In this article I will outline the setup of my (not so) new firewall at home.
I explain how I decided which hardware to get and which software to choose, and I cover the entire process of assembling the machine and installing the operating system.
Hopefully this will be helpful to poeple in similar situations.
During the last year hell seems to have frozen over: our corporate overlords neighbours at Apple, Google and Facebook have all pushed for crypto in one way or another. For Facebook (WhatsApp) and Google (Allo) the messenger crypto has even been implemented by none less than the famous, endorsed-by-Edward-Snowden anarchist and hacker Moxie Marlinspike! So all is well on the privacy front! … but is it really?
EDIT: A French version of this post is available here.
Since posts like these often helped me setup some device, I thought I’d write one as well this time. Also it is advertising for a good free operating system.
TL;DR Everything works almost perfectly, good hardware, good software! You should give it a try :)
Hardware I have got a fairly high-end config:
Intel® Core™ i7-5600U
16GB RAM
1920x1080 Display, non-glare, non-touch
512GB Samsung SSD
Intel LAN + WLAN
Pro-Dock
Last summer I blogged about secure messaging and why FSFE cares about it (and why you should, too!). Since then a few things have changed, and I want to give you an update on the situation.
The conclusion of my last article was:
TextSecure and Kontalk are both good apps in our eyes, however, TextSecure has a much larger adoption and its protocol has gone through more reviews. The protool is integrated into CyanogenMod, recommended by leading security experts and the project just recently gained lots of media attention and $400.
Most you have probably set your system aliases to receive root’s e-mail, and that of course is a very good idea so you are kept up to date. On the other hand you do send a lot of information about your system through the wire, often package diagnostics with information about locally installed vulnerable software and many other things that might help a person or entity gain access to your computer.