Tactical Technology Collective - securityinabox.org https://archive2015.tacticaltech.org/source-host/securityinaboxorg en Mobile Security https://archive2015.tacticaltech.org/mobile-security <div class="field field-name-field-source-path field-type-link-field"> <label>Read original article : </label> <a href="https://securityinabox.org/en/mobile_security">Mobile Security</a> </div> <div class="field field-name-body field-type-text-with-summary"> <p>The mobile security section includes hands-on guides for a number of Freeware or Open Source smartphone applications which will help to make your smartphone use more secure. As with the hands-on guides for computer applications, they guide you through the process of downloading and configuring the applications, and include screenshots and step-by-step instructions to help you follow along.</p> <p>The applications can be downloaded in .apk-file form from the developers' websites by following the link provided in the relevant hands-on guide. They can also be found either in the F-Droid repository or the Google Play store.</p> <p>For security reasons, you should always try to use the current version of these tools. The included version of some tools may be more recent than the version that was used to create the corresponding Hands-on Guide. In such cases, the user interface of that tool may differ differ slightly from what is shown in the Guide.</p> <p>The hands-on guides included in the mobile security section are currently only available on Android devices. However, they will be expanded to include iPhone applications in the near future.</p> <ul class="menu"><li class="leaf first"><a href="https://securityinabox.org/en/android_basic">Basic Security Setup for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/apg_main">Android Privacy Guard (APG) for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/Cryptonite_main">Cryptonite for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/Gibberbot_main">Gibberbot for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/k9_apg_main">K9 and APG for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/keepassdroid_main">KeePassDroid for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/obscuracam_main">ObscuraCam for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/Orbot_main">Orbot for Android Devices</a></li> <li class="leaf"><a href="https://securityinabox.org/en/orweb_main">Orweb for Android Devices</a></li> <li class="leaf last"><a href="https://securityinabox.org/en/textsecure_main">TextSecure for Android Devices</a></li> </ul> </div> <div class="field field-name-field-source-host field-type-taxonomy-term-reference"> <label>From</label> <a href="/source-host/securityinaboxorg" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">securityinabox.org</a> </div> Sun, 20 Jan 2013 11:45:03 +0000 anne 283 at https://archive2015.tacticaltech.org Orweb for Android Devices https://archive2015.tacticaltech.org/orweb-android-devices <div class="field field-name-field-source-path field-type-link-field"> <label>Read original article : </label> <a href="https://securityinabox.org/en/orweb_main">Orweb for Android Devices</a> </div> <div class="field field-name-body field-type-text-with-summary"> <div class="shortdescription"> <p><strong>Orweb</strong> is an free Android-platform mobile phone application, created by the <a href="https://guardianproject.info/">Guardian Project</a> for browsing the internet anonymously in conjunction with <a href="https://securityinabox.org/en/Orbot_main"><strong>Orbot</strong></a>.</p> </div> <div class="onlineinstructions"><strong>Homepage</strong></div> <p><a href="https://guardianproject.info/apps/orweb/"><strong>Orweb homepage</strong></a></p> <p><strong>Phone Requirements</strong></p> <ul><li>Android 1.6 and up</li> </ul><p><strong>Version used in this guide</strong></p> <ul><li>v2 (0.2.2)</li> </ul><p><strong>License</strong></p> <ul><li>FOSS (GPLv3)</li> </ul><p><strong>Required Reading</strong></p> <ul><li>How-to Booklet Chapter <a href="https://securityinabox.org/chapter-8"><strong>8. How to remain anonymous and bypass censorship on the Internet</strong></a></li> <li>How-to Booklet chapter <a href="https://securityinabox.org/chapter-10"><strong>10. How to use mobile phones as securely as possible</strong></a></li> <li>How-to Booklet chapter <a href="https://securityinabox.org/chapter-11"><strong>11. How to use smartphones as securely as possible</strong></a></li> </ul><p><strong>Level</strong>: <strong>1: Beginner</strong>, 2: Average, 3: Intermediate, 4: Experienced, 5: Advanced</p> <p><strong>Time required to start using this tool</strong>: 20 minutes</p> <p><strong>What you will get in return</strong>:</p> <ul><li>The ability to conceal your digital identity from the websites that you visit.</li> <li>The ability to conceal your on-line destinations from Internet Service Providers (ISPs) and other surveillance mechanisms.</li> <li>The ability to bypass Internet censorship and filtering rules.</li> </ul> </div> <div class="field field-name-field-source-host field-type-taxonomy-term-reference"> <label>From</label> <a href="/source-host/securityinaboxorg" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">securityinabox.org</a> </div> Tue, 15 Jan 2013 10:30:21 +0000 anne 280 at https://archive2015.tacticaltech.org How to use smartphones as securely as possible https://archive2015.tacticaltech.org/how-use-smartphones-securely-possible <div class="field field-name-field-source-path field-type-link-field"> <label>Read original article : </label> <a href="https://securityinabox.org/en/chapter-11">How to use smartphones as securely as possible</a> </div> <div class="field field-name-body field-type-text-with-summary"> <p>In <a href="https://securityinabox.org/en/chapter-10"><strong><em>Chapter 10: How to use mobile phones as securely as possible</em></strong></a>, we discussed the security challenges of using basic mobile phones – including issues with voice communication and text messaging (SMS/MMS) services. Those phones primarily (if not exclusively) use mobile networks to transfer calls and data.</p> <p>Advances in technology now mean that mobile phones can provide services and features similar to desktop or laptop computers. These smartphones offer many new ways to communicate and capture and disseminate media. To provide these new functionalities, the smartphones not only use the mobile network, but also connect to the internet either via a wifi connection (similar to a laptop at an internet cafe) or via data connections through the mobile network operator.</p> <p>So while you can, of course, make phone calls with a smartphone, it is better to view smartphones as small computing devices. This means that the other material in this toolkit is relevant to your use of your smartphone as well as your computer.</p> <p>Smartphones usually support a wide range of functionality – web browsing, email, voice and instant messaging over the internet, capturing, storing and transmitting audio, videos and photos, enabling social networking, multi-user games, banking and many other activities. However, many of these tools and features introduce new security issues, or increase existing risks.</p> <p>For instance, some smartphones have built-in geo-location (<a href="https://securityinabox.org/en/Glossary#GPS"><em>GPS</em></a>) functionality, which means they can provide your precise location to your mobile network operator by default, and to many applications you use on your phone (such as social networking, mapping, browsing and other applications). As mentioned before, mobile phones already relay your location information to your mobile network operator (as part of the normal functions of the phone). However, the additional GPS functionality not only increases the precision of your location information, it also increases the amount of places where this information might be distributed.</p> <p>It's worth reviewing all the risks associated with mobile phones discussed in <a href="https://securityinabox.org/en/chapter-10"><strong><em>Chapter 10: How to use mobile phones as securely as possible</em></strong></a> as all of them are also relevant to smartphone use. <a href="https://securityinabox.org/en/chapter-10"><strong><em>Chapter 10</em></strong></a> covers issues of eavesdropping, interception of SMS or phone calls, SIM card related issues, and best practices.</p> <p>In this chapter we'll take a look at the additional security challenges posed by smartphones.</p> <p>...</p> </div> <div class="field field-name-field-source-host field-type-taxonomy-term-reference"> <label>From</label> <a href="/source-host/securityinaboxorg" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">securityinabox.org</a> </div> Thu, 20 Dec 2012 11:33:50 +0000 anne 281 at https://archive2015.tacticaltech.org Social networking tools: Facebook, Twitter, and others https://archive2015.tacticaltech.org/social-networking-tools-facebook-twitter-and-others <div class="field field-name-field-source-path field-type-link-field"> <label>Read original article : </label> <a href="https://securityinabox.org/en/social_networking_tools">Social networking tools: Facebook, Twitter, and others</a> </div> <div class="field field-name-body field-type-text-with-summary"> <div class="shortdescription"> <p>This chapter aims to help you navigate through the privacy and security settings of some popular social networking sites with a view to making their use <em>more secure</em>, or perhaps better said, <em>less insecure</em>. In particular, it gives step-by step guides in this respect for <strong>Facebook</strong> and <strong>Twitter</strong>, as well as some general guidelines for using <strong>YouTube</strong> and <strong>Flickr</strong>.</p> </div> <p>These social networking websites are the most popular and widely used social networking tools. They are owned by private companies and, as noted in chapter <a href="https://securityinabox.org/en/chapter-10"><strong>10. How to protect yourself and your data when using social networking sites</strong></a>, these companies make their money by collecting information about users and selling it on to advertisers. Government crackdowns will target these sites first and block them, and the companies will cave into government pressures and censor when necessary. It may be worth looking at alternatives to these sites, such as <strong>Diaspora</strong> (<a href="http://joindiaspora.com">http://joindiaspora.com</a>), <strong>Crabgrass</strong> (<a href="http://we.riseup.net">http://we.riseup.net</a>) <strong>Friendica</strong> (<a href="http://friendica.com">http://friendica.com</a>), <strong>Pidder</strong> (<a href="https://pidder.net">https://pidder.net</a>), or <strong>SecureShare</strong> (<a href="http://secureshare.org">http://secureshare.org</a>) which have been designed with digital security and activism in mind. The <strong>Social Swarm</strong> (<a href="http://socialswarm.net">http://socialswarm.net</a>) is a think-tank run by a not-for-profit organisation which carries out discussions, awareness-raising and campaigns related to privacy on social networks, and may be a useful learning resource.</p> <p>Other similar sites may be popular in different regions, so you way wish to explore other options. Before choosing one you should consider the following points:</p> <ol><li>Does it provide connection over <strong>SSL</strong> for all uses of the site, rather than just during login? Are there no problems related to encryption, such as problems related to encryption certificates?</li> <li>Read the End User Licence Agreement and Privacy Policy or Data Use Policy carefully. How are your content and personal data treated? With whom are they shared?</li> <li>What privacy options are provided for users? Can you choose to share your videos securely with a small number of individuals, or are they all public by default?</li> <li>Do you know the <strong>geographical location of the servers</strong>, under which territorial jurisdiction they fall or where the company is registered? Are you aware of how this information relates to the privacy and security of your email activity and information? Will the site's owners hand over information if they receive a governmental request to do so?</li> </ol><ul class="menu"><li class="collapsed first"><a href="https://securityinabox.org/en/facebook_main">Facebook Security Guide</a></li> <li class="collapsed"><a href="https://securityinabox.org/en/twitter_main">Twitter Security Guide</a></li> <li class="leaf"><a href="https://securityinabox.org/en/youtube_tips">YouTube</a></li> <li class="leaf last"><a href="https://securityinabox.org/en/flickr_tips">Flickr</a></li> </ul><p> </p> </div> <div class="field field-name-field-source-host field-type-taxonomy-term-reference"> <label>From</label> <a href="/source-host/securityinaboxorg" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">securityinabox.org</a> </div> Wed, 10 Oct 2012 11:40:57 +0000 anne 282 at https://archive2015.tacticaltech.org