Editing Security Practices

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
== Introduction ==
By default, the culture of the free software movement advocates proper security practices. There are certain tools and practices which help people to ensure such use cases in their daily life. Below are different paradigms of security practices.
By default, the culture of the free software movement advocates proper security practices. There are certain tools and practices which help people to ensure such use cases in their daily life. Below are different paradigms of security practices.


By design, proprietary software is unsecure as the code is not open to the public. We strongly promote GNU/Linux operating system distributions which are more secure as the software is collectively developed with code open to the public.  
By design, proprietary software is unsecure as the code is not open to the public. We strongly promote GNU/Linux operating system distributions which are more secure as the software is collectively developed with code open to the public.  
~ Proprietary software is often malware, https://www.gnu.org/proprietary/proprietary.en.html


* [https://www.gnu.org/proprietary/proprietary.en.html Proprietary software is often malware]
== Operating System ==
Debian GNU/Linux Operating system - This OS an outcome of a collective ecosystem where people around the world package applications in a massive scale. We strongly recommend using this OS in the personal computers.
Debian GNU/Linux Operating system - This OS an outcome of a collective ecosystem where people around the world package applications in a massive scale. We strongly recommend using this OS in the personal computers.


* [https://wiki.debian.org Debian Wiki]
~Debian Wiki, https://wiki.debian.org
 
Password Managers - Passwords are easily crackable with bruteforce mechanisms. We recommend to use strong Passphrases. Also, use free software  password managers like [https://bitwarden.com Bitwarden], [https://keepassxc.org Keepassxc] etc.
 
2-Factor Authentication (2FA)- For all types authentication, we recommend to set up use 2FA. Use free software OTP services like FreeOTP.
 
==De-googlyfying Smartphones==
Degooglifying of Smartphone is so simple by Removing Google play services which comes inbuilt with your smartphone's Stock ROM.
There are different ways but most preferred is to Flash your device with Community built Cyanogen mod which is later called as Lineage Os or its forks like Reserruction Remix.
Steps to Flash and Degooglify your device:
 
1.Know your device codename
 
2.Install ADB(Android Debug Tools) and Fastboot
 
3.Unlock the device(Steps Vary from each manufacturer)
 
4.Flash the Recovery(TWRP is Recommended)
 
5.Install ROM
 
6.Your device is now degooglifies.


Password Managers - Passwords are easily crackable with bruteforce mechanisms. We recommend to use strong Passphrases. Also, use free software  password managers like Bitwarden (https://bitwarden.com), keepassxc- (https://keepassxc.org/) etc.


There are open Gapps which are sometimes pre-installed with custom ROMS, make sure to not have them.
2-Factor Authentication (2FA)- For all types authentication, we recommend to set up use 2FA. Use free software OTP services like FreeOTP.  


== Encrypted Communication ==
Encrypted Communication:
In the view of mass surveillance there's only one question, how do we send confidential data over the web. To answer this question, most of the communications happens via chat platforms and emails. Big tech companies like Google and Facebook are mass surveillance engines, there is no way that they can respect the user's privacy as they commodify data by selling to advertise agencies. Thus, as a community we need to enable the encrypted communication.  
In the view of mass surveillance there's only one question, how do we send confidential data over the web. To answer this question, most of the communications happens via chat platforms and emails. Big tech companies like Google and Facebook are mass surveillance engines, there is no way that they can respect the user's privacy as they commodify data by selling to advertise agencies. Thus, as a community we need to enable the encrypted communication.  


[https://signal.org Signal] is the encrypted chat platform. Starting from chats to calls both video and audio are encrypted by default.  
Signal is the encrypted chat platform. Starting from chats to calls both video and audio are encrypted by default.  


When we look at email encryption, use free software mail clients like thunderbird (PCs), k9-mail (smartphones) etc. Next, we need to build the trust on the web with Public Key Infrastructure (PKI). In order to do so, use tools like [https://wiki.debian.org/Keysigning OpenPGP].
When we look at email encryption, use free software mail clients like thunderbird (PCs), k9-mail (smartphones) etc. Next, we need to build the trust on the web with Public Key Infrastructure (PKI). In order to do so, use tools like OpenPGP.
~ https://wiki.debian.org/Keysigning

Please note that all contributions to FSMI WIKI are considered to be released under the Creative Commons Attribution-ShareAlike (see FSMI WIKI:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)