{"id":1824,"date":"2018-10-27T08:19:16","date_gmt":"2018-10-27T08:19:16","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=1824"},"modified":"2018-10-28T05:48:02","modified_gmt":"2018-10-28T05:48:02","slug":"weekend-reading-privacy-linux-journal","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/27\/weekend-reading-privacy-linux-journal\/","title":{"rendered":"Weekend Reading: Privacy | Linux Journal"},"content":{"rendered":"<p><em><br \/>\nMost people simply are unaware of how much personal data they leak on a<br \/>\ndaily basis as they use their computers. Enter this weekend&#8217;s reading topic:<br \/>\nPrivacy.<br \/>\n<\/em><\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/foss-project-spotlight-tutanota-first-encrypted-email-service-app-f-droid\">FOSS Project Spotlight: Tutanota, the First Encrypted Email Service with an App on F-Droid<\/a><br \/>\nby Matthias Pfau<\/p>\n<p>Seven years ago Tutanota was built, an encrypted email service with a strong focus on security, privacy and open source. Long before the Snowden revelations, Tutanota&#8217;s team felt there was a need for easy-to-use encryption that would allow everyone to communicate online without being snooped upon.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/wire\">The Wire<\/a><br \/>\nby Shawn Powers<\/p>\n<p>In the US, there has been recent concern over ISPs turning over logs to the<br \/>\ngovernment. During the past few years, the idea of people snooping on our<br \/>\nprivate data (by governments and others) really has made encryption more<br \/>\npopular than ever before. One of the problems with encryption, however, is<br \/>\nthat it&#8217;s generally not user-friendly to add its protection to your<br \/>\nconversations. Thankfully, messaging services are starting to take notice of<br \/>\nthe demand. For me, I need a messaging service that works across multiple<br \/>\nplatforms, encrypts automatically, supports group messaging and ideally can<br \/>\nhandle audio\/video as well. Thankfully, I found an incredible open-source<br \/>\npackage that ticks all my boxes: Wire.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/facebook-compartmentalization\">Facebook<br \/>\nCompartmentalization<\/a><br \/>\nby Kyle Rankin<\/p>\n<p>Whenever people talk about protecting privacy on the internet, social-media<br \/>\nsites like Facebook inevitably come up\u2014especially right now. It makes<br \/>\nsense\u2014social networks (like Facebook) provide a platform where you can<br \/>\nshare your personal data with your friends, and it doesn&#8217;t come as much of a<br \/>\nsurprise to people to find out they also share that data with advertisers<br \/>\n(it&#8217;s how they pay the bills after all). It makes sense that Facebook uses<br \/>\ndata you provide when you visit that site. What some people might be<br \/>\nsurprised to know, however, is just how much. Facebook tracks them when they<br \/>\naren&#8217;t using Facebook itself but just browsing around the web.<\/p>\n<p>Some readers may solve the problem of Facebook tracking by saying &#8220;just<br \/>\ndon&#8217;t use Facebook&#8221;; however, for many people, that site may be the only way<br \/>\nthey can keep in touch with some of their friends and family members.<br \/>\nAlthough I don&#8217;t post on Facebook much myself, I do have an account and use<br \/>\nit to keep in touch with certain friends. So in this article, I explain how<br \/>\nI employ compartmentalization principles to use Facebook without leaking too<br \/>\nmuch other information about myself.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/protection-privacy-and-playoffs\">Protection,<br \/>\nPrivacy and Playoffs<\/a><br \/>\nby Shawn Powers<\/p>\n<p>I&#8217;m not generally a privacy nut when it comes to my digital life. That&#8217;s not<br \/>\nreally a good thing, as I think privacy is important, but it often can be<br \/>\nvery inconvenient. For example, if you strolled into my home office, you&#8217;d<br \/>\nfind I don&#8217;t password-protect my screensaver. Again, it&#8217;s not because I want<br \/>\nto invite snoops, but rather it&#8217;s just a pain to type in my password every<br \/>\ntime I come back from going to get a cup of tea. (Note: when I worked in a<br \/>\ntraditional office environment, I did lock my screen. I&#8217;m sure working from<br \/>\na home office is why I&#8217;m comfortable with lax security.)<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/machine-keeping-secrets\">A<br \/>\nMachine for Keeping Secrets?<\/a><br \/>\nby Vinay Gupta<\/p>\n<p>The most important thing that the British War Office learned about<br \/>\ncryptography was how to keep a secret: Enigma was broken at Bletchley Park<br \/>\nearly enough in World War II to change the course of the war\u2014and of<br \/>\nhistory. Now here&#8217;s the thing: only if the breakthrough (called Ultra, which<br \/>\ngives you a sense of its importance) was secret could Enigma&#8217;s compromise be<br \/>\nused to defeat the Nazis. Breaking Enigma was literally the &#8220;zero-day&#8221; that<br \/>\nbrought down an empire. Zero-day is a bug known only to an attacker.<br \/>\nDefenders (those creating\/protecting the software) have never seen the<br \/>\nexploit and are, therefore, largely powerless to respond until they have<br \/>\ndone analysis. The longer the zero-day is kept secret, and its use<br \/>\nundiscovered, the longer it represents absolute power.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/own-your-dns-data\">Own Your<br \/>\nDNS Data<\/a><br \/>\nby Kyle Rankin<\/p>\n<p>I honestly think most people simply are unaware of how much personal data<br \/>\nthey leak on a daily basis as they use their computers. Even if they have<br \/>\nsome inkling along those lines, I still imagine many think of the data they<br \/>\nleak only in terms of individual facts, such as their name or where they ate<br \/>\nlunch. What many people don&#8217;t realize is how revealing all of those<br \/>\nindividual, innocent facts are when they are combined, filtered and<br \/>\nanalyzed.<\/p>\n<p>Cell-phone metadata (who you called, who called you, the length of the call<br \/>\nand what time the call happened) falls under this category, as do all of the<br \/>\nsearch queries you enter on the Internet.<\/p>\n<p>For this article, I discuss a common but often overlooked source of data<br \/>\nthat is far too revealing: your DNS data.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/tor-security-android-and-desktop-linux\">Tor<br \/>\nSecurity for Android and Desktop Linux<\/a><br \/>\nby Charles Fisher<\/p>\n<p>The Tor Project presents an effective countermeasure against hostile and<br \/>\ndisingenuous carriers and ISPs that, on a properly rooted and capable<br \/>\nAndroid device or Linux system, can force all network traffic through Tor<br \/>\nencrypted entry points (guard nodes) with custom rules for iptables. This<br \/>\naction renders all device network activity opaque to the upstream<br \/>\ncarrier\u2014barring exceptional intervention, all efforts to track a user<br \/>\nare afterward futile.<\/p>\n<p><a href=\"https:\/\/www.linuxjournal.com\/content\/weekend-reading-privacy\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people simply are unaware of how much personal data they leak on a daily basis as they use their computers. Enter this weekend&#8217;s reading topic: Privacy. FOSS Project Spotlight: Tutanota, the First Encrypted Email Service with an App on F-Droid by Matthias Pfau Seven years ago Tutanota was built, an encrypted email service with &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/27\/weekend-reading-privacy-linux-journal\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Weekend Reading: Privacy | Linux Journal&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1824","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"predecessor-version":[{"id":1854,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1824\/revisions\/1854"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}