Oct 202018

Greg Kroah-Hartman has posted a series of
making some changes around the newly adopted code of conduct.
In particular, it adds a new
describing how the code is to be interpreted in the kernel
community. “I originally sent the first two patches in this series to a lot of
kernel developers privately, to get their review and comments and see if
they wanted to ack them. This is the traditional way we have always
done for policy documents or other ‘contentious’ issues like the GPLv3
statement or the ‘closed kernel modules are bad’ statement. Due to the
very unexpected way that the original Code of Conduct file was added to
the tree, a number of developers asked if this series could also be
posted publicly before they were merged, and so, here they are.

Some kernel code-of-conduct refinements
Source: LWN.Net

Oct 202018
Tor and Tails

Tails is a live media Linux distro designed to boot into a highly secure desktop environment. Tor is a browser that prevents somebody watching your internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Learn why anonymity matters and how you can protect yourself with this Linux Journal Weekend Reading.

Tor Hidden Services 

Why should clients get all the privacy? Give your servers some privacy too!

Tails above the Rest: the Installation

How to get and validate the Tails distribution and install it. We will follow up with what Tails can and can’t do to protect your privacy, and how to use Tails in a way that minimizes your risk. Then we will finish with some more advanced features of Tails, including the use of a persistent volume (with this feature, depending on your needs, you could conceivably use Tails as your main Linux distribution).

Tails above the Rest, Part II

Now that you have Tails installed, let’s start using it. Read on to find out how to get started.

Tails above the Rest, Part III

In the first two parts on this series, we gave an overview of Tails, including how to get the distribution securely, and once you have it, how to use some of the basic tools. Here, we cover some of the more advanced features of Tails, such as some of its log-in options, its suite of encryption tools and the persistent disk.

Tor Security for Android and Desktop Linux 

The Tor Project presents an effective countermeasure against hostile and disingenuous carriers and ISPs that, on a properly rooted and capable Android device or Linux system, can force all network traffic through Tor encrypted entry points (guard nodes) with custom rules for iptables. This action renders all device network activity opaque to the upstream carrier—barring exceptional intervention, all efforts to track a user are afterwards futile.

A Bundle of Tor

The best way to set up Tor on your personal machine.

Dolphins in the NSA Dragnet

Weekend Reading: Tor and Tails
Source: Linux Journal