diff --git a/BROWSER.md b/BROWSER.md deleted file mode 100644 index 30ffd10..0000000 --- a/BROWSER.md +++ /dev/null @@ -1,28 +0,0 @@ -# WEB BROWSER - -## GNU ICECAT -* Download from http://ftpmirror.gnu.org/gnuzilla/ -* Unpack the tarball -* As ROOT, copy and rename the folder as /opt/icecat -* ln -s /opt/icecat/icecat /usr/bin/icecat - -## ADDONS -These addons worked excellent to cover any fingerprinting, until Mozilla decided to break things since Firefox 52. -* (Cross-)Site Request, Anti-XSS, Trackers, Referer, Cookies: [uMatrix](https://addons.mozilla.org/en-US/firefox/addon/umatrix/) -* Security Settings: [Privacy Settings](https://addons.mozilla.org/en-US/firefox/addon/privacy-settings/) -* User-Agent: [Random Agent Spoofer](https://github.com/dillbyrne/random-agent-spoofer), [User-Agent JS Fixer](http://legacycollector.org/firefox-addons/378075/index.html) -* Plugin Enumeration: [Disable plugin enum](https://github.com/dillbyrne/random-agent-spoofer/issues/283) (see Mechazawa's script, and install with greasemonkey) -* Content Delivery Blocker: [Decentraleyes](https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/) -* URI Leak: [No Resource URI Leak](https://notabug.org/desktopd/no-resource-uri-leak) -* Canvas-Fingerprinting: [Canvas Defender](https://addons.mozilla.org/en-US/firefox/addon/no-canvas-fingerprinting/) -* SSL (strict HTTPS): [HTTPS by default](https://addons.mozilla.org/en-US/firefox/addon/https-by-default/) -* URL Deobfuscator: [Pure URL](https://addons.mozilla.org/en-US/firefox/addon/pure-url/) -* Google Redirection: [Google search link fix](https://addons.mozilla.org/en-US/firefox/addon/google-search-link-fix/) - -## ABOUT\:CONFIG -These tips prevent overflow your root directory or getting constantly write and delete to try and kill your drive. -* Go to _about\:config_ -* Put a 0 to everything that can write to the disk. -* Limit ram memory and also turn off syncing ect. -* Make it read only. -* If you need to save things have a seperate chroot with a seperate physical drive and make that your downloads folder. diff --git a/COMMUNICATION.md b/COMMUNICATION.md new file mode 100644 index 0000000..675398f --- /dev/null +++ b/COMMUNICATION.md @@ -0,0 +1,162 @@ +## BROWSER + +### GNU ICECAT +* Download from http://ftpmirror.gnu.org/gnuzilla/ +* Unpack the tarball +* As ROOT, copy and rename the folder as /opt/icecat +* ln -s /opt/icecat/icecat /usr/bin/icecat + +### ADDONS +These addons worked excellent to cover any fingerprinting, until Mozilla decided to break things since Firefox 52. +* (Cross-)Site Request, Anti-XSS, Trackers, Referer, Cookies: [uMatrix](https://addons.mozilla.org/en-US/firefox/addon/umatrix/) +* Security Settings: [Privacy Settings](https://addons.mozilla.org/en-US/firefox/addon/privacy-settings/) +* User-Agent: [Random Agent Spoofer](https://github.com/dillbyrne/random-agent-spoofer), [User-Agent JS Fixer](http://legacycollector.org/firefox-addons/378075/index.html) +* Plugin Enumeration: [Disable plugin enum](https://github.com/dillbyrne/random-agent-spoofer/issues/283) (see Mechazawa's script, and install with greasemonkey) +* Content Delivery Blocker: [Decentraleyes](https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/) +* URI Leak: [No Resource URI Leak](https://notabug.org/desktopd/no-resource-uri-leak) +* Canvas-Fingerprinting: [Canvas Defender](https://addons.mozilla.org/en-US/firefox/addon/no-canvas-fingerprinting/) +* SSL (strict HTTPS): [HTTPS by default](https://addons.mozilla.org/en-US/firefox/addon/https-by-default/) +* URL Deobfuscator: [Pure URL](https://addons.mozilla.org/en-US/firefox/addon/pure-url/) +* Google Redirection: [Google search link fix](https://addons.mozilla.org/en-US/firefox/addon/google-search-link-fix/) + +### ABOUT\:CONFIG +These tips prevent overflow your root directory or getting constantly write and delete to try and kill your drive. +* Go to _about\:config_ +* Put a 0 to everything that can write to the disk. +* Limit ram memory and also turn off syncing ect. +* Make it read only. +* If you need to save things have a seperate chroot with a seperate physical drive and make that your downloads folder. + +## E-MAIL + +TODO: +* Set cock.li +* Configure mutt +* Create account. +* Set mutiple accounts +* Send mail +* Send attachment +* To cancel an action in mutt hit CTRL+g +* Use notmuch +* set i2p-bote + +### E-MAIL STORAGE FORMATS +* MAILDIR = several files +* MBOX = one file for everything + +### MUTTRC +Example config with cock.li and gmail. Not quite complete but can work if tweaked. +``` +#--------------------------------------- +# ~/.mutt/muttrc settings mutt 1.5.20 +#--------------------------------------- +# +#--------------------------------------- +# One-Time Previous Steps +#--------------------------------------- +# Generate keys with proper user +# $ gpg --gen-key +# +# Make proper directory with file: +# $ mkdir ~/.mutt && touch ~/.mutt/.passwd +# +# Put the following inside ~/.mutt/.passwd: +# set cock_pass="password" +# set gmail_pass="password" +# +# Encrypt with proper user: +# $ gpg -r USER1 -e ~/.mutt/.passwd +# $ shred ~/.mutt/.passwd +# $ rm -f ~/.mutt/.passwd +# +#--------------------------------------- +# Process the password file first (the "|" pipes to Mutt) +#--------------------------------------- +#source "gpg -d ~/.mutt/.passwd.gpg |" +# +#--------------------------------------- +# Account Hooks +#--------------------------------------- +account-hook . 'unset imap_user imap_pass' # unset first! +account-hook 'imaps://mail.cock.li:993/' "\ + set imap_user=USER1@cock.li imap_pass=`cat ~/.mutt/.cock ` " # imap_pass=$my_cock_pass " +#account-hook 'imaps://USER2@imap.gmail.com/' "\ +# set imap_user=USER2 imap_pass=$my_gmail_pass " +# +#---------------------------------------- +# Folders, mailboxes and folder hooks +#---------------------------------------- +# +# Setup for USER1: +#---------------------------------------- +set folder = imaps://mail.cock.li:993/ +mailboxes =Inbox =Sent =Junk =Trash +folder-hook 'imaps://mail.cock.li:993' " \ + set folder=imaps://mail.cock.li:993/ \ + record=+Sent \ + smtp_url=smtps://$imap_user@mail.cock.li:465 \ + signature=~/.mutt/USER1.sig \ + from='USER1 ' \ + realname='USER1' " +# +#---------------------------------------- +# Setup for USER2: +#---------------------------------------- +#set folder="imaps://USER2@imap.gmail.com/" +#mailboxes =INBOX =[Gmail]/Drafts =[Gmail]/'Sent Mail' =[Gmail]/Spam +#folder-hook 'imaps://USER2@imap.gmail.com' " \ +# set folder=imaps://USER2@imap.gmail.com/ \ +# postponed=+[Gmail]/Drafts \ +# record=+[Gmail]/'Sent Mail' \ +# smtp_url=smtps://USER2@smtp.gmail.com \ +# smtp_pass=$my_gmail_pass \ +# signature=~/.mutt/USER2.sig \ +# from='USER2 ' \ +# realname='USER2' " +# +#---------------------------------------- +# Macros to make life easier +#---------------------------------------- +macro index 1 "y1" # ESC+1 takes to first INBOX +#macro index 2 "y5" # ESC+2 takes to the second +# +#--------------------------------------- +# Mail-check preferences +#--------------------------------------- +set timeout=60 #Check for mail every minute +set mail_check=5 +# +#--------------------------------------- +# Set preferred editor +#--------------------------------------- +set editor='vim + -c "set textwidth=72" -c "set wrap" -c "set nocp" -c "?^$"' +# EOF +``` + +## USENET +The software used is __slrn__ ( with __slrnpull__ and + __slrnface__). + +* 1. Create slrn.rc: +``` +set username "desired_username" +set hostname "desired_hostname.invalid" +set replyto "some_name " +charset display utf8 +charset outgoing utf8 +setkey group "set_prefix_argument(4); () = select_group();" " " +``` + +* 2. Set $NNTPSERVER to usenet provider (set in config file): +`NNTPSERVER='server_name' && export NNTPSERVER` + +* 3. Set $EDITOR to preferred text editor (set in slrn.rc file): +`set editor_command "vim '+set tw=72' +%d '%s'"` + +* 4. Create .jnewsrc +`touch .jnewsrc` + +* 5. Create configuration +`slrn --create` + +* 6. Download a list of newsgroups +`slrn -d`