1 21d-PracticalPersonal


This is a common pattern:
https://www.reddit.com/r/ProgrammerHumor/comments/aloi5v/programmers_know_the_risks_involved/

1.1 Screencasts

1.2 How to set up a small business or personal computer securely

Not an academic lecture today!
A sample practical activity in setting up a personal computing environment,
for Confidentiality, Integrity, and Availability (the basic CIA of textbook security), for common tasks.

From the bottom up, hardware to high level:

1.3 Computer hardware, firmware, crypto-keys

Hardware in security arms race?
Hardware and higher level compromise?

1.4 BIOS, firmware-level

1.5 Choose your computer operating system

1.6 Securely obtain the image file for your distribution

1.7 Install

1.8 Update all software (if not already done)

1.9 Post-install system OS hardening and configuration

1.10 Software

1.11 Privacy

Personal privacy tools:
https://ssd.eff.org/
https://www.sjpl.org/privacy
http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.html

1.12 Operational Security (OpSec)

The most important thing on this list: STFU…

A fun note on modern interent op-sec: https://sive.rs/anon

1.13 Tangent: Phone

PracticalPersonal/hippa.jpg
Are there any fully open/transparent phones? Not really, but some laudable efforts:

https://www.pine64.org/pinephone/

http://libresmartphone.com/open-hardware-smartphone/

https://en.wikipedia.org/wiki/Openmoko
http://wiki.openmoko.org/wiki/Main_Page

https://puri.sm/shop/librem-5/

https://volla.online