mirror of
https://github.com/sunknudsen/privacy-guides.git
synced 2025-02-23 09:13:56 +00:00
Fixed inconsistencies and typos
This commit is contained in:
parent
226da37e19
commit
bd6d2d7764
@ -10,7 +10,7 @@ Listed: true
|
|||||||
|
|
||||||
# How to back up and encrypt data using rsync and VeraCrypt on macOS
|
# How to back up and encrypt data using rsync and VeraCrypt on macOS
|
||||||
|
|
||||||
[](https://www.youtube.com/watch?v=1cz_ViFB6eE "How to backup and encrypt data using rsync and VeraCrypt on macOS (see change log)")
|
[](https://www.youtube.com/watch?v=1cz_ViFB6eE "How to back up and encrypt data using rsync and VeraCrypt on macOS (see change log)")
|
||||||
|
|
||||||
> Heads-up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)).
|
> Heads-up: when using storage devices with wear-leveling (most flash storage devices), it is not possible to securely change password once it has been set (see [Wear-Leveling](https://www.veracrypt.fr/en/Wear-Leveling.html)).
|
||||||
|
|
||||||
@ -94,7 +94,7 @@ VeraCrypt 1.24-Update7
|
|||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
### Step 9: set temporary environment variable
|
### Step 9: set backup volume path environment variable
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
BACKUP_VOLUME_PATH="/Volumes/Samsung BAR/backup"
|
BACKUP_VOLUME_PATH="/Volumes/Samsung BAR/backup"
|
Before Width: | Height: | Size: 93 KiB After Width: | Height: | Size: 93 KiB |
Before Width: | Height: | Size: 155 KiB After Width: | Height: | Size: 155 KiB |
Before Width: | Height: | Size: 750 KiB After Width: | Height: | Size: 750 KiB |
@ -120,7 +120,7 @@ Go to [Repositories](https://www.borgbase.com/account) and add repository.
|
|||||||
|
|
||||||
### Step 4: generate and upload `authorized_keys` file (if using rsync.net)
|
### Step 4: generate and upload `authorized_keys` file (if using rsync.net)
|
||||||
|
|
||||||
#### Set temporary environment variables
|
#### Set environment variables
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
BORG_USERNAME="18434"
|
BORG_USERNAME="18434"
|
||||||
@ -201,11 +201,11 @@ Write down the passphrase. Store both at safe place(s).
|
|||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
#### Back up `~/.config/borg` and `~/Library/Keychains` folders (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
||||||
|
|
||||||
> Heads-up: both key (stored in `~/.config/borg`) and passphrase (stored in `~/Library/Keychains`) are required to decrypt backup.
|
> Heads-up: both key (stored in `~/.config/borg`) and passphrase (stored in `~/Library/Keychains`) are required to decrypt backup.
|
||||||
|
|
||||||
### Step 9: set temporary environment variables
|
### Step 9: set environment variables
|
||||||
|
|
||||||
Replace `borg@185.112.147.115:backup` with self-hosted or cloud-based repo and set backup name.
|
Replace `borg@185.112.147.115:backup` with self-hosted or cloud-based repo and set backup name.
|
||||||
|
|
||||||
|
@ -151,7 +151,7 @@ For example, if subnet mask is `255.255.255.0`, bitmask is `/24` and subnet pref
|
|||||||
| 255.255.255.254 | /31 |
|
| 255.255.255.254 | /31 |
|
||||||
| 255.255.255.255 | /32 |
|
| 255.255.255.255 | /32 |
|
||||||
|
|
||||||
### Step 5: set temporary environment variables
|
### Step 5: set environment variables
|
||||||
|
|
||||||
`KILLSWITCH_HARDWARE_INTERFACES` should include all used hardware network interfaces.
|
`KILLSWITCH_HARDWARE_INTERFACES` should include all used hardware network interfaces.
|
||||||
|
|
||||||
@ -261,7 +261,7 @@ sudo chown ${USER}:admin /usr/local/sbin
|
|||||||
|
|
||||||
### Step 11: source `/usr/local/sbin` directory
|
### Step 11: source `/usr/local/sbin` directory
|
||||||
|
|
||||||
> Heads-up: find which shell is configured using `echo $SHELL`.
|
> Heads-up: run `echo $SHELL` to find default shell.
|
||||||
|
|
||||||
#### Bash (`/bin/bash`)
|
#### Bash (`/bin/bash`)
|
||||||
|
|
||||||
|
@ -216,7 +216,7 @@ imported: 1
|
|||||||
ELECTRUM_RELEASE_SEMVER=4.1.2
|
ELECTRUM_RELEASE_SEMVER=4.1.2
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Download Electrum release and PGP signature
|
#### Download Electrum release and associated PGP signature
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
$ cd ~
|
$ cd ~
|
||||||
|
@ -12,7 +12,7 @@ Listed: true
|
|||||||
|
|
||||||
[](https://www.youtube.com/watch?v=mE8fL5Fu8x8 "How to encrypt, sign and decrypt messages using GnuPG on macOS")
|
[](https://www.youtube.com/watch?v=mE8fL5Fu8x8 "How to encrypt, sign and decrypt messages using GnuPG on macOS")
|
||||||
|
|
||||||
> WARNING: this is a “getting started” guide. For hardened guide, see https://github.com/drduh/YubiKey-Guide
|
> Heads-up: this is a “getting started” guide which stores private keys on macOS. For sensitive use cases, one should store private keys on hardware devices such as [YubiKeys](https://www.yubico.com/) (learn how [here](../how-to-use-yubikey-to-store-pgp-private-keys)).
|
||||||
|
|
||||||
## Caveats
|
## Caveats
|
||||||
|
|
||||||
@ -97,9 +97,9 @@ uid John Doe <john@example.net>
|
|||||||
sub rsa4096 2021-03-24 [E]
|
sub rsa4096 2021-03-24 [E]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
### Step 5: back up `~/.gnupg` folder (learn how [here](../how-to-back-up-and-encrypt-data-using-rsync-and-veracrypt-on-macos))
|
||||||
|
|
||||||
> Heads-up: files stored in `~/.gnupg` include private keys which, if lost, results in loosing one’s cryptographic identity (safeguard backup carefully).
|
> Heads-up: files stored in `~/.gnupg` include private keys which, if lost, results in loosing one’s cryptographic identity (safeguard backup mindfully).
|
||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
@ -110,7 +110,7 @@ sub rsa4096 2021-03-24 [E]
|
|||||||
### Export John’s PGP public key
|
### Export John’s PGP public key
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
gpg --armor --export john@example.net > ~/Desktop/john.asc
|
gpg --armor --export john@example.net > ~/Desktop/johndoe.asc
|
||||||
```
|
```
|
||||||
|
|
||||||
### Import Sun’s public key using key server…
|
### Import Sun’s public key using key server…
|
||||||
|
@ -55,7 +55,7 @@ imported: 1
|
|||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
#### Download Electrum
|
#### Download Electrum release
|
||||||
|
|
||||||
Go to https://electrum.org/#download and download latest release and associated PGP signature to `~/Downloads` folder.
|
Go to https://electrum.org/#download and download latest release and associated PGP signature to `~/Downloads` folder.
|
||||||
|
|
||||||
@ -98,7 +98,7 @@ imported: 1
|
|||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
#### Download “Tor Browser”
|
#### Download “Tor Browser” release
|
||||||
|
|
||||||
Go to https://www.torproject.org/download/ and download latest release and associated PGP signature to `~/Downloads` folder.
|
Go to https://www.torproject.org/download/ and download latest release and associated PGP signature to `~/Downloads` folder.
|
||||||
|
|
||||||
|
@ -44,9 +44,9 @@ Click “Applications”, then “Favorites”, then “Configure persistent vol
|
|||||||
|
|
||||||
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
|
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
|
||||||
|
|
||||||
### Step 5: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready.
|
### Step 5: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready
|
||||||
|
|
||||||
Tor is ready
|
Connected to Tor successfully
|
||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
@ -68,11 +68,7 @@ imported: 1
|
|||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
### Step 7: download latest release of [VeraCrypt](https://veracrypt.fr/en/Home.html)
|
### Step 7: set VeraCrypt release semver environment variable
|
||||||
|
|
||||||
Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr/en/Downloads.html and download latest release of “Linux Generic Installer” and associated PGP signature.
|
|
||||||
|
|
||||||
### Step 8: set VeraCrypt release semver environment variable
|
|
||||||
|
|
||||||
> Heads-up: replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver.
|
> Heads-up: replace `1.24-Update7` with [latest release](https://www.veracrypt.fr/en/Downloads.html) semver.
|
||||||
|
|
||||||
@ -80,6 +76,10 @@ Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr
|
|||||||
VERACRYPT_RELEASE_SEMVER=1.24-Update7
|
VERACRYPT_RELEASE_SEMVER=1.24-Update7
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Step 8: download [VeraCrypt](https://veracrypt.fr/en/Home.html) release
|
||||||
|
|
||||||
|
Click “Applications”, then “Tor Browser”, go to https://www.veracrypt.fr/en/Downloads.html and download latest release of “Linux Generic Installer” and associated PGP signature.
|
||||||
|
|
||||||
### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
### Step 9: verify VeraCrypt release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||||
|
|
||||||
```console
|
```console
|
||||||
|
@ -63,9 +63,9 @@ imported: 1
|
|||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
### Step 5: download latest release of [Tails](https://tails.boum.org/)
|
### Step 5: download [Tails](https://tails.boum.org/) release
|
||||||
|
|
||||||
Go to https://tails.boum.org/install/download/index.en.html and download latest release and associated PGP signature (found under “Verify using OpenPGP (optional)”) to `~/Downloads` folder.
|
Go to https://tails.boum.org/install/download/index.en.html and download latest release and associated PGP signature (found under “or download the OpenPGP signature”) to `~/Downloads` folder.
|
||||||
|
|
||||||
### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
### Step 6: verify Tails release (learn how [here](../how-to-verify-pgp-digital-signatures-using-gnupg-on-macos))
|
||||||
|
|
||||||
|
@ -59,7 +59,7 @@ pip3 install --user attrs trezor
|
|||||||
|
|
||||||
### Step 6: source Python 3 `bin` directory
|
### Step 6: source Python 3 `bin` directory
|
||||||
|
|
||||||
> Heads-up: find which shell is configured using `echo $SHELL`.
|
> Heads-up: run `echo $SHELL` to find default shell.
|
||||||
|
|
||||||
> Heads-up: replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`.
|
> Heads-up: replace `3.8` with semver of latest version of Python 3 found using `ls $HOME/Library/Python`.
|
||||||
|
|
||||||
|
@ -96,7 +96,7 @@ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC2cmGUEKwopEN0vpHl2yNoV/wvm21D1hOP/8V886iC
|
|||||||
|
|
||||||
### Step 3: generate SSH authorized keys heredoc (on computer)
|
### Step 3: generate SSH authorized keys heredoc (on computer)
|
||||||
|
|
||||||
#### Set temporary environment variable
|
#### Set Borg storage quota environment variable
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
BORG_STORAGE_QUOTA="10G"
|
BORG_STORAGE_QUOTA="10G"
|
||||||
|
@ -405,7 +405,7 @@ systemctl restart systemd-networkd
|
|||||||
|
|
||||||
#### Install dnsmasq
|
#### Install dnsmasq
|
||||||
|
|
||||||
> Heads-up: please ignore systemd address already in use error (if present).
|
> Heads-up: ignore systemd address already in use error (if present).
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
apt install -y dnsmasq
|
apt install -y dnsmasq
|
||||||
|
@ -32,7 +32,7 @@ sudo chown ${USER}:admin /usr/local/sbin
|
|||||||
|
|
||||||
### Step 2: add `/usr/local/sbin` directory to `PATH` environment variable
|
### Step 2: add `/usr/local/sbin` directory to `PATH` environment variable
|
||||||
|
|
||||||
> Heads-up: find which shell is configured using `echo $SHELL`.
|
> Heads-up: run `echo $SHELL` to find default shell.
|
||||||
|
|
||||||
#### Bash (`/bin/bash`)
|
#### Bash (`/bin/bash`)
|
||||||
|
|
||||||
|
@ -10,7 +10,7 @@ Listed: true
|
|||||||
|
|
||||||
# How to use Trezor Wallet on Tails
|
# How to use Trezor Wallet on Tails
|
||||||
|
|
||||||
> Heads-up: guide is not persistent meaning steps have to be completed each time one wishes to use Trezor Wallet on Tails.
|
> Heads-up: guide is not persistent meaning steps have to be completed each time one needs to use Trezor Wallet on Tails.
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
@ -28,9 +28,9 @@ Listed: true
|
|||||||
|
|
||||||
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
|
Click “+” under ”Additional Settings”, then “Administration Password”, set password, click “Add” and finally “Start Tails”.
|
||||||
|
|
||||||
### Step 2: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready.
|
### Step 2: establish network connection using ethernet cable or Wi-Fi and wait for Tor to be ready
|
||||||
|
|
||||||
Tor is ready
|
Connected to Tor successfully
|
||||||
|
|
||||||
👍
|
👍
|
||||||
|
|
||||||
@ -68,7 +68,7 @@ imported: 1
|
|||||||
TREZOR_BRIDGE_RELEASE_SEMVER=2.0.30
|
TREZOR_BRIDGE_RELEASE_SEMVER=2.0.30
|
||||||
```
|
```
|
||||||
|
|
||||||
### Step 6: download Trezor Bridge
|
### Step 6: download Trezor Bridge release
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
torsocks curl -O https://wallet.trezor.io/data/bridge/${TREZOR_BRIDGE_RELEASE_SEMVER}/trezor-bridge_${TREZOR_BRIDGE_RELEASE_SEMVER}_amd64.deb
|
torsocks curl -O https://wallet.trezor.io/data/bridge/${TREZOR_BRIDGE_RELEASE_SEMVER}/trezor-bridge_${TREZOR_BRIDGE_RELEASE_SEMVER}_amd64.deb
|
||||||
|
Loading…
x
Reference in New Issue
Block a user