Views: 203
Submissions: 0
Favs: 0
Crafter | Registered: May 31, 2016 11:50:37 AM
The cryptofurs FA-group is about making secure communication more readily available and easy to use.
A word to beginners
Introduction A: What is this ride like?
Introduction B: A very short explanation of Public-Key Cryptography.
Get me started already! - Sure thing.
Great resource: The guys at EFF explained it all better, than we ever will.
Good settings and basic rules: How safe is safe?
If you choose to ignore more user friendly interfaces: First steps in hardcore gpg.
Resources
Me and My Shadow, information and applications for improving privacy online
The Electronic Frontier Foundation
Tools
Mozilla Thunderbird, an email client, which supports Public-key encryption via the Enigmail plug-in
The Enigmail add-on for Mozilla Thunderbird
Pidgin, an instant messenger, which supports Public-key encryption via the OTR plug-in
The OTR plug-in for Pidgin
GnuPG, the original free Public-key encryption software for GNU/Linux and Windows®
Gpg4win, spruced up graphic user interface for GnuPG for Windows®
VisualHash, calculate hash values to check for data manipulation
The tor browser bundle for anonymous web-surfing
The tails live operating system for advanced anonymity and privacy functionality
Know-how
Wikipedia on public-key cryptography
Wikipedia on hash-functions
A word to beginners
Introduction A: What is this ride like?
Introduction B: A very short explanation of Public-Key Cryptography.
Get me started already! - Sure thing.
Great resource: The guys at EFF explained it all better, than we ever will.
Good settings and basic rules: How safe is safe?
If you choose to ignore more user friendly interfaces: First steps in hardcore gpg.
Resources
Me and My Shadow, information and applications for improving privacy online
The Electronic Frontier Foundation
Tools
Mozilla Thunderbird, an email client, which supports Public-key encryption via the Enigmail plug-in
The Enigmail add-on for Mozilla Thunderbird
Pidgin, an instant messenger, which supports Public-key encryption via the OTR plug-in
The OTR plug-in for Pidgin
GnuPG, the original free Public-key encryption software for GNU/Linux and Windows®
Gpg4win, spruced up graphic user interface for GnuPG for Windows®
VisualHash, calculate hash values to check for data manipulation
The tor browser bundle for anonymous web-surfing
The tails live operating system for advanced anonymity and privacy functionality
Know-how
Wikipedia on public-key cryptography
Wikipedia on hash-functions
Gallery
This user has no submissions.
Favorites
This user has no favorites.
Recent Watchers
Recently Watched
Stats
Comments Earned: 0
Comments Made: 0
Journals: 5
Comments Made: 0
Journals: 5
Featured Journal
What is this ride like? (G)
9 years ago
about:nerds
For the average furry using encryption and privacy tools means standing on the shoulders of macros. Friendly and helpful macros for the most part, but free spirits who like the GNU prairies better than the backdoored Microsoft® pen. That pen can be more or less patched up against predators, but not against sophisticated attackers or Bill Gates himself.
So why even bother with privacy tools in Windows®? For the same reason as you put a lock on your front door. It won't stop Al Capone, but yellow press reporters... mostly. And maybe even more importantly, with locks on every door criminals will no longer be able to pick valuable targets by just checking for locks. You benefit from the herd.
Usability
Still, macros' tools are not easy to use in a small pen. I certainly paid my dues and here are just a few examples of hilarious realizations after hours on hours of trial and error:
- Restarting your PC after installation will actually solve problems with Gpg4win and Enigmail. It's the 90s all over again.
- The Thunderbird email-client: "Now that this user has downloaded his emails, I'm sure they won't mind me deleting them from the mail-server. Hurr-durr. They could have told me not to during account set-up."
- So to tighten gpg's password management security in Windows® 8.1, I had to create a file named "gpg-agent.conf" containing the lines "max-cache-ttl 5" and "max-cache-ttl-ssh 5" and put it in gpg's home directory in the hidden App-data folder under "C:\Users\USERNAME"? Wouldn't that be something to put in the documentation?
- In order to anonymize your Pidgin chat traffic via an active tor browser, you can change the proxy settings of Pidgin's OTR plug-in to use the "SOCKS5-Proxy" at host address "127.0.0.1" on port "9150". Apparently they thought that was obvious.
Privacy and the authorities
You may wonder if using tools like gpg or tor might attract the attention of law-enforcers or agencies. Personally, I don't think these institutions should be considered a bunch of evil people. They want to do a good job protecting and serving. Of course they hate guys, who abuse anonymity tools to sell drugs online. But they shouldn't resent you for putting your email into a safe envelope.
For the average furry using encryption and privacy tools means standing on the shoulders of macros. Friendly and helpful macros for the most part, but free spirits who like the GNU prairies better than the backdoored Microsoft® pen. That pen can be more or less patched up against predators, but not against sophisticated attackers or Bill Gates himself.
So why even bother with privacy tools in Windows®? For the same reason as you put a lock on your front door. It won't stop Al Capone, but yellow press reporters... mostly. And maybe even more importantly, with locks on every door criminals will no longer be able to pick valuable targets by just checking for locks. You benefit from the herd.
Usability
Still, macros' tools are not easy to use in a small pen. I certainly paid my dues and here are just a few examples of hilarious realizations after hours on hours of trial and error:
- Restarting your PC after installation will actually solve problems with Gpg4win and Enigmail. It's the 90s all over again.
- The Thunderbird email-client: "Now that this user has downloaded his emails, I'm sure they won't mind me deleting them from the mail-server. Hurr-durr. They could have told me not to during account set-up."
- So to tighten gpg's password management security in Windows® 8.1, I had to create a file named "gpg-agent.conf" containing the lines "max-cache-ttl 5" and "max-cache-ttl-ssh 5" and put it in gpg's home directory in the hidden App-data folder under "C:\Users\USERNAME"? Wouldn't that be something to put in the documentation?
- In order to anonymize your Pidgin chat traffic via an active tor browser, you can change the proxy settings of Pidgin's OTR plug-in to use the "SOCKS5-Proxy" at host address "127.0.0.1" on port "9150". Apparently they thought that was obvious.
Privacy and the authorities
You may wonder if using tools like gpg or tor might attract the attention of law-enforcers or agencies. Personally, I don't think these institutions should be considered a bunch of evil people. They want to do a good job protecting and serving. Of course they hate guys, who abuse anonymity tools to sell drugs online. But they shouldn't resent you for putting your email into a safe envelope.
User Profile
Accepting Trades
No Accepting Commissions
No Character Species
Raccoon
Favorite Quote
As long as you don't know by what trait people will be discriminated against in the future 'I have nothing to hide' just doesn't work.
FA+