Skip to content

AdHocSecurebox is an opinionated collection of scripts/docs to deal with sensitive data with average hardware and open source software. Work in progress.

License

fititnt/AdHocSecurebox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

61 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AdHocSecurebox v3.0

AdHocSecurebox (formerly TailsOS-for-non-whistleblowers) is an opinionated collection of public domain scripts/docs to deal with sensitive data with average hardware and open source software. Does not aim to be perfect: just to be less wrong when you have to do it.

How to do it on an Tails live USB right now?

git clone https://github.com/fititnt/AdHocSecurebox.git /tmp/bootstrap-tails
# mv /home/amnesia/bin /home/amnesia/bin.bkp
cp -r /tmp/bootstrap-tails/bin /home/amnesia/bin
/home/amnesia/bin/tails-do-it

[issue#34] The initial target audience of this project

TODO: add description of the initial reasons for this project. But definitely mention about Domestic Violence survivors (fititnt, 2020-11-07 21:11 BRT)


Table of Contents

  1. Why?
    1. Tails is a great start even for non-target audiences
    2. TL;DR: of AdHocSecurebox
  2. Tails
    1. Overview
      1. bin/: Tails executable scripts
      2. directory-structure/: Example of directory structure
      3. docs/: Tails guides by topic
      4. dotfiles/example/
    2. Installation
      1. Simple
      2. Via git
    3. Acknowledgements
      1. Official references
      2. Community references
  3. Beyond Tails
    1. AppArmor profiles
    2. Optionated workspace
    3. Virtual Machines
    4. YubiKey
  4. Reuse of this work
    1. License

Why?

Tails is a great start even for non-target audiences

Tails, without any extra, already is a great start for an ad hoc secure box (and is much simpler to get it working than Qubes OS / Whonix). But by design Tails ("The Amnesic Incognito Live System") is not an average OS for daily usage in special for who is not the target audience.

TL;DR: of AdHocSecurebox

This GitHub project have tested scripts to use on Tails (with special care about how to backup/restore) when you have to deal with, for example:

  • On Tails: create SSH private keys, generate PGP keys for your Yubikey, use an OS as fallback mechanism to log on your servers when your main computer has issues (or you are on-the-go and your company/government would not allow you use any friends hardware). Etc.
  • Beyond Tails: even if you already have full-disk encryption we document potential tips for how to deal with you daily Desktop workstation to not leave all the time either encryption/authentication keys accessible or the data itself open for any random software (think your Zoom, Skype, Spotify, etc) that could scan your disks for such contents. We here also enforce you to use strategies that could be resilient to ransomware like do remote backups without fear because they're encrypted.

As a rule of thumb: you can use Tails to access other disks, but avoid using your main workstation to access TailsData (encrypted by default). Also keep in mind that Tails by default starts without internet access (and has assistive technology to help you with potential hardware keyloggers) so it's actually a perfect quick to use OS for offline ad hoc cryptography operations.

Tails

AdHocSecurebox v3.0 (and likely future versions) do not have any particular suggested reading order.

Overview

bin/: Tails executable scripts

See bin/

Look at the folder bin/ for inspirational scripts to add to your /home/amnesia/binAmnesic / /live/persistence/TailsData_unlocked/dotfiles/binPersistent.

directory-structure/: Example of directory structure

See directory-structure/

If you don't plan to read the documentation at docs/ and is just browsing this repository, this is the folder you look around to see potential examples.

These folders are not used for copy or automation (like bin/ is). This is just an documental syntactic sugar.

docs/: Tails guides by topic

Look at the folder docs/ for POSIX scripts and markdown files mean to be read.

dotfiles/example/

See dotfiles/example/

The folder dotfiles/example/ contain examples of dotfiles.

Some, like the dotfiles/example/rocha/.curlrc that help with curl be able to proxy via Tor, may be pertinent to reduce extra parameters.

Installation

Simple

git clone https://github.com/fititnt/AdHocSecurebox.git /tmp/bootstrap-tails
# mv /home/amnesia/bin /home/amnesia/bin.bkp
cp -r /tmp/bootstrap-tails/bin /home/amnesia/bin
/home/amnesia/bin/tails-do-it

Via git

Adapt this to your needs. This is how the author would do after already have his /home/amnesia/.ssh/id_rsa autorized to connect GitHub.

# From an already running TailsOS with persistence enabled, run:
mkdir /home/amnesia/Persistent/git ; mkdir /home/amnesia/Persistent/git/fititnt/ ; cd /home/amnesia/Persistent/git/fititnt
git clone https://github.com/fititnt/AdHocSecurebox.git
cd /home/amnesia/Persistent/git/fititnt/AdHocSecurebox

Acknowledgements

Official references

Community references

If you know other references for scripts, send a PR or an e-mail.

Beyond Tails

See docs/beyond-tails/.

The initial author also took care to make the public domain individual scripts as portable as possible <3.

AppArmor profiles

Be warned: even the average, non state-sponsored cyber attacks, cannot be protected by firewalls because something on your computer collect data and upload (or ask instructions from something outside). (... continue ...)

If you are not using Tails, but still using Linux, AppArmor can be reused to protect inside threats. One typical example is deny access to very private folders (like ~/.ssh, ~/.gnupg) (... continue ...)

Optionated workspace

Virtual Machines

YubiKey

This is an draft. See YubiKey on Tails #28.

Reuse of this work

TODO: write something more explicitly about allow reuse of this work, even without credit. (fititnt, 2020-10-26 20:36 UTC)

License

Public Domain

To the extent possible under law, Emerson Rocha has waived all copyright and related or neighboring rights to this work to Public Domain.

About

AdHocSecurebox is an opinionated collection of scripts/docs to deal with sensitive data with average hardware and open source software. Work in progress.

Topics

Resources

License

Stars

Watchers

Forks

Languages