diff --git a/guide.md b/guide.md index 94723c7..4c3240e 100644 --- a/guide.md +++ b/guide.md @@ -2,7 +2,7 @@ (Or "How I learned to start worrying and love ~~privacy~~ anonymity") -Version 1.1.4-pre1, June 2022 by Anonymous Planet +Version 1.1.5, June 2022 by Anonymous Planet **Forever in memory of Lena, 1999-2022** @@ -383,7 +383,7 @@ Finally note that this guide does mention and even recommends various commercial - [Appendix A9: Installing a Zcash wallet:] - [Debian 11 VM:] - [Ubuntu 20.04/21.04/21.10 VM:] - - [Windows 10 VM:] + - [Windows 10/11 VM:] - [Whonix Workstation 16 VM:] - [Appendix B1: Checklist of things to verify before sharing information:] - [Appendix B2: Monero Disclaimer] @@ -644,7 +644,7 @@ Therefore, to mitigate all these issues (as much as possible and as best as we c ### Your RFID enabled devices: -RFID stands for Radio-frequency identification[^55], it is the technology used for instance for contactless payments and various identification systems. Of course, your smartphone is among those devices and has RFID contactless payment capabilities through NFC[^56]. As with everything else, such capabilities can be used for tracking by various actors. +RFID stands for Radio-frequency identification[^59], it is the technology used for instance for contactless payments and various identification systems. Of course, your smartphone is among those devices and has RFID contactless payment capabilities through NFC[^56]. As with everything else, such capabilities can be used for tracking by various actors. But unfortunately, this is not limited to your smartphone, and you also probably carry some amount of RFID enabled device with you all the time such as: @@ -832,7 +832,7 @@ Your home router/Wi-Fi access point keeps logs of devices that are registered on Some commercial devices will keep a record of MAC addresses roaming around for various purposes such as road congestion[^100]. -**So, it is important again not to bring your phone along when/where you conduct sensitive activities. If you use your own laptop, then it is crucial to hide that MAC address (and Bluetooth address) anywhere you use it and be extra careful not to leak any information. Thankfully many recent OSes now feature or allow the possibility to randomize MAC addresses (Android, IOS, Linux, and Windows 10)** with the notable exception of macOS which does not support this feature even in its latest Big Sur version. +**So, it is important again not to bring your phone along when/where you conduct sensitive activities. If you use your own laptop, then it is crucial to hide that MAC address (and Bluetooth address) anywhere you use it and be extra careful not to leak any information. Thankfully many recent OSes now feature or allow the possibility to randomize MAC addresses (Android, IOS, Linux, and Windows 10/11)** with the notable exception of macOS which does not support this feature even in its latest Big Sur version. See [Appendix N: Warning about smartphones and smart devices] @@ -1022,7 +1022,7 @@ Here are some other resources on the topic if you cannot see this documentary: - 2017, Behavior Analysis in Social Networks, [[Archive.org]][95] -- 2017, Social Networks and Positive and Negative Affect [[Archive.org]][96] +- 2017, Social Networks and Positive and Negative Affect [[Archive.today]][96] - 2015, Using Social Networks Data for Behavior and Sentiment Analysis [[Archive.org]][97] @@ -1374,7 +1374,7 @@ There are specialized commercial forensics solutions available (Magnet Axiom[^24 Notable Examples: -- Apple iCloud: [[Archive.org]][153] : "Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on**, your backup includes a copy of the key protecting your Messages**. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices. ". +- Apple iCloud: [[Archive.org]][153] : "Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on**, your backup includes a copy of the key protecting your Messages**. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices. ". - Google Drive and WhatsApp: [[Archive.org]][154]: "**Media and messages you back up aren't protected by WhatsApp end-to-end encryption while in Google Drive**. ". Do however note that Facebook/Whatsapp have announced the rollout of encrypted backups on October 14^th^ 2021 ( [[Archive.org]][155]) which should solve this issue. @@ -1543,7 +1543,7 @@ Many people have the idea that privacy-oriented services such as VPN or E-Mail p Any of those providers can be forced to silently (without your knowing (using for example a court order with a gag order[^272] or a national security letter[^273]) log your activity to de-anonymize you. There have been several recent examples of those: -- 2021, Proton, Proton logged IP address of French activist after an order by Swiss authorities[^274]. +- 2021, Proton, Proton logged IP address of French activist after an order by Swiss authorities (source link unavailable). - 2021, WindScribe, Servers were not encrypted as they should have been allowing MITM attacks by authorities[^275]. @@ -1743,11 +1743,11 @@ First, here is a small basic UML diagram showing your available options accordin - **You should go for the Tails route.** - - It is not that old, and it has decent specs (at least 6GB of RAM, 250GB of disk space or more, decent CPU): + - It is not that old, and it has decent specs (at least 8GB of RAM, 250GB of disk space or more, decent CPU): - **You could go for Tails, Whonix routes.** - - It is new and it has great specs (more than 8GB of RAM, >250GB of disk space, recent fast CPU): + - It is new and it has great specs (more than 16GB or for a perfect experience 32GB of RAM, >250GB of disk space, recent fast CPU): - **You could go for any route, but I would recommend Qubes OS if your threat model allows it.** @@ -2085,7 +2085,7 @@ You will find details about each level here: