summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Kocialkowski <contact@paulk.fr>2015-01-24 14:36:18 +0100
committerPaul Kocialkowski <contact@paulk.fr>2015-01-24 14:36:18 +0100
commit81f48c0b6d31087188d7c2849c3d2ee0eb000d0a (patch)
tree064536eae6225fc1d874a4d21e2258fa94a2bfdb
parent8456f60f84a0c00037e3e8a2042a6486c57fc8cb (diff)
downloadreplicant_website-81f48c0b6d31087188d7c2849c3d2ee0eb000d0a.zip
replicant_website-81f48c0b6d31087188d7c2849c3d2ee0eb000d0a.tar.gz
replicant_website-81f48c0b6d31087188d7c2849c3d2ee0eb000d0a.tar.bz2
freedom-privacy-security-issues: Webview browsers security flaws
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
-rw-r--r--freedom-privacy-security-issues.php2
1 files changed, 1 insertions, 1 deletions
diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php
index 3015db8..4587cfb 100644
--- a/freedom-privacy-security-issues.php
+++ b/freedom-privacy-security-issues.php
@@ -32,7 +32,7 @@
<p>Replicant-supported phones recommendations:<ul><li>The <a href="//redmine.replicant.us/projects/replicant/wiki/GTA04">GTA04</a> should be the preferred choice as it can run Replicant with free bootloaders and was not proven to have bad modem isolation: instead, the documentation about the hardware indicates very strong modem isolation. The GTA04 is not fully supported by Replicant yet but we are currently working to improve the situation.</li><li>Second choices include the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyS2I9100">Galaxy S 2 (I9100)</a>, the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyS3I9300">Galaxy S 3 (I9300)</a>, the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyNote2N7100">Galaxy Note 2 (N7100)</a> and the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyNexusI9250">Galaxy Nexus (I9250)</a>, in order of supported hardware features in Replicant (more to less). These devices are fairly common and easy to find. They do not run free bootloaders, but were not proven to have bad modem isolation and perform well with Replicant.</li></ul></p>
<p>Replicant-supported tablets recommendations:<ul><!-- <li>Any of the supported Sunxi tablets should be the preferred choice as they can run Replicant with free bootloaders and usually do not come with a modem. The few models that do were not proven to have bad modem isolation.</li><li>The <a href="http://redmine.replicant.us/projects/replicant/wiki/GalaxyTab270P31xx">Galaxy Tab 2 7.0 (P31x0)</a> would be a second choice for a tablet. It is fairly common and easy to find. However, it does not run a free bootloader. It exists in a Wi-Fi-only version and the version featuring a modem was not proven to have bad modem isolation.</li> --><li>The <a href="http://redmine.replicant.us/projects/replicant/wiki/GalaxyTab270P31xx">Galaxy Tab 2 7.0 (P31x0)</a> is the preferred choice for a tablet. It is fairly common and easy to find. However, it does not run a free bootloader. It exists in a Wi-Fi-only version and the version featuring a modem was not proven to have bad modem isolation.</li></ul></p>
<h3>General good advice for freedom and privacy/security</h3>
- <p>Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:<ul><li>Installing only free software applications, from trusted sources such as F-Droid on Replicant.</li><li>Encrypting the device's storage, to prevent some unauthorized access to the device's data.</li><li>Using software that provides secure peer-to-peer-encrypted communications such as <a href="//dev.guardianproject.info/projects/gibberbot">ChatSecure</a> for instant messaging and <a href="//thialfihar.org/projects/apg/">AGP</a> with <a href="//code.google.com/p/k9mail">K-9 Mail</a> for emails on Replicant.</li><li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> on Replicant.</li><li>If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.</li></ul>In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a> and the Tor project an article entitled <a href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission Impossible: Hardening Android for Security and Privacy</a>.</p>
+ <p>Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:<ul><li>Installing only free software applications, from trusted sources such as F-Droid on Replicant.</li><li>Encrypting the device's storage, to prevent some unauthorized access to the device's data.</li><li>Using software that provides secure peer-to-peer-encrypted communications such as <a href="//dev.guardianproject.info/projects/gibberbot">ChatSecure</a> for instant messaging and <a href="//thialfihar.org/projects/apg/">AGP</a> with <a href="//code.google.com/p/k9mail">K-9 Mail</a> for emails on Replicant.</li><li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> on Replicant.</li><li>If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.</li><li>Browsers using the webview framework (such as the browser shipped with Replicant and <a href="https://github.com/anthonycr/Lightning-Browser">Lightning</a>) are subject to <a href="https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior">various security flaws</a> in Replicant 4.2.</li></ul>In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a> and the Tor project an article entitled <a href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission Impossible: Hardening Android for Security and Privacy</a>.</p>
</div>
</div>
<div class="page-header"><h2><small>Notes</small></h2></div>