Browse files

Merge pull request #20 from pettter/master

Fixes for issue #4, provisional fixes for #17 and #19
  • Loading branch information...
2 parents 5be127b + acfb0ac commit c2634a6368cd6b80c2dc29ee5bf12abc9726fae0 @yuvadm yuvadm committed Oct 15, 2012
View
4 src/Makefile
@@ -0,0 +1,4 @@
+tex:
+ ./convert_to_tex.sh
+ pdflatex main.tex
+ pdflatex main.tex
View
2 src/chapter_09_using_vpn/00_getting_setting_up_and_testing_a_vpn_account.md
@@ -16,7 +16,7 @@ When choosing a VPN provider you need to consider the following points:
* Information that is required from you to register an account - the less that is needed the better. A truly privacy concerned VPN provider would only ask you for email address (make a temporary one!), username and password. More isn't required unless the provider creates a user database which you probably don't want to be a part of.
* Payment method to be used to pay for your subscription. Cash-transfer is probably the most privacy-prone method, since it does not link your bank account and your VPN network ID. Paypal can also be an acceptable option assuming that you can register and use a temporary account for every payment. Payment via a bank transfer or by a credit card can severely undermine your anonymity on and beyond the VPN.
* Avoid VPN providers that require you to install their own proprietary client software. There is a perfect open source solution for any platform, and having to run a "special" client is a clear sign of a phony service.
- * Avoid using PPTP based VPNs, as several security vulnerabilities exist in that protocol.
+ * Avoid using PPTP based VPNs, as several security vulnerabilities exist in that protocol. In fact, if two providers are otherwise equal, choose the one _not_ offering PPTP if feasible.
* Look for a VPN provider that's using OpenVPN - an open source, multi-platform VPN solution.
* Exit gateways in countries of your interest. Having a choice of several countries allows you to change your geo-political context and appears to come from a different part of the world. You need to be aware of legislation details and privacy laws in that particular country.
* Anonymity policy regarding your traffic - a safe VPN provider will have a non-disclosure policy. Personal information, such as username and times of connection, should not be logged either.
View
2 src/chapter_14_appendices/02_glossary.md
@@ -678,7 +678,7 @@ VoIP refers to any of several protocols for real-time two-way voice communicatio
VPN (virtual private network)
-----------------------------
-A VPN (virtual private network) is a private communication network used by many companies and organizations to connect securely over a public network. Usually on the Internet it is encrypted and so nobody except the endpoints of the communication can look at the data traffic. There are various standards like IPSec, SSL, TLS or PPTP. The use of a VPN provider is a very fast, secure and convenient method to bypass Internet censorship with little risks but it generally costs money every month.
+A VPN (virtual private network) is a private communication network used by many companies and organizations to connect securely over a public network. Usually on the Internet it is encrypted and so nobody except the endpoints of the communication can look at the data traffic. There are various standards like IPSec, SSL, TLS. The use of a VPN provider is a very fast, secure and convenient method to bypass Internet censorship with little risks but it generally costs money every month. Further, note that the VPN standard PPTP is no longer considered secure, and should be avoided.
whitelist
---------
View
1 src/convert_to_tex.sh
@@ -0,0 +1 @@
+for f in */*.md;do pandoc -f markdown -t latex $f -o $f.tex; done
View
169 src/main.tex
@@ -0,0 +1,169 @@
+\documentclass[oribibl,a4paper]{book}
+
+\usepackage{amsmath,amssymb,latexsym}
+\usepackage{algorithm, algorithmic}
+\usepackage{a4}
+\usepackage{graphicx}
+\usepackage{varioref}
+\usepackage{hyperref}
+\usepackage{paralist}
+
+
+
+\begin{document}
+
+\title{The Cryptoparty Handbook}
+\author{Various authors}
+
+\maketitle
+\clearpage
+\tableofcontents
+\clearpage
+
+\graphicspath{{chapter_00_cryptoparty_handbook}}
+\chapter{Cryptoparty Handbook}
+\input{chapter_00_cryptoparty_handbook/00_a_cryptoparty_history_party_like_its_1984.md}
+\clearpage
+\input{chapter_00_cryptoparty_handbook/01_a_cryptoparty_manifesto.md}
+\clearpage
+\input{chapter_00_cryptoparty_handbook/02_how_to_cryptoparty.md}
+\clearpage
+\input{chapter_00_cryptoparty_handbook/03_why_privacy_matters.md}
+\clearpage
+\input{chapter_00_cryptoparty_handbook/04_about_this_book.md}
+\clearpage
+\graphicspath{{chapter_01_understanding_email}}
+\chapter{Understanding E-mail}
+\input{chapter_01_understanding_email/00_basic_tips.md}
+\clearpage
+\input{chapter_01_understanding_email/01_types_of_email.md}
+\clearpage
+\input{chapter_01_understanding_email/02_fears.md}
+\clearpage
+\input{chapter_01_understanding_email/03_secure_connections.md}
+\clearpage
+\input{chapter_01_understanding_email/04_secure_emails.md}
+\clearpage
+\graphicspath{{chapter_02_understanding_browsing}}
+\chapter{Understanding Browsing}
+\input{chapter_02_understanding_browsing/00_basic_tips.md}
+\clearpage
+\input{chapter_02_understanding_browsing/01_fears.md}
+\clearpage
+\input{chapter_02_understanding_browsing/02_what_happens_when_you_browse.md}
+\clearpage
+\input{chapter_02_understanding_browsing/03_accounts_and_security.md}
+\clearpage
+\input{chapter_02_understanding_browsing/04_tracking.md}
+\clearpage
+\input{chapter_02_understanding_browsing/05_anonymity.md}
+\clearpage
+\input{chapter_02_understanding_browsing/06_vpn.md}
+\clearpage
+\chapter{Publishing and Distribution}
+\input{chapter_03_publishing_and_distribution/00_publishing_anonymously.md}
+\clearpage
+\input{chapter_03_publishing_and_distribution/01_anonymous_email.md}
+\clearpage
+\input{chapter_03_publishing_and_distribution/02_file_sharing.md}
+\clearpage
+\chapter{Secure Calls and SMS}
+\input{chapter_04_secure_calls_and_sms/00_secure_calls.md}
+\clearpage
+\input{chapter_04_secure_calls_and_sms/01_secure_messaging_and_chat.md}
+\clearpage
+\graphicspath{{./chapter_05_basic_email_security/}}
+\chapter{Basic E-mail Security}
+\input{chapter_05_basic_email_security/00_start_using_thunderbird_mail.md}
+\clearpage
+\input{chapter_05_basic_email_security/01_setting_up_secure_connections.md}
+\clearpage
+\input{chapter_05_basic_email_security/02_some_additional_security_settings.md}
+\clearpage
+\graphicspath{{./chapter_06_email_encryption/}}
+\chapter{E-mail Encryption}
+\input{chapter_06_email_encryption/00_introducing_email_encryption_gpg.md}
+\clearpage
+\input{chapter_06_email_encryption/01_installing_gpg_on_windows.md}
+\clearpage
+\input{chapter_06_email_encryption/02_installing_gpg_on_osx.md}
+\clearpage
+\input{chapter_06_email_encryption/03_installing_gpg_on_ubuntu.md}
+\clearpage
+\input{chapter_06_email_encryption/04_installing_gpg_on_android.md}
+\clearpage
+\input{chapter_06_email_encryption/05_creating_your_gpg_keys.md}
+\clearpage
+\input{chapter_06_email_encryption/06_daily_gpg_usage.md}
+\clearpage
+\input{chapter_06_email_encryption/07_webmail_and_gpg.md}
+\clearpage
+\graphicspath{{./chapter_07_safer_browsing/}}
+\chapter{Safer Browsing}
+\input{chapter_07_safer_browsing/00_accessing_firefox_on_ubuntu.md}
+\clearpage
+\input{chapter_07_safer_browsing/01_installing_firefox_on_mac_os_x.md}
+\clearpage
+\input{chapter_07_safer_browsing/02_installing_firefox_on_windows.md}
+\clearpage
+\input{chapter_07_safer_browsing/03_extending_firefox.md}
+\clearpage
+\input{chapter_07_safer_browsing/04_proxy_settings.md}
+\clearpage
+\input{chapter_07_safer_browsing/05_using_tor.md}
+\clearpage
+\input{chapter_07_safer_browsing/06_extending_chrome.md}
+\clearpage
+\graphicspath{{./chapter_08_passwords/}}
+\chapter{Passwords}
+\input{chapter_08_passwords/00_keeping_passwords_safe.md}
+\clearpage
+\input{chapter_08_passwords/01_installing_keepass.md}
+\clearpage
+\input{chapter_08_passwords/02_encrypting_passwords_with_a_password_manager.md}
+\clearpage
+\graphicspath{{./chapter_09_using_vpn/}}
+\chapter{Using VPN}
+\input{chapter_09_using_vpn/00_getting_setting_up_and_testing_a_vpn_account.md}
+\clearpage
+\input{chapter_09_using_vpn/01_vpn_on_ubuntu.md}
+\clearpage
+\input{chapter_09_using_vpn/02_vpn_on_osx.md}
+\clearpage
+\input{chapter_09_using_vpn/03_vpn_on_windows.md}
+\clearpage
+\input{chapter_09_using_vpn/04_make_sure_it_works.md}
+\clearpage
+\graphicspath{{./chapter_10_disk_encryption/}}
+\chapter{Disk Encryption}
+\input{chapter_10_disk_encryption/00_installing_truecrypt.md}
+\clearpage
+\input{chapter_10_disk_encryption/01_using_truecrypt.md}
+\clearpage
+\input{chapter_10_disk_encryption/02_setting_up_a_hidden_volume.md}
+\clearpage
+\input{chapter_10_disk_encryption/03_securely_destroying_data.md}
+\clearpage
+\graphicspath{{./chapter_11_call_encryption/}}
+\chapter{Call Encryption}
+\input{chapter_11_call_encryption/00_installing_csipsimple.md}
+\clearpage
+\graphicspath{{./chapter_12_instant_messaging_encryption/}}
+\chapter{Instant Messaging Encryption}
+\input{chapter_12_instant_messaging_encryption/00_setting_up_encrypted_messaging.md}
+\clearpage
+\graphicspath{{./chapter_13_secure_file_sharing/}}
+\chapter{Secure File Sharing}
+\input{chapter_13_secure_file_sharing/00_installing_i2p_on_ubuntu.md}
+\clearpage
+\graphicspath{{./chapter_14_appendices/}}
+\chapter{Appendices}
+\appendix
+\input{chapter_14_appendices/00_the_necessity_of_open_source.md}
+\clearpage
+\input{chapter_14_appendices/01_cryptography.md}
+\clearpage
+\input{chapter_14_appendices/02_glossary.md}
+\clearpage
+
+\end{document}

0 comments on commit c2634a6

Please sign in to comment.