
 monero_add_to_custom_location.txt    Videos
 Music
user@pop-os:~$ flatpak list -a |cut -f2 |sort -u >> flatpak.lst
user@pop-os:~$ ls
 anaconda3                            Music
 app                                  Pictures
 Applications                         popos-22.04-intel
'Calibre Library'                     popos-22.04-intel.conf
 derivative.asc                       Projects
 Desktop                              Public
 Documents                            README.md
 Downloads                            requirements.txt
 flatpak.lst                          sfdsafsaf.cmb
 fpf-apt-tools-archive-keyring.gpg~   sfdsafsaf.ui
 HCFlow_Assets                        signal-desktop-keyring.gpg
 kloak                                Templates
 less                                 tests
 main.py                             'Untitled Document 1'
 Monero                               Upscale_Images
 monero_add_to_custom_location.txt    Videos
user@pop-os:~$ bat flatpak.lst 
user@pop-os:~$ 

user@pop-os:~/Documents/Pop_OS_Setup$ flatpak list --app 
Name                                     Application ID                                Version                 Branch          Origin                Installation
Cambalache                               ar.xjuan.Cambalache                           0.16.0                  stable          flathub               user
Decoder                                  com.belmoussaoui.Decoder                      0.4.1                   stable          flathub               user
calibre                                  com.calibre_ebook.calibre                     7.4.0                   stable          flathub               user
Discord                                  com.discordapp.Discord                        0.0.41                  stable          flathub               user
PDF Arranger                             com.github.jeromerobert.pdfarranger           1.10.1                  stable          flathub               user
Flatseal                                 com.github.tchx84.Flatseal                    2.1.0                   stable          flathub               user
OBS Studio                               com.obsproject.Studio                         30.0.2                  stable          flathub               user
Metadata Cleaner                         fr.romainvigier.MetadataCleaner               2.5.4                   stable          flathub               user
NewsFlash                                io.gitlab.news_flash.NewsFlash                3.0.2                   stable          flathub               user
Builder                                  org.flatpak.Builder                                                   stable          flathub               user
Hello                                    org.flatpak.Hello                                                     master          hello-origin          user
FreeFileSync                             org.freefilesync.FreeFileSync                 13.3                    stable          flathub               user
GNU Image Manipulation Program           org.gimp.GIMP                                 2.10.36                 stable          flathub               user
Builder                                  org.gnome.Builder                             45.0                    stable          flathub               user
Déjà Dup Backups                         org.gnome.DejaDup                             45.2                    stable          flathub               user
Devhelp                                  org.gnome.Devhelp                             43.0                    stable          flathub               user
GtkHash                                  org.gtkhash.gtkhash                           1.5                     stable          flathub               user
Inkscape                                 org.inkscape.Inkscape                         1.3.2                   stable          flathub               user
Kleopatra                                org.kde.kleopatra                             3.1.28.230804           stable          flathub               user
OnionShare                               org.onionshare.OnionShare                     2.6                     stable          flathub               user
ONLYOFFICE Desktop Editors               org.onlyoffice.desktopeditors                 7.5.1                   stable          flathub               user
Workbench                                re.sonny.Workbench                            45.4                    stable          flathub               user


Internet Connections

You'll customize an operating system built and maintained by the System76 team.

VPN & DNS

For in-depth introduction to VPN & DNS technology, please purchase the VPNs & Firewalls PDF published by the IntelTechniques team. I think it serves you with clearer technical information for you. I haven't purchased it, yet.

Pairing a VPN to series of DNS providers will reduce the automating logging you're caught in. When a computer boots-up, it reaches out to verify it's clock. When a computer updates, it reaches out to verify it's version. ((link the segment in the talk mentioning how the number of update-queries is extrapolated to a number of users.)

(((need to deeply break this down, in brevity))

((links to each sentence/statement.))

ProtonVPN

As recommended by System76 itself:
https://support.system76.com/articles/use-vpn-software

...

NextDNS

For in-depth introduction to Domain Name Services, please purchase the Linux PDF published by the IntelTechniques team. Their VPNs & Firewalls PDF may have more info on using DNS as a Firewall (hence "Firewalls" in the name) however I don't know for sure because I haven't purchased it, yet.

((work on self-hosting resolver?))

Email as an Alias

Various accounts and services require an email..... let's set it up.
There are accusations arising about ProtonVPN being .... (((link video)))
I'm not sure what to make of it, ProtonMail is better than the other options I know how to use.

ProtonMail

  • ...

Your Terminal As A Word-Processor

The trick is knowing how to phrase commands. It's learned from making mistakes.

((introduce sooner, with host-name randomize-tool ~ build the confidence early))

((show an example of mistake that resonates with initial desires when setting up a linux computer for the first time.)) ((perhaps "GoGo Gadget Pop!_OS"))

GNOME Screenshot ~ How To Assemble It Yourself!

I like this tool because I haven't found it's metadata to leak identifiers, aside from the tool itself which tells anyone interested that I'm likely using ....

((link to the GNU Software distinction. here works to help not overload anyone with too much information.))

(((Here introduce the navigating the Software installer , GitHub, FlatHub, as to which to build from.))

  • (((Build something quick to get the confidence up whilst lowering fear of the unknown)))
Segment that follows will use gnome-screenshot.

Nala ~ Making apt Readable

This tool reduces clutter on your terminal. It also adds color. It's the pretty presentation you'll see in the terminal similar to graphics in a video-game. The presentation is called the front-end because it is the face of the product. It faces you.

sudo apt update && sudo apt install nala

Nala is a front-end for APT to help keep your terminal organized, color-coded, simple. You'll learn more in a bit. I want you to feel confident by first learning that you actually can dive into these tools (by actually using these tools).

((Walk through apt update not yet using Nala.))


Updating .bashrc Files

((get clearer set of files from a fresh install))

There's no way you're going to grok these concepts on day one!
Continue through the setup process.
You will gain exposure to the Linux landscape.
Eventually, you will feel embarrassment for having been hesitant.
(if not upset when realizing people in tech just suck at communicating/gamifying)

Make mistakes, embrace the discomfort in learning!

# This text file is referenced by the terminal to now substitue the word `apt` for the word `nala`. It adds assurance that your terminal will use `nala` even if you type `apt` by mistake or habbit. 

# I learned this from Chris Titus: https://christitus.com/stop-using-apt/

# I adjusted his script to inlcuded the `full-upgrade` functionarlity.

apt() { 
  if [[ "$1" == "autoclean" || "$1" == "full-upgrade" ]]; then
    command apt "$@"
  else
    command nala "$@"
  fi
}

sudo() {
  if [[ "$1" == "apt" ]]; then
    shift
    if [[ "$1" == "autoclean" || "$1" == "full-upgrade" ]]; then
      command sudo apt "$@"
    else
      command sudo nala "$@"
    fi
  else
    command sudo "$@"
  fi
}

I learned to do this from Christ Titus (https://christitus.com/stop-using-apt/).

(( add the exceptions used in log-parsing))


Flatpak

(( split from the section from earlier? ))

You already have this in your Pop!_OS download. Look how EASY it is to install for other people. It's two terminal commands (copy/paste). A simple restart.

From https://flatpak.org/setup/Pop!_OS

((This visual is incorrect. note-to-self, fix this with the notes I made about it.))

needs organizing, and presenting

++++

List Installed Runtimes or Installed Apps

These commands list your installations:

$ flatpak list <- Runtimes & Apps

$ flatpak list --app <- Just Apps

$ flatpak list --runtime <- Just Runtimes

++++



Virtual Machines

Use these to isolate software you don't trust.

QuickEMU & QuickGUI

QuickEMU manages your VMs, both disposable or long-term.
QuickEMU GitGub | QuickGUI GitHub

sudo apt-add-repository ppa:flexiondotorg/quickemu -y
sudo add-apt-repository ppa:yannick-mauray/quickgui -y
sudo apt update
sudo apt install quickemu -y
sudo apt install quickgui

Commands Learned from Extreme Privacy Linux Devices - Digital Edition (2024)

More Context: https://yewtu.be/watch?v=Kq849CpGd88
accompanying guide: www.christitus.com/vm-setup-in-linux

((this is yet to be useful for duplicating Pop!_OS. The installer's provided. I need the installation.))

((VirtualBox is useful, I've not had it running yet.))

((VMWare is helpful for learning Security Operation Center Analysis Tier 1 skills via [...]))

((Then using QEMU's USB Passthrough for USBs))
- how to make sure those are as limited as expected.


Thunderbird

((Michael Bazzell now uses MailSpring?))

Mozilla recommends Flatpak.
Michael Bazzell recommended deb.

Two different versions.
I recommend switching the default flatpak over to Pop!_OS ( deb ).
For reason beyond my scope of competence, deb works insanely faster.
Perhaps the flatpak version is stalled by it's own architecture or my old hardware.

https://flathub.org/apps/org.mozilla.Thunderbird
Install from Flatpak (Recommended)
The Thunderbird flatpak package is maintained directly by the Thunderbird staff
  • ((cite that quote, more explicity))

Verified does not mean verified to be those people??
it means verified to be somewhere else?
Sth was off about this for me, what was it?

((if you want flatpak - knowing the full difference in function is beyone my competency. I know this, flatpak is much slower than the deb version, on my machine).

Install with the command below

flatpak install flathub org.mozilla.Thunderbird

Verify via https://flathub.org/apps/org.mozilla.Thunderbird -> then click the Drop Down Arrow -> copy that Manual Install command (the first one listed)


EteSync (or another name these days?)

.

.

Phew, getting these to synchronize.

.

Here's How to Keep EteSync Running in the Background

So Your Data Syncs In Real-Time'ish.

sth here? etesync github
  • Launch "Show Applications"
  • Search for 'startup'

Then follow these steps:

1. Click "Add"
2. Name EteSync
3.
Click "Browse"
4. Find your linux-amd64-etesync-dav file in Downloads
5. Click "Add"
6. Click "Close"

As shown below.




((save the browser for near-last setup. confidence in doing the rest will build. Save the most familiar for the end.))

Browser ~ Firefox

Referencing how browser continue to bloat alongside the increasing set of challenges in competing with a new browser, mentioned in Security Now! episode.

Re-word as necessary to avoid taking another person's quoted work. Continue filling this out. ((note to self))

  • needs reference to Michael Bazzell's personal setup.
  • add 'podman' as further separation? (possible?)

Browser DNS Settings

  • needs bit on how DNS works.....
Enabling DNS's Max Protection keeps from not having DOH which Encrypted Client Hello. (ECH) requires, as I understand it from Mozilla's post.

Browser Extensions

Weeding Out root CA's

Insert my notes here on logging SSL/TLS requests used.... into a KeeyPassXC file (if possible) or making a series of logs stored encrypted to then be later compiled and decrypted later. (I'm not sure if this is possible.)

((on mobile - this breaks Startpage's Anonymous View Services - what certificate is needed? - same for every region? - and some more noted on phone))

((did it also break sending photos via SMS? if so, which CA was that?))


Browser ~ Tor Browser

((mention funding, by what percentage from ...))

Setup and usage guidelines for Tor Browser.

((note to self, work on this))

  • needs warning about having social media accounts blocked
  • needs warning about banks making reports (search for documented policy)

Responsible Messaging

Trust is one thing, openly streaming your conversations through routers, servers, modems around the globe for anyone recording to archive that raw data is just irresponsible towards your own privacy – even complicit in nullifying the privacy of your friends or family.

Don't go Raw Dogging cellular networks.

Signal

I use Signal for people, like myself, who don't set aside enough time to tinker with computers. A phone-number is required. Today, phone-numbers are functionally Social Security Numbers.

You can buy a domain without making it a purchase of debt. You pay for the years of ownership/use, that's it. With phone-numbers, carriers offer reliable payments through crediting (debt) accounting. You are herded like cattle into this. Either disclose your Name, (residence??), SSN ((double-check this)).

SSN-requirements have been explicitly ruled against for merely doing business.
(( – Double-check this.))

Pre-pay has been doublespeak for 'intentionally a hassle to maintain'. When you sign up for a phone plan, you pay a head of your data usage? ((double-check this)), which means you actually pre-pay for that month..... people running those carriers Gotcha!

((update on usernames....))

Signal-Desktop | logo

~ VERIFY SIGNAL'S COMMANDS FOR YOURSELF ~

4 Steps Process ~ enter one command at a time

wget -O- https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor > signal-desktop-keyring.gpg


cat signal-desktop-keyring.gpg | sudo tee /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null


echo \'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main\' |
sudo tee /etc/apt/sources.list.d/signal-xenial.list


sudo apt update && sudo apt install signal-desktop

Commands quoted from From Signal's website.

Here Are Those Commands Separated by Bullet Points:

  • wget -O- https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor > signal-desktop-keyring.gpg
  • cat signal-desktop-keyring.gpg | sudo tee /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null
  • echo \'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main\' |
    sudo tee /etc/apt/sources.list.d/signal-xenial.list
  • sudo apt update && sudo apt install signal-desktop

~ Reason Behind Each Command ~ (click to expand)

STEP 1

This downloads the Signal desktop apt repository key and converts it into a format suitable for use with 'apt'.

STEP 2

  • cat signal-desktop-keyring.gpg | sudo tee /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null

This copies the key into your /usr/share/keyrings directory, a common location for trusted keys on a Linux system.

STEP 3

This specifies which version of Signal you use,
which Signal URL to load,
where to find your copy of Signal's key to verify an update's authenticity.

STEP 4

  • sudo apt update && sudo apt install signal-desktop

Oddly, after all that, the apt package manager remains useless to install Signal. You added the repository (server identification).

Now you need to use the 'apt update' command because the apt package manager will add lengthy text-files about Signal's repository {hash values, software's owner information, etc}.

~ DO VERIFY SIGNAL'S COMMANDS FOR YOURSELF ~

Wire

For me, Wire continues to not send me every push-notification. I don't know if the push-notification broker-services are intentionally screwing with Wire or if it's another reason.

For the reliability in receiving push-notifications, I prefer using Signal with family-&-friends. However, Wire will remain on my proverbial tool-belt.

.... interesting connections between companies and people..... the context of time seems to not be an issue. ((((((((((( in my notes ))))))))))))

To Make Account Without Phone Number ~ URL:
[app.wire.com/auth/#setaccounttype]

Get the most recent release. If you want the Screen Sharing feature, I've not yet set that up for myself. In the meantime you can contact support if you have issues. I'll want to try this out myself, I hope I don't forget.

Download the App to Access From Your Desktop
Here is how you navigate the website to it's GitHub to it's software download for Linux.
- Visit download page: https://wire.com/en/app-download
- Transfer to Wire's GitHub Page: https://github.com/wireapp/wire-desktop
- Parse Through the Releases: https://github.com/wireapp/wire-desktop/releases

(( note to self, This isn't a game of I-Spy so redo screenshots annotated with arrows.))


Private Calendar Access

Syncs without spyware i.e. Google, Apple, Microsoft.

Syncs without your calendar being used in Training Ai models.

Is that an issue? -> you tell me ((link to issues in Japanese medical Ai models, validate the news authenticity - I heard about this in detail, briefly.))

Would those 'Companies' really be so daft as to do this with your 'data'?
-> phfts ((not even sure what to put here, there's so much, it may be a distraction.))

EteSync

((several things to sort out in here.))

Shown here: https://github.com/etesync/etesync-dav/blob/master/README.md#configuration-and-running

Archive The EteSync Wiki

"Clone this wiki locally"

user@pop-os:~$ pushd ~/Documents/1776_Linux
~/Documents/1776_Linux ~
user@pop-os:~/Documents/1776_Linux$ 
user@pop-os:~/Documents/1776_Linux$ 
user@pop-os:~/Documents/1776_Linux$ git clone https://github.com/etesync/etesync-dav.wiki.git
Cloning into 'etesync-dav.wiki'...
remote: Enumerating objects: 30, done.
remote: Total 30 (delta 0), reused 0 (delta 0), pack-reused 30
Receiving objects: 100% (30/30), 6.40 KiB | 1.07 MiB/s, done.
Resolving deltas: 100% (15/15), done.
user@pop-os:~/Documents/1776_Linux$ 
user@pop-os:~/Documents/1776_Linux$ 
user@pop-os:~/Documents/1776_Linux$ 
There it is!


Content Gathering-&-Creating

(( build out that pipe line. need this ASAP for offline cataloguing, transcribing, etc.
So much to consider yet so little time. locking down the net has started, ISP lock-down I suspect is in effect on theoretical planning. I suspect people complicit in this have worked out how to lock it down and tested those methods to function in parallel with how open it is at-the-moment. buuuuuuuut need to dig into soooooo much material, documentation, policy changes, etc to even start making those assertions.))


Email Archiving

Thunderbird & Proton Mail Bridge

Gnome Circle's Email?
(((Make sure to say GNOME Circle instead of GNOME where relevant.
Be crystal clear.)))


Maintenance and Updates

Greg Kroah-Hartman (Kernel Maintainer & Fellow with The Linux Foundation)
((cite))

Kernel Security Policy:

Almost all bugs can be "security" issue.

((- TIFTFY because which bugs couldn't? - I'm not formally educated on this topic. ))

Mr. Kroah-Hartman has made this crystal clear several times;

Where is the talk where he physically demonstrates the purpose for the policy?
He used one of Google's phone's?

((use Gallery of Screenshots.
Don't hyperlink the images to avoid misunderstanding what it means to click/tap an image.))


Trust, But Verify

A moment to re-iterate what you've done so far.
A moment to connect these concepts together.
A moment to demystify terminal and directories.

Look At Your Auto-start Services.

Where have these configurations been stored on the system?
Pop!_OS uses ~/.config/autosatart/ to find services you picked for auto-starting.

Dip your toes back into the terminal again with these commands,

user@pop-os:~$
user@pop-os:~$
user@pop-os:~$ pushd ~/.config/autostart/
~/.config/autostart ~
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$ ls
linux-amd64-etesync-dav.desktop 'Proton Mail Bridge.desktop'
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$

user@pop-os:~$ 
user@pop-os:~$ 
user@pop-os:~$ pushd ~/.config/autostart/
~/.config/autostart ~
user@pop-os:~/.config/autostart$ 
user@pop-os:~/.config/autostart$ 
user@pop-os:~/.config/autostart$ ls
 linux-amd64-etesync-dav.desktop  'Proton Mail Bridge.desktop'
user@pop-os:~/.config/autostart$ 
user@pop-os:~/.config/autostart$ 

((not sure which HTML representation to choose. the B&W looks dope af))
((will likely go with that to help expand capacity to read terminal outputs via exposure to additional methods to present it.))

In the File Explorer,
- Be sure you can see hidden files ((link to how))
- Click "Home" from the menu on the left
- Open ".config" directory (a.k.a. folder)
- Open "autostart" directory


Ai Poisioning

And so it begins. Yeah, people who fend to seperate their work, property, data from Ai will be accused of being luddite. Careful with that term. I'm not sure it means willing to fend off, but rather concer for lose of life in fatal working conditions during the industrial revolution. ((double check this))

Mental Outlaw shares tools for people to poison Ai from mimicking style.

(((Topic goes deeper)))


Prose to develop ((note to self))

Seemingly endless prose continues to publish on video hosting services.

((A tricky sea to navigate.))

https://youtu.be/rCZDV6RIaxA - I'm not sure what the current status is for these events.

. https://youtu.be/rCZDV6RIaxA


Appendix & Additions

Additional Context - like a bibliography.

Unredacted Magazine

Discontinued until enough article submissions are received. I'm baffled how quite the audience. Are they not receiving enough submissions or is the company quietly letting the magazine-project go to sleep?

Given the IBM Leaks – it's likely people aren't willing to submit articles else they can't avoid inadvertently blowing the whistle on what's going on in their own employment-environment (as that would be the place they have the most insight into).
(((find in my notes the source-material for this paragraph)))

Remove Dossiers On You Before It's Used To Train Ai

((need heavy heavy heavy citation for this, straight from the industry-horses mouth))

Requires Your Time & Effort ~ Free Workbook Updates

Read The Books Which Helped Me

I HIGHLY RECOMMENCED purchasing this content.
- Include Whitney Webb's relevant books (perspective)
- Included other books on shelf.
- and more...

IntelTechniques sells these two books as PDFs ~ Reissued Digital PDF Editions