Guest User

Security tips in order of difficulty

a guest
Apr 29th, 2017
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. SECURITY TIPS in order of difficulty (not meant to be followed step by step, although it is recommended):
  3. Level 1: Avoid using your real name online and avoid giving away any personal information. You can use The Random Identity Generator (rig) to generate an online persona and/or login sites using passwords from
  4. Level 2: Use your web browser with javascript, cookies and any telemetry (like "pocket", geolocation and WebRTC) disabled by default and remove the browser fingerprinting. Enable javascript and cookies only on selected sites. IceCat is the best option, Firefox works too. Use IceCatMobile with AFWall+ (and maybe Android IMSI-Catcher Detector) on phones.
  5. Level 3: Don't save your passwords on a plaintext or in some "cloud" service like lastpass and don't save logins on your phone or web browser. Create and remember one good main password (must have lowercase, uppercase, numbers and symbols, be longer than 8 characters and change bimonthly), use KeePassX (and I mean the one with an X) and use the option to generate different passwords for each account you have. Other options are kpcli, or pass with apg (for password generator). Use KeePassDroid on phones.
  6. Level 4: Replace your e-mail provider with a more safe, more appropriate provider. A first option is, protonmail is another.
  7. Level 5: Use an e-mail client that can to block web beacons (tracking pixels). Thunderbird is easy and has a plugin for this, Mutt is another great option.
  8. Level 6: Encrypt your e-mails with GnuPG. Thunderbird has the Enigmail plugin for this.
  9. Level 7: Delete any metadata from files you share on the internet. MAT is an easy tool for this, ExifTool is a better option.
  10. Level 8: When possible opt for IRC (or try GNU Ring) instead of non-publicly auditable chat networks. A good and easy IRC application is Hexchat, another is irssi. You can use BitlBee to access regular networks through an IRC client if you need.
  11. Level 9: When possible opt for GNU Social instead of non-publicly auditable social networks known to sell private information.
  12. ---Start of medium level security---
  13. Level 10: Use GNU/Linux. Start with Lubuntu/Linux Mint/Linux Lite for easy mode (stay away from something called BSD).
  14. Level 11: Use a GNU/Linux distro free from "systemd". Devuan is a good option.
  15. Level 12: Uninstall Avahi, Cups (replace with Line Printer if needed), Telnet, the R-tools (rlogin, rsh, rcp, rwho, rexec), and unused services like ssh/web/ftp/mail.
  16. Level 13: Use Uncomplicated Firewall to block inbound AND outbound network traffic, permitting only what you need.
  17. Level 14: Use DNSCrypt to prevent DNS Leaking with an OpenNIC provider known to not save logs.
  18. Level 15: Use YaCy with collaborative database disabled when in need to search on the web.
  19. Level 16: Use the Tor Browser to navigate the internet through Tor.
  20. Level 17: Use Exim (plus Dovecot) in your own server for e-mail. OpenSMTPD is another option.
  21. Level 18: Use Firejail with your applications.
  22. Level 19: Give your applications a separate user account and use sudo, ulimit and quota with them.
  23. ---Measures that cost money---
  24. Level 20: Buy a VPS in a non-extradition, privacy friendly country under a different name, with a good way of not getting traced with payments, then set up your own VPN server so you can audit all the traffic.
  25. Level 21: Buy a phone with Replicant and libre firmware. Tehnoetic sells an S3 phone with Replicant and only libre firmware enabled, so far is the best option.
  26. Level 22: Buy a router compatible with LibreCMC and install LibreCMC, keep it up to date and give it a strong password. OpenWrt is another option.
  27. Level 23: Buy a computer compatible with the Libreboot firmware and the Linux-libre kernel, then install both or buy it preinstalled. Thinkpads are a good option. Models x200 are advised, t400 are another option.
  28. ---Start of physical access measures---
  29. Level 24: Set a BIOS password (DON'T FORGET THIS PASSWORD!).
  30. Level 25: Use USBGuard (for Anti Juice Jacking).
  31. Level 26: Use disk encryption with dm-crypt, saving the key on a separate usb that you keep with yourself at all times.
  32. Level 27: Encrypt your boot partition with cryptboot.
  33. ---Start of high level security---
  34. Level 28: Use a source based distro, preferably without crypto libraries on its package manager. Source Mage is advised and it is easy to setup.
  35. Level 29: Use the IRC, e-mail and torrent services available inside i2p, and use Tor as an outproxy for i2p when in need to access the regular web.
  36. Level 30: Use Bastille Linux to harden your system.
  37. Level 31: Use Lynis to audit your system.
  38. Level 32: Use Arpalert/ArpON (for Man-In-The-Middle -MITM- Detection) and Suricata/Snort (for Network Intrusion Detection).
  39. Level 33: Use a complete host intrusion detection framework like Tiger, which can work with Tripwire (for integrity check), Unhide/Chkrootkit/rkhunter (for rootkit detection), ClamAV/Linux Malware Detect and a system logger like sysklogd. Using Samhain is an alternative.
  40. Level 34: Use grsecurity (for RBAC) with AppArmor (for filesystem ACL).
  41. Level 35: Compile your own kernel and add only necessary modules.
  42. ---Start of deterrent measures---
  43. Level 36: Learn to hack yourself first.
  44. Level 37: Use only libre software (software "free as in freedom").
  45. Level 38: Reduce the amount of software installed in your computer.
  46. Level 39: Opt for text-based programs with less library dependencies than their GUI counterparts.
  47. Level 40: Support GPLv3 license as to prevent proprietary license wrapping (as with BSD/MIT/Apache licenses) and tivoization.
  48. Level 41: Deduplicate efforts and converge strategies to achieve a "tight base system" in common (use the koan "if is not strictly necessary it should be strictly optional, but still optional"), and that means making things modular and avoiding unnecessary dependencies instead of trusting "crypto libraries".
  49. Level 42: Abandon traditional, non-publicly auditable, data mined networks and erase your online persona. Use exclusively peer-to-peer networks.
  50. Level 43: Don't fuck up.
RAW Paste Data