summaryrefslogtreecommitdiffstats
path: root/freedom-privacy-security-issues.php
diff options
context:
space:
mode:
Diffstat (limited to 'freedom-privacy-security-issues.php')
-rw-r--r--freedom-privacy-security-issues.php2
1 files changed, 1 insertions, 1 deletions
diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php
index 3015db8..4587cfb 100644
--- a/freedom-privacy-security-issues.php
+++ b/freedom-privacy-security-issues.php
@@ -32,7 +32,7 @@
<p>Replicant-supported phones recommendations:<ul><li>The <a href="//redmine.replicant.us/projects/replicant/wiki/GTA04">GTA04</a> should be the preferred choice as it can run Replicant with free bootloaders and was not proven to have bad modem isolation: instead, the documentation about the hardware indicates very strong modem isolation. The GTA04 is not fully supported by Replicant yet but we are currently working to improve the situation.</li><li>Second choices include the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyS2I9100">Galaxy S 2 (I9100)</a>, the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyS3I9300">Galaxy S 3 (I9300)</a>, the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyNote2N7100">Galaxy Note 2 (N7100)</a> and the <a href="//redmine.replicant.us/projects/replicant/wiki/GalaxyNexusI9250">Galaxy Nexus (I9250)</a>, in order of supported hardware features in Replicant (more to less). These devices are fairly common and easy to find. They do not run free bootloaders, but were not proven to have bad modem isolation and perform well with Replicant.</li></ul></p>
<p>Replicant-supported tablets recommendations:<ul><!-- <li>Any of the supported Sunxi tablets should be the preferred choice as they can run Replicant with free bootloaders and usually do not come with a modem. The few models that do were not proven to have bad modem isolation.</li><li>The <a href="http://redmine.replicant.us/projects/replicant/wiki/GalaxyTab270P31xx">Galaxy Tab 2 7.0 (P31x0)</a> would be a second choice for a tablet. It is fairly common and easy to find. However, it does not run a free bootloader. It exists in a Wi-Fi-only version and the version featuring a modem was not proven to have bad modem isolation.</li> --><li>The <a href="http://redmine.replicant.us/projects/replicant/wiki/GalaxyTab270P31xx">Galaxy Tab 2 7.0 (P31x0)</a> is the preferred choice for a tablet. It is fairly common and easy to find. However, it does not run a free bootloader. It exists in a Wi-Fi-only version and the version featuring a modem was not proven to have bad modem isolation.</li></ul></p>
<h3>General good advice for freedom and privacy/security</h3>
- <p>Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:<ul><li>Installing only free software applications, from trusted sources such as F-Droid on Replicant.</li><li>Encrypting the device's storage, to prevent some unauthorized access to the device's data.</li><li>Using software that provides secure peer-to-peer-encrypted communications such as <a href="//dev.guardianproject.info/projects/gibberbot">ChatSecure</a> for instant messaging and <a href="//thialfihar.org/projects/apg/">AGP</a> with <a href="//code.google.com/p/k9mail">K-9 Mail</a> for emails on Replicant.</li><li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> on Replicant.</li><li>If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.</li></ul>In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a> and the Tor project an article entitled <a href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission Impossible: Hardening Android for Security and Privacy</a>.</p>
+ <p>Some general good advice to ensure the best possible respect of freedom and privacy/security on mobile devices includes:<ul><li>Installing only free software applications, from trusted sources such as F-Droid on Replicant.</li><li>Encrypting the device's storage, to prevent some unauthorized access to the device's data.</li><li>Using software that provides secure peer-to-peer-encrypted communications such as <a href="//dev.guardianproject.info/projects/gibberbot">ChatSecure</a> for instant messaging and <a href="//thialfihar.org/projects/apg/">AGP</a> with <a href="//code.google.com/p/k9mail">K-9 Mail</a> for emails on Replicant.</li><li>Using <a href="//www.torproject.org/">Tor</a> to achieve reliable anonymity, for instance with <a href="//www.torproject.org/docs/android.html.en">Orbot</a> on Replicant.</li><li>If the device is telephony-enabled, switching the modem to airplane mode or (when possible) turning it off when not in use, to avoid being tracked at all times.</li><li>Browsers using the webview framework (such as the browser shipped with Replicant and <a href="https://github.com/anthonycr/Lightning-Browser">Lightning</a>) are subject to <a href="https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no-longer-provides-patches-for-webview-jelly-bean-and-prior">various security flaws</a> in Replicant 4.2.</li></ul>In addition, the <a href="//www.fsf.org/">Free Software Foundation</a> provides a <a href="//www.fsf.org/campaigns/surveillance">comprehensive guide to help protect freedom and privacy</a> and the Tor project an article entitled <a href="//blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy">Mission Impossible: Hardening Android for Security and Privacy</a>.</p>
</div>
</div>
<div class="page-header"><h2><small>Notes</small></h2></div>