1776_Linux
Privacy wasn't valuable enough to protect at each encounter until decades after loosing it. Subtle instances of sharing usage data were negligible until over time the consequences meant privacy wasn't possible; even when desired.
'1776' Silliness aside, here are tools, tips, tricks to regain your online sense of self-respect.
MUCH of my technical segments I credit to Michael Bazzell.
There's SO MUCH MORE in his PDFs which go beyond the scope, here.
VOIP Services | Email Domain Services | SO MUCH MORE
Extreme Privacy series ~ Linux Devices - Digital Edition (2024)
Michael Bazzell shared his own personal Linux setup (pg. 12, yr. 2022).
These are linked in the Appendix.
I'm going to cite as much as possible, an effort inspired from the efforts made by Whitney Webb and by Mark Goodwin in their long-form article 'Unmasking Farmington: FTX, Fluent Finance and the Coming Digital Dollar'.
Unfortunately, I do not know how to remove the reference breadcrumb added to the URLs you'll find on this page. ((Perhaps I could add a DNS filter-tool for removing it along with Share ID's from social media platforms.....))
Editorial Examples
This verbose paragraph:
- The tool used to guide this electricity around is called the kernel. IDK where people got these names. The kernel (Linux) guides the electricity from the stroke of a keyboard to trigger letters being displayed on your computer screen. It sends the electricity around the to get processed by computer chips that then send it back out to your screen so you can read what you're typing.he kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen. It's FAST! It sends the electricity around the to get processed by computer chips that then send it back out to your screen so you can read what you're typing.
Was re-written in brevity:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen. It's FAST!
Then re-written for a more accurate, smoother reading experience: Then was re-written to have a more accurate, smoother reading experience: smoother cognitive processing:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until the screen displays those letters. It's FAST!
Then re-written again for prioritize the result over the initiating behavior:
- The kernel (Linux) guides your electricity from your stroke of the keyboard through the laptop's computer-chips until those letters are displayed on the screen
Then re-written for grammatical consistency:
- The kernel (Linux) guides electricity from your stroke of the keyboard through your laptop's computer-chips until the letter displays on your screen.
Then re-written to consider what the reader may prefer from my perspective:
- The kernel (Linux) guides electricity from your stroke of the keyboard through your computer-chips (on the motherboard) until that letter displays on your screen.
It reads as if "your" was used too much. but I'll wait for feedback before assuming.
This is how I write
- concept
- brevity
- accuracy
- theory of mind
- proof-reading
Note to Self
Check for missing nuances (in your notes) before considering this a final template ready to grow from.
Sources: where do these shine?
beginning or end? (for sure throughout)
- source material
- material from which I was lead to the source.
Values ( find an acronym for this.)
- Avoid Mistakes
- Reliability
- Verify
find which values, or each, to instill as the reason for these approaches.
It's not about he tools, or tech, it's about he human stories (we are humans, after all).
Find the notes in the Star Trek scripts on this mentioned by Steve Gibson (IIRC).
- Invidious - instead of a Firefox addon, can this be made as a network software to trigger when network speeds drop-for-a-duration-during-video-download to avoid further fingerprinting the browser? To avoid further trusting outside software?
- https://news.ycombinator.com/item?id=36589002 - Flatpak might need flatpak.builder setup.
- Visual is technically incorrect. fix this with notes you made about it.
- suggest, aliasing plurals in with singulars.
It's plural forremotes
.
"" Manage remote repositories
"" remotes List all configured remotes
- Offer documentation edits to Flatpak.
- test Kloak as a service.
- turn this (and the rest) into a screenshot of the source wording. the commands then placed in one code-block.)
- add an exception as to when the software is desired. i.e. the web-page with each window interacting with moving graphics.
- where's the notes on baseline software loaded, like flatpak... I get the complicated nature with languages as interpreted from lower-level behaviors, but still, landscape lacks fences for laymen?
- Firefox (complete overhaul, walkthrough)
- Podman - learn to export Firefox Profiles.
- Podman - learn to import Firefox Profiles.
- Repeat to values
- Flatpak
- De-clutter: remove the "libraries of commands" out from under 'APT' side.
- Organize into Coherency, the 'Population Targeting ~ Social Targeting' segment.
- Nala adds color <- re-write to as "(author(s) added color...)"
- Further simplify the segment on '~ Reason Behind Each Command ~ (click to expand)' using the words {apt, repository, key} without first introducing those concepts in the first step.
- Add UI process of pinning software to the taskbar.
- Add DNS filter to remove references or Share ID's from social media platforms.
- Kloak
- add hash-checks on downloaded material.
- Wire
- Which was it I installed,.deb
or.appimage
?
- Get the Screen Sharing Feature working.
- Test the Screen Sharing Feature
- Does it share the screen to a mobile app? - Make sure 'What You'll Get' segment has its pieces provided to completion. and each tool in it's benefit-purpose-category.
- make an Anki-set for remembering what you (mostly for myself) have setup and to remember all these darn reasons for each reasons. locally running quiz like Signal Messenger provides for remembering its PIN code.
- Reminder for the story time and passwords, have reminders set up on phone/computer. It'll be as important as doing your personal access to your computer depends on it. Who knows when you'll go three months without your computer. Don't let 3 months of vacation (chosen or coerced) keep you forever locked out. Yeh, you'll have those written out, and yet --- shit happens.
- ((Don't say 'sandbox')) not yet sure what to say instead.
- In with - Nala and - Bat, sent to friend in Wire, Look at that terminal-lady's work.
- KISS - Keep It Separate, Silly <- add to security field as a phrase. Simple and Separate, key concepts. - regarding how I manage updates for this walk-through. - Can I share how I plan to do this?
- When presenting an Image or Gallery of Screenshots, don't hyperlink the images. Avoid misunderstanding what it means to click/tap an image. What's the UX with hyperlinked vs not hyperlinked.
- Michael Bazzell still using MailSpring rather than Thunderbird?
What's the longevity for MailSpring?
Portion of UNREDACTED ISSUE 003 <- read from here. - Start Classifying Software as Identity Archiving Software, the products requiring ID-Proxies.
- Show where LLM's were useful for me in elucidating CLI. Which of that was generated, which of that I re-wrote. I recall having re-written it all buuuut not sure, need to double-check.
- ...
What You'll Have
Memory Toolkit
- EFF Diceware
- STORY TIME!!
(better than what "professionals" are giving you)
(I need to re-check the entropy, IIRC it's higher than expected.... but I don't do maths.)
Operating System
- Pop!_OS
Networking
- NextDNS
- ProtonVPN
- Firefox
- Root CA Trimmer (custom built, to do)
Readable Terminal
- Nala
- Bat
Hardware Obfuscators
- Kloak
- Macchanger
- Host-name Swap-Script
Password Managers
- KeePassXC
- Bitwarden
- Organized Folder Templating ((where are my notes for this one?))
Application Managers
- AppImageLauncher
- Flatseal
Messaging
- Signal
- Wire
Document Sanitizer
- DangerZone
- Metadata Cleaner
Note Taking
- Diagramming tools (add from other book - also cite that book)
Scan and Generate QR Codes
- Decoder - link
Maintenance & Updates
- scripts & apps you build ((phew that'll be a segment, eh, cracks knuckles))
My Go-To Sources
- (the people & materials) not sure if this will differ from the appendix, or the appendix will format to this purpose.
Figure Out Where These Go
- Thunderbird, EteSync, EteBase?
- Are these relevant?
- GNOME Boxes
- GNOME Apps
- Newsfeed
- Podcasts
- Obsidian?
- PDFArranger and more
- Kdenlive with automated transcriptions
- LLM Studio if applicable
Your Research ~ Tools for Your Tool-belt:
- Startpage.com
- Startpage absorbs the track-&-trace browser-cookies onto its servers so you don't have to. Avoid a website injecting data without your consent.
- [https://www.startpage.com/] - Swisscows.com
- When websites block Startpage at least you can use Swisscows to look at a screenshot.
- [https://swisscows.com] - Sci-Hub.se
- A beautiful Ui/Ux front-end to read scientific papers, monographs, – even monologues.
- [https://sci-hub.se/] - See the backup links [https://sci-hub.se/mirrors] - Invidious.io
- I often use → yewtu.be → to {Browse, Watch, Share} YouTube videos privately.
Less Google / YouTube cyber-stalking.
- When yewtu.be goes down or takes a long time to get back up here is your list for more [https://docs.invidious.io/instances/].
Invidious
Mitigating Risk
Here are various risks happening right now, to help motivate you into seeing this through.
Population Targeting ~ Social Targeting
- What is going on?
- All of this I need to verify, until then, here's interesting leads.
- ((make this one gallery or a series of galleries. reduce the amount of emphasis.))
- keep the first photo as the single, and the rest into a gallery.
- when making the gallery, re-snapshot those articles to have the brand in photo, to compensate for not being able to caption individual photos in a gallery.
Websites Smuggling Malware ~ Dog-Piling
(( need to cite this carefully ))
When software exports your information without consent – it's malware.
Operating systems continue to improve (fingers crossed) as more people become aware of the tools we use {Email, Browsers, Backups, . . .}. Until we see improvements in restrictions, browsers will bloat to serve features-and-code both nullifying privacy or introducing security-mistakes. uBlock Origin is a tool for restricting Firefox closer to its core-feature, a GUI into servers (i.e. loading webpages, facilitating logins). uBlock Origin prohibits Firefox from loading categories of software known-to-be-malicious without our consent.
More on this, later. Let's continue.
Falling Out-of-Date
((the segment on Security Now! on this, Cetrix(?) second-coverage within past 3 months?))
This was intrusive. The current state of our operating systems continue to improve as more of us become aware of the tools we use (i.e. our computers, our internet).
It's a simple way to stay in the loop of any updates or changes which will effect you. As Vector Databases (multi-matrix) become more feasible to self-host, Generative Ai will shorten the gap between updates-&-exploits. It'll be important to update before you get exploited. It's not as difficult for you as it sounds – I hope.
((did I introduce LLM, Ai (machine learning) with technical accuracy?))
Shown later on, you'll learn to curate a news-feed listening for
- security patches ((need to find these))
- additional features ((need to find these))
- maintenance updates. ((need to find these))
Closed Source Operating Systems Compromised by with Ai
If Ai can make video this passable before March 2024, what do you think people are up to behind the scenes with ((suspicious-of-being)) Government Malware?
More on efforts to build tools which throw off Machine Learning (a.k.a Ai) for people wanting to poison data-models using their art without consent. Best of luck to you who strive to achieve those efforts. I have no idea where events go from here.
What is Linux?
Linux is a tool used to guide electricity around, like how switches on a wall turn the lights on and off. Microsoft's {Windows OS} & Apple's {macOS, iOS} are also tools to guide electricity around except those have the explicit intent to to install, modify, and extract both the software or data in-and-out without your consent. ((time pull up sources from years of notes, don't let me forget. must be as direct-source-heavy as possible))
Essentially, those operating systems are corporate malware.
But, that's just an opinion, of course, based on the fact that it takes data without consent, installs software without consent, and injects data without consent. – just my naive, non-educated, unemployed, not-professional opinion.
The tool used to guide this electricity around is called the kernel.
I do not know where this name came from.
The kernel (Linux) guides electricity from your stroke of the keyboard through your computer-chips (on the motherboard) until that letter displays on your screen. It's FAST!
Linux also manages the proverbial light-switches popping on-and-off-and-on automatically behind the scenes {adjusting the clock, maintaining WiFi-connection, loading video game graphics}.
More on this later, when I've got my notes further transposed.
This operating system setup uses Pop!_OS which is a modified version of Ubuntu, which is a modified version of Debian. When you read Debian, think 'yes that's me!'
((move up above the "What Is Linux" segment))
Pop_OS!
Keep It Simple Silly!
Pop_OS!
- automates updates
- intuitive interface
- meets familiar expectations
((Grab my own screenshot highlighting the Intel option))
((walk-through setup process, username))
Reduce Dependencies on any one Tech-Stack
((introduce the philosophy,
- here the mobile apps that sell out from underneath users,
- ransomware causing service outages
- etc.))
((do make reminders about this philosophy throughout this walk-through))
Leave Negativity For The Traumatized
Don't whine.
Rather than assuming people don't care about privacy, it's far more likely people didn't realize their privacy existed, i.e. I didn't know my privacy online was thing until people me about efforts to remove it.
account naming convention
Here, it's Privacy that's not Reproducible.
Software and Applications are given access to cognitive fingerprinting {naming-conventions, stylography,
((needs adjusting and op-sec assessing))
Privacy needs to be a bit clearer.
It's not private if you don't realize when nor where that info is actively leaked.
People won't respect their privacy if they don't know it ever existed. Just because you're writing a document does not by default mean you want people to identify the computer's account stylography with the document. To put it into simple terms for the simpletons in the front of the class – double check what names to use and when for first time setups. People won't respect their privacy if they didn't know it ever existed.
Looks like a similar situation of lacking the will to confront the how-things-are for how-things-ought-to-be (which are very-very different) to the situation of timestamps being littered throughout Debian-based packages preventing Reproducibility.
((grab one of those videos, preferably one given inside and watch it for sentiment - clear sentiment.))
Making a Archive of Your Original Packages
Compare with What You're About to Prepare.
((could look at Pop!_OS GitHub, eh?))
Distinguishing default software from your chosen software is a quick confidence-booster activity. First, you list what Debian, Ubuntu, Ssytem76 have installed.
Make a text file.
((not yet organized on these.))
user@pop-os:~$ comm -23 <(apt-mark showmanual | sort -u) <(gzip -dc /var/log/installer/initial-status.gz | sed -n 's/^Package: //p' | sort -u)
user@pop-os:~$ sudo apt list --installed | less
user@pop-os:~$ dpkg --get-selections | grep -v deinstall | less
These don't yet create list-files.
((configure system's DNS before this or any other installations.))
Kloak
I put this here because you'll want to know sooner than later if it causes issues with your keyboard. ((add troubleshooting segment-page.))
Websites put software on your computer, without your consent, without you knowing.
((what was the reason for putting that sentence here?))
Duh, but... to track your keyboard strokes?
Your typing is unique.
Finger muscles developed differently.
A person who plays guitar types differently.
A person who can knit types differently
A person who can do both types differently.
A person who does neither types differently.
Below are commands & comments quoted from GitHub.
. . . . What is GitHub? → [here's a clue] ← . . . . Shout out to that guy!
Install Kloak ~ Run as a Service
Services are running behind the scenes. Running automatically, you don't need to activate any. You simply specify on which mile-stone (a.k.a. a target) the service will activate.
For example, when computers boot up there are mile-stones along the way; much like checkpoints in a video-game. These are called targets. At least in Pop!_OS, these are targets.
[Install] WantedBy=multi-user.target
((screenshot the .service
file, and blur the rest of it to focus on this bit, use the blur tool?))
That is from the .service
file on Kloak's GitHub.
Reach your target, start your Kloak. It's a service running in the background.
When the computer reaches the target of finally being ready for people to start using it, the operating system looks for services asking to start at this specific mile-stone. Kloak is one of those services.
Kloak kicks into gear, identifying the keyboard, grabbing-and-releasing keystrokes.
How it works
The time between key press and release events are typically used to identify users by their typing behavior. kloak
obfuscates these time intervals by introducing a random delay between the physical key events and the arrival of key events at the application, for example a web browser.
kloak
grabs the input device and writes delayed key events to the output device. Grabbing the device disables any other application from reading the events. Events are scheduled to be released in a separate thread, where a random delay is introduced before they are written to a user-level input device viauinput
. This was inspired from kbd-mangler.
((clarify the language here?))
Terminal Commands quoted from Whonix GitHub page.
Temporary Kloak ~ Run as an Application
Applications are like phone apps. Apps on your phone start running when you open the app. Immediately after turning your phone on, your apps don't try to open up all at once. You have to tap an app to use it. Same with Linux software.
"Apps" is a word to describe software that requires manual activation.
If you use the Application method, every time you turn you computer back on you'll need to manually activate Kloak.
You'll need to have your terminal pointed to the same directory as the built Kloak file.
((Use this as the moment to share how this is a commonly unspoken requirement. sth.))
Reason for Commands
Pop!_OS is made from Debian.
Debian references are for you.
This are for installing as an app (which needs starting on every boot).
I've not installed it myself yet as a "As a service" which runs all the time.
Segment quoted from https://github.com/Whonix/kloak
Debian:
$ sudo apt install devscripts
$ sudo mk-build-deps --remove --install
First, compile kloak
and the event capture tool eventcap
:
$ make all
Next, start kloak
as root. This typically must run as root because kloak
reads from and writes to device files:
$ sudo ./kloak
If you start kloak
and lose control of your keyboard, pressing RShift + LShift + Esc will exit. You can specify the rescue key combination with the -k
option.
Applications are the programs you apply like paint, tape, or makeup. You temporarily apply and then later remove.
- Manual Activation and icons you click on. a bed and breakfast, it can be running in the background serving strangers. it's the service that starts upon waking up the computer – much like breakfast being serviced upon people waking up at a Bed and Breakfast).
((remove application portion?))
Trust Then Verify
Is Kloak running on it's own, "enabled"?
Try this terminal command. Hope you see "enabled" returned to you,
user@pop-os:~$ systemctl is-enabled kloak.service
enabled
If you received "disabled" it was not triggered to start, or simply didn't start.
((add more nuance to that last statement, and nuance to what enabled means - as far as running or signaled to run. What is the way to verify the outputs are reaching me, i.e. obfuscation is actually happening rather than being implicitly reported as 'should be happening'?))
Check Kloak's listing in SystemD
user@pop-os:~$ systemctl list-dependencies multi-user.target multi-user.target ● ├─apport.service ● ├─avahi-daemon.service ● ├─binfmt-support.service ● ├─chrony.service ● ├─com.system76.PowerDaemon.service ● ├─com.system76.Scheduler.service ● ├─com.system76.SystemUpdater.service ● ├─console-setup.service ● ├─cron.service ● ├─cups-browsed.service ● ├─cups.path ● ├─cups.service ● ├─dbus-broker.service ○ ├─dmesg.service ○ ├─e2scrub_reap.service ○ ├─grub-common.service ○ ├─grub-initrd-fallback.service ● ├─kloak.service ● ├─ModemManager.service ● ├─networkd-dispatcher.service ● ├─networking.service ● ├─NetworkManager.service user@pop-os:~$
Flatpak Packages
(you likely won't have these yet. consider this foreshadowing).
user@pop-os:~$ sudo apt list --installed | less user@pop-os:~$ ls anaconda3 Pictures app popos-22.04-intel Applications popos-22.04-intel.conf 'Calibre Library' Projects derivative.asc Public Desktop README.md Documents requirements.txt Downloads sfdsafsaf.cmb fpf-apt-tools-archive-keyring.gpg~ sfdsafsaf.ui HCFlow_Assets signal-desktop-keyring.gpg kloak Templates less tests main.py 'Untitled Document 1' Monero Upscale_Images monero_add_to_custom_location.txt Videos Music user@pop-os:~$ flatpak list -a |cut -f2 |sort -u >> flatpak.lst user@pop-os:~$ ls anaconda3 Music app Pictures Applications popos-22.04-intel 'Calibre Library' popos-22.04-intel.conf derivative.asc Projects Desktop Public Documents README.md Downloads requirements.txt flatpak.lst sfdsafsaf.cmb fpf-apt-tools-archive-keyring.gpg~ sfdsafsaf.ui HCFlow_Assets signal-desktop-keyring.gpg kloak Templates less tests main.py 'Untitled Document 1' Monero Upscale_Images monero_add_to_custom_location.txt Videos user@pop-os:~$ bat flatpak.lst user@pop-os:~$
user@pop-os:~/Documents/Pop_OS_Setup$ flatpak list --app Name Application ID Version Branch Origin Installation Cambalache ar.xjuan.Cambalache 0.16.0 stable flathub user Decoder com.belmoussaoui.Decoder 0.4.1 stable flathub user calibre com.calibre_ebook.calibre 7.4.0 stable flathub user Discord com.discordapp.Discord 0.0.41 stable flathub user PDF Arranger com.github.jeromerobert.pdfarranger 1.10.1 stable flathub user Flatseal com.github.tchx84.Flatseal 2.1.0 stable flathub user OBS Studio com.obsproject.Studio 30.0.2 stable flathub user Metadata Cleaner fr.romainvigier.MetadataCleaner 2.5.4 stable flathub user NewsFlash io.gitlab.news_flash.NewsFlash 3.0.2 stable flathub user Builder org.flatpak.Builder stable flathub user Hello org.flatpak.Hello master hello-origin user FreeFileSync org.freefilesync.FreeFileSync 13.3 stable flathub user GNU Image Manipulation Program org.gimp.GIMP 2.10.36 stable flathub user Builder org.gnome.Builder 45.0 stable flathub user Déjà Dup Backups org.gnome.DejaDup 45.2 stable flathub user Devhelp org.gnome.Devhelp 43.0 stable flathub user GtkHash org.gtkhash.gtkhash 1.5 stable flathub user Inkscape org.inkscape.Inkscape 1.3.2 stable flathub user Kleopatra org.kde.kleopatra 3.1.28.230804 stable flathub user OnionShare org.onionshare.OnionShare 2.6 stable flathub user ONLYOFFICE Desktop Editors org.onlyoffice.desktopeditors 7.5.1 stable flathub user Workbench re.sonny.Workbench 45.4 stable flathub user
Internet Connections
You'll customize an operating system built and maintained by the System76 team.
VPN & DNS
For in-depth introduction to VPN & DNS technology, please purchase the VPNs & Firewalls PDF published by the IntelTechniques team. I think it serves you with clearer technical information for you. I haven't purchased it, yet.
Pairing a VPN to series of DNS providers will reduce the automating logging you're caught in. When a computer boots-up, it reaches out to verify it's clock. When a computer updates, it reaches out to verify it's version. ((link the segment in the talk mentioning how the number of update-queries is extrapolated to a number of users.)
(((need to deeply break this down, in brevity))
((links to each sentence/statement.))
ProtonVPN
As recommended by System76 itself:
https://support.system76.com/articles/use-vpn-software
...
NextDNS
For in-depth introduction to Domain Name Services, please purchase the Linux PDF published by the IntelTechniques team. Their VPNs & Firewalls PDF may have more info on using DNS as a Firewall (hence "Firewalls" in the name) however I don't know for sure because I haven't purchased it, yet.
((work on self-hosting resolver?))
Email as an Alias
Various accounts and services require an email..... let's set it up.
There are accusations arising about ProtonVPN being .... (((link video)))
I'm not sure what to make of it, ProtonMail is better than the other options I know how to use.
ProtonMail
- ...
Your Terminal As A Word-Processor
The trick is knowing how to phrase commands. It's learned from making mistakes.
((introduce sooner, with host-name randomize-tool ~ build the confidence early))
GNOME Screenshot ~ How To Assemble It Yourself!
I like this tool because I haven't found it's metadata to leak identifiers, aside from the tool itself which tells anyone interested that I'm likely using ....
((link to the GNU Software distinction. here works to help not overload anyone with too much information.))
(((Here introduce the navigating the Software installer , GitHub, FlatHub, as to which to build from.))
- (((Build something quick to get the confidence up whilst lowering fear of the unknown)))
Nala ~ Making apt
Readable
This tool reduces clutter on your terminal. It also adds color. It's the pretty presentation you'll see in the terminal similar to graphics in a video-game. The presentation is called the front-end because it is the face of the product. It faces you.
((Walk through apt update
not yet using Nala.))
Updating .bashrc
Files
There's no way you're going to grok these concepts on day one!
Continue through the setup process.
You will gain exposure to the Linux landscape.
Eventually, you will feel embarrassment for having been hesitant.
(if not upset when realizing people in tech just suck at communicating/gamifying)
Make mistakes, embrace the discomfort in learning!
(( add the exceptions used in log-parsing))
Flatpak
(( split from the section from earlier? ))
You already have this in your Pop!_OS download. Look how EASY it is to install for other people. It's two terminal commands (copy/paste). A simple restart.
needs organizing, and presenting
++++
List Installed Runtimes or Installed Apps
These commands list your installations:
$ flatpak list
<- Runtimes & Apps
$ flatpak list --app
<- Just Apps
$ flatpak list --runtime
<- Just Runtimes
++++
Virtual Machines
Use these to isolate software you don't trust.
QuickEMU & QuickGUI
QuickEMU manages your VMs, both disposable or long-term.
QuickEMU GitGub | QuickGUI GitHub
More Context: https://yewtu.be/watch?v=Kq849CpGd88
accompanying guide: www.christitus.com/vm-setup-in-linux
((this is yet to be useful for duplicating Pop!_OS. The installer's provided. I need the installation.))
((VirtualBox is useful, I've not had it running yet.))
((VMWare is helpful for learning Security Operation Center Analysis Tier 1 skills via [...]))
((Then using QEMU's USB Passthrough for USBs))
- how to make sure those are as limited as expected.
Thunderbird
((Michael Bazzell now uses MailSpring?))
Mozilla recommends Flatpak
.
Michael Bazzell recommended deb
.
Two different versions.
I recommend switching the default flatpak
over to Pop!_OS ( deb
).
For reason beyond my scope of competence, deb
works insanely faster.
Perhaps the flatpak
version is stalled by it's own architecture or my old hardware.
Install from Flatpak (Recommended)
The Thunderbird flatpak package is maintained directly by the Thunderbird staff
- ((cite that quote, more explicity))
Verified does not mean verified to be those people??
it means verified to be somewhere else?
Sth was off about this for me, what was it?
((if you want flatpak - knowing the full difference in function is beyone my competency. I know this, flatpak is much slower than the deb
version, on my machine).
Install with the command below
EteSync (or another name these days?)
.
.
Phew, getting these to synchronize.
.
Here's How to Keep EteSync Running in the Background
So Your Data Syncs In Real-Time'ish.
- Launch "Show Applications"
- Search for 'startup'
Then follow these steps:
1. Click "Add"
2. Name EteSync
3. Click "Browse"
4. Find your linux-amd64-etesync-dav file in Downloads
5. Click "Add"
6. Click "Close"
As shown below.
((save the browser for near-last setup. confidence in doing the rest will build. Save the most familiar for the end.))
Browser ~ Firefox
Referencing how browser continue to bloat alongside the increasing set of challenges in competing with a new browser, mentioned in Security Now! episode.
Re-word as necessary to avoid taking another person's quoted work. Continue filling this out. ((note to self))
- needs reference to Michael Bazzell's personal setup.
- add 'podman' as further separation? (possible?)
Browser DNS Settings
- needs bit on how DNS works.....
Browser Extensions
- uBlock Origin ~ by Raymond Hill
[Install uBlock Origin Here]
there's a different extension with a similar name. - Multi-Account Containers ~ by Mozilla Firefox
[Install Multi-Account Containers Here] - Privacy Badger
because uBlock Origin does/doesn't do what it does?
Weeding Out root CA's
Insert my notes here on logging SSL/TLS requests used.... into a KeeyPassXC file (if possible) or making a series of logs stored encrypted to then be later compiled and decrypted later. (I'm not sure if this is possible.)
((on mobile - this breaks Startpage's Anonymous View Services - what certificate is needed? - same for every region? - and some more noted on phone))
((did it also break sending photos via SMS? if so, which CA was that?))
Browser ~ Tor Browser
((mention funding, by what percentage from ...))
Setup and usage guidelines for Tor Browser.
((note to self, work on this))
- needs warning about having social media accounts blocked
- needs warning about banks making reports (search for documented policy)
Responsible Messaging
Trust is one thing, openly streaming your conversations through routers, servers, modems around the globe for anyone recording to archive that raw data is just irresponsible towards your own privacy – even complicit in nullifying the privacy of your friends or family.
Don't go Raw Dogging cellular networks.
Signal
I use Signal for people, like myself, who don't set aside enough time to tinker with computers. A phone-number is required. Today, phone-numbers are functionally Social Security Numbers.
You can buy a domain without making it a purchase of debt. You pay for the years of ownership/use, that's it. With phone-numbers, carriers offer reliable payments through crediting (debt) accounting. You are herded like cattle into this. Either disclose your Name, (residence??), SSN ((double-check this)).
SSN-requirements have been explicitly ruled against for merely doing business.
(( – Double-check this.))
Pre-pay has been doublespeak for 'intentionally a hassle to maintain'. When you sign up for a phone plan, you pay a head of your data usage? ((double-check this)), which means you actually pre-pay for that month..... people running those carriers Gotcha!
((update on usernames....))
~ VERIFY SIGNAL'S COMMANDS FOR YOURSELF ~
4 Steps Process ~ enter one command at a time
Here Are Those Commands Separated by Bullet Points:
- wget -O- https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor > signal-desktop-keyring.gpg
- cat signal-desktop-keyring.gpg | sudo tee /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null
- echo \'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main\' |
sudo tee /etc/apt/sources.list.d/signal-xenial.list - sudo apt update && sudo apt install signal-desktop
~ Reason Behind Each Command ~ (click to expand)
STEP 1
- wget -O- https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor > signal-desktop-keyring.gpg
This downloads the Signal desktop apt repository key and converts it into a format suitable for use with 'apt'.
STEP 2
- cat signal-desktop-keyring.gpg | sudo tee /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null
This copies the key into your /usr/share/keyrings
directory, a common location for trusted keys on a Linux system.
STEP 3
- echo \'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main\' |
sudo tee /etc/apt/sources.list.d/signal-xenial.list
This specifies which version of Signal you use,
which Signal URL to load,
where to find your copy of Signal's key to verify an update's authenticity.
STEP 4
- sudo apt update && sudo apt install signal-desktop
Oddly, after all that, the apt package manager remains useless to install Signal. You added the repository (server identification).
Now you need to use the 'apt update' command because the apt package manager will add lengthy text-files about Signal's repository {hash values, software's owner information, etc}.
~ DO VERIFY SIGNAL'S COMMANDS FOR YOURSELF ~
Wire
For me, Wire continues to not send me every push-notification. I don't know if the push-notification broker-services are intentionally screwing with Wire or if it's another reason.
For the reliability in receiving push-notifications, I prefer using Signal with family-&-friends. However, Wire will remain on my proverbial tool-belt.
.... interesting connections between companies and people..... the context of time seems to not be an issue. ((((((((((( in my notes ))))))))))))
To Make Account Without Phone Number ~ URL:
[app.wire.com/auth/#setaccounttype]
Get the most recent release. If you want the Screen Sharing feature, I've not yet set that up for myself. In the meantime you can contact support if you have issues. I'll want to try this out myself, I hope I don't forget.
Download the App to Access From Your Desktop
Here is how you navigate the website to it's GitHub to it's software download for Linux.
- Visit download page: https://wire.com/en/app-download
- Transfer to Wire's GitHub Page: https://github.com/wireapp/wire-desktop
- Parse Through the Releases: https://github.com/wireapp/wire-desktop/releases
(( note to self, This isn't a game of I-Spy so redo screenshots annotated with arrows.))
Private Calendar Access
Syncs without spyware i.e. Google, Apple, Microsoft.
Syncs without your calendar being used in Training Ai models.
Is that an issue? -> you tell me ((link to issues in Japanese medical Ai models, validate the news authenticity - I heard about this in detail, briefly.))
Would those 'Companies' really be so daft as to do this with your 'data'?
-> phfts ((not even sure what to put here, there's so much, it may be a distraction.))
EteSync
((several things to sort out in here.))
Archive The EteSync Wiki
user@pop-os:~$ pushd ~/Documents/1776_Linux ~/Documents/1776_Linux ~ user@pop-os:~/Documents/1776_Linux$ user@pop-os:~/Documents/1776_Linux$ user@pop-os:~/Documents/1776_Linux$ git clone https://github.com/etesync/etesync-dav.wiki.git Cloning into 'etesync-dav.wiki'... remote: Enumerating objects: 30, done. remote: Total 30 (delta 0), reused 0 (delta 0), pack-reused 30 Receiving objects: 100% (30/30), 6.40 KiB | 1.07 MiB/s, done. Resolving deltas: 100% (15/15), done. user@pop-os:~/Documents/1776_Linux$ user@pop-os:~/Documents/1776_Linux$ user@pop-os:~/Documents/1776_Linux$
Content Gathering-&-Creating
- VLC
- ffmpeg
- yt-dlp
- Tesseract OCR
- DangerZone
(( build out that pipe line. need this ASAP for offline cataloguing, transcribing, etc.
So much to consider yet so little time. locking down the net has started, ISP lock-down I suspect is in effect on theoretical planning. I suspect people complicit in this have worked out how to lock it down and tested those methods to function in parallel with how open it is at-the-moment. buuuuuuuut need to dig into soooooo much material, documentation, policy changes, etc to even start making those assertions.))
Email Archiving
Thunderbird & Proton Mail Bridge
Gnome Circle's Email?
(((Make sure to say GNOME Circle instead of GNOME where relevant.
Be crystal clear.)))
Maintenance and Updates
Greg Kroah-Hartman (Kernel Maintainer & Fellow with The Linux Foundation)
((cite))
Kernel Security Policy:
Almost all bugs can be "security" issue.
((- TIFTFY because which bugs couldn't? - I'm not formally educated on this topic. ))
Mr. Kroah-Hartman has made this crystal clear several times;
- Mentorship Session: Demystifying the Linux Kernel Security Process - T ~ 33:40
- Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman - T ~ 9:33
- ...
- ((modify the timestamps and double-check the context))
Where is the talk where he physically demonstrates the purpose for the policy?
He used one of Google's phone's?
((use Gallery of Screenshots.
Don't hyperlink the images to avoid misunderstanding what it means to click/tap an image.))
Trust, But Verify
A moment to re-iterate what you've done so far.
A moment to connect these concepts together.
A moment to demystify terminal and directories.
Look At Your Auto-start Services.
Where have these configurations been stored on the system?
Pop!_OS uses ~/.config/autosatart/ to find services you picked for auto-starting.
Dip your toes back into the terminal again with these commands,
user@pop-os:~$
user@pop-os:~$
user@pop-os:~$ pushd ~/.config/autostart/
~/.config/autostart ~
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$ ls
linux-amd64-etesync-dav.desktop 'Proton Mail Bridge.desktop'
user@pop-os:~/.config/autostart$
user@pop-os:~/.config/autostart$
user@pop-os:~$ user@pop-os:~$ user@pop-os:~$ pushd ~/.config/autostart/ ~/.config/autostart ~ user@pop-os:~/.config/autostart$ user@pop-os:~/.config/autostart$ user@pop-os:~/.config/autostart$ ls linux-amd64-etesync-dav.desktop 'Proton Mail Bridge.desktop' user@pop-os:~/.config/autostart$ user@pop-os:~/.config/autostart$
((not sure which HTML representation to choose. the B&W looks dope af))
((will likely go with that to help expand capacity to read terminal outputs via exposure to additional methods to present it.))
In the File Explorer,
- Be sure you can see hidden files ((link to how))
- Click "Home" from the menu on the left
- Open ".config" directory (a.k.a. folder)
- Open "autostart" directory
Ai Poisioning
And so it begins. Yeah, people who fend to seperate their work, property, data from Ai will be accused of being luddite. Careful with that term. I'm not sure it means willing to fend off, but rather concer for lose of life in fatal working conditions during the industrial revolution. ((double check this))
Mental Outlaw shares tools for people to poison Ai from mimicking style.
(((Topic goes deeper)))
Prose to develop ((note to self))
Seemingly endless prose continues to publish on video hosting services.
((A tricky sea to navigate.))
. https://youtu.be/rCZDV6RIaxA
Appendix & Additions
Additional Context - like a bibliography.
Unredacted Magazine
Discontinued until enough article submissions are received. I'm baffled how quite the audience. Are they not receiving enough submissions or is the company quietly letting the magazine-project go to sleep?
Given the IBM Leaks – it's likely people aren't willing to submit articles else they can't avoid inadvertently blowing the whistle on what's going on in their own employment-environment (as that would be the place they have the most insight into).
(((find in my notes the source-material for this paragraph)))
Remove Dossiers On You Before It's Used To Train Ai
((need heavy heavy heavy citation for this, straight from the industry-horses mouth))
Read The Books Which Helped Me
I HIGHLY RECOMMENCED purchasing this content.
- Include Whitney Webb's relevant books (perspective)
- Included other books on shelf.
- and more...