by wnm on 11/19/17, 12:56 PM with 79 comments
by tptacek on 11/19/17, 8:32 PM
https://techsolidarity.org/resources/basic_security.htm
In particular:
* Do NOT install antivirus on your computers. Antivirus software is absurdly dangerous. The closest you'll come to benign AV is Microsoft's, but that's an asymptotic kind of safety.
* Do NOT go out of your way to funnel your traffic through a commercial VPN provider. If you need a VPN for your NGO or journalism outlet, let me or someone else trustworthy know, and we'll set up Algo for you. No commercial VPN provider is safe for at-risk users.
* Do NOT EVER use Tor Browser. It's the least safe browser you can use: a lagged fork of Firefox for which whole classes of security bugs are potentially WONTFIX'd, and also the only browser that goes out of it's way to collect high-value targets.
* Do NOT install Adium or Pidgin to speak to people over OTR. It's difficult to find exploitable bugs in libotr, but it is not difficult to find them in libpurple. Use Signal, WhatsApp, or Wire.
* You would have to be out of your fucking mind to install mobile AV.
by davidscolgan on 11/19/17, 4:51 PM
Grandpa thinks Avast makes his computer secure and is using their custom browser for his banking. Is my great distrust in all antivirus systems as worse than the viruses they theoretically find still valid?
by edraferi on 11/19/17, 2:12 PM
Most of the recommendations are standard (password manager, two factor authentication, basic OPSEC, ad blocking plugins) but it also has a fairly detailed discussion about the TOR browser. The recommendation to use a VPN may be controversial, but it includes a discussion of the relevant threat model, which helps.
by ploggingdev on 11/19/17, 2:36 PM
I think the standard advice from the security community is to not use any antivirus at all and maybe only Windows Defender if you're on windows.
The advice to use Tor browser is also terrible. The Tor browser is based on an older version of Firefox ( currently version 52 vs 57 for upstream Firefox ) and so might contain known bugs.
On a side note what does the security community think about Qubes OS [0]? The approach of security by isolation is interesting.
by JepZ on 11/19/17, 4:02 PM
No word about OMEMO[1] or Conversations[2]. I think running your own XMPP Server with end-to-end encryption should be pretty safe (if needs to be safer run it within a VPN). After that the unsafest part is probably to device you use your app with (closed source firmwares nobody has ever seen).
https://xmpp.org/extensions/xep-0384.html https://conversations.im
by ryanlol on 11/19/17, 2:26 PM
It even tells you to install a mobile antivirus!
by proee on 11/19/17, 8:39 PM
Are we really ok giving full read/write access to our webpages from companies we know nothing about?
I'm considering removal of all web extensions that have read/write access.
Thoughts?
by suyash on 11/19/17, 7:33 PM
by mar77i on 11/20/17, 4:16 PM
by stoolpigeon on 11/19/17, 2:39 PM
by qrbLPHiKpiux on 11/19/17, 2:30 PM
by SomeStupidPoint on 11/19/17, 2:58 PM
It provides some advice and references a number of other government sources once you dig into it.
by gggvvh on 11/19/17, 7:13 PM
Edit: what’s with the downvotes? Burned much? Hey, try looking at your failed ssh login attempts before and after doing this. You’re welcome.
by suyash on 11/19/17, 7:36 PM
by beamatronic on 11/19/17, 5:24 PM
Do as much as you can with just a Chromebook
Use 2 factor authentication
Don't go anywhere near Windows