Upload files to "content/posts/tech"
This commit is contained in:
parent
13e1a6d700
commit
87d0404430
29
content/posts/tech/i-stopped-pgp-encrypted-emails.md
Normal file
29
content/posts/tech/i-stopped-pgp-encrypted-emails.md
Normal file
@ -0,0 +1,29 @@
|
||||
---
|
||||
title: "I stopped PGP encrypted emails"
|
||||
date: 2025-02-04T10:36:00+01:00
|
||||
draft: false
|
||||
tags: ["tech","encryption","PGP","data privacy"]
|
||||
author: "Olivier Falcoz"
|
||||
hidemeta: false
|
||||
ShowReadingTime: true
|
||||
ShowPostNavLinks: true
|
||||
showtoc: false
|
||||
cover:
|
||||
image: "/images/"
|
||||
alt: "<alt text>"
|
||||
caption: "<text>"
|
||||
---
|
||||

|
||||
Public key cryptography[^1] - [xkcd](https://www.explainxkcd.com/wiki/index.php/1553:_Public_Key)
|
||||
|
||||
## Background
|
||||
|
||||
> [Spoiler]: Before the community of die-hard PGP[^2] users jump all over me, let me give you a little bit of background on this.
|
||||
|
||||
I've been using PGP for nearly 20 years. It was one of the few solutions that allowed me to avoid the invasive curiosity of our Chinese *friends* when I lived in China[^3]. Around the same time, and for similar reasons, I also gave up Windows and switched my working environment to Linux.
|
||||
|
||||
|
||||
---
|
||||
[^1]: Cartoon explanation: when Cueball first created the key pair, he imagined it would be something he used from time to time, for reading messages only intended for him or for sending "signed" messages. Since nothing of the sort happened, he imagines releasing both keys might cause some activity, and at this point he is happier with a *bad* outcome than with a boring one - [xkcd](https://www.explainxkcd.com/wiki/index.php/1553:_Public_Key).
|
||||
[^2]: PGP here refers to [OpenPGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP) - Wikipedia
|
||||
[^3]: [China bans Microsoft](https://www.bbc.com/news/technology-27494650) Windows 8 on government computers - BBC
|
282
content/posts/tech/my-privacy-tools.md
Normal file
282
content/posts/tech/my-privacy-tools.md
Normal file
@ -0,0 +1,282 @@
|
||||
---
|
||||
title: "My Privacy Tools"
|
||||
date: 2024-04-16T14:12:00+02:00
|
||||
draft: false
|
||||
tags: ["Data Privacy","Tech","Tools","Software"]
|
||||
author: "Olivier Falcoz"
|
||||
hidemeta: false
|
||||
ShowReadingTime: true
|
||||
ShowPostNavLinks: true
|
||||
showtoc: false
|
||||
cover:
|
||||
image: "/images/"
|
||||
alt: "<alt text>"
|
||||
caption: "<text>"
|
||||
---
|
||||

|
||||
|
||||
Image credit: "[Lets leave planet GAFAM NATU BATX](https://www.peppercarrot.com/sr/viewer/framasoft__2022-05-23_lets-leave-planet-GAFAM-NATU-BATX_by-David-Revoy.html)" by David Revoy for [Framasoft](https://framasoft.org/) − [CC-BY 4.0](https://creativecommons.org/licenses/by/4.0/deed.sr)
|
||||
|
||||
# Why Privacy & Security Matter
|
||||
|
||||
This is a fairly old topic - bu Internet standards and some very good people have already written a lot about it, so it is now very well documented. Here are some of the most famous quotes:
|
||||
|
||||
> Parce que vous vous foutez de vos libertés, ce sont les miennes qui disparaissent -- [@aeris](https://blog.imirhil.fr/2014/06/22/vos-libertes-mes-libertes.html), 2014.
|
||||
|
||||
> Everything Is Broken -- [Quinn Norton](https://medium.com/message/everything-is-broken-81e5f33a24e1), 2014. En [français ici](https://framablog.org/2014/06/02/plus-rien-ne-marche-que-faire/).
|
||||
|
||||
> Most of us have nothing to hide but we all have something to lose -- [Tommy Collison](https://medium.com/@tommycollison/nothing-to-hide-everything-to-lose-aff5f7c96004), 2014.
|
||||
|
||||
> I need privacy, not because my actions are questionable, but because your judgement and intentions are -- u/starrywisdomofficial (alledgelly)
|
||||
|
||||
> Too many wrongly characterize the debate as “security versus privacy.” The real choice is liberty versus control. -- Bruce Schneier, [The Eternal Value of Privacy](https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html), 2006.
|
||||
|
||||
> Why Privacy Matters Even if You Have ‘Nothing to Hide’ -- [Daniel J. Solove](https://web.archive.org/web/20210225053545/https://www.chronicle.com/article/why-privacy-matters-even-if-you-have-nothing-to-hide/), 2011.
|
||||
|
||||
This is a fairly old topic - by internet standards - and some very good people have written a lot about it, so it is now very well documented.
|
||||
|
||||
The lesson here is that there are three areas that need to be protected at all costs:
|
||||
|
||||
- The confidentiality of the exchange - we don't want everyone to know who we're talking to;
|
||||
- Trust in the network - we want to be sure we're talking to the right person;
|
||||
- The security of the data itself - we don't want our data to fall into the wrong hands.
|
||||
|
||||
So we want to guarantee the confidentiality, the integrity, but also the availability of the data that we use. Fortunately, the US cybersecurity community has come up with a cute anagram for us mortals to remember: **C.I.A.** (too bad, NSA[^1] was already taken).
|
||||
|
||||
# Software I use
|
||||
|
||||
My privacy-focused tools are selected primarily on the basis of their security features, with an additional emphasis on tools that are decentralised and open source. They are applicable to a variety of threat models, from protecting against global mass surveillance programmes to avoiding big tech companies to mitigating attacks. But only you can determine what works best for your needs[^2].
|
||||
|
||||
Finding the right balance between Security, Privacy and Usability is one of the first and most difficult tasks we need to face as we strive to protect privacy. Security, in particular, is a process rather than a product, and there is a trade-off: the more secure something is, the more restrictive or inconvenient it usually is.
|
||||
|
||||
Here are some sample questions to help you familiarize yourself with the concept of threat modeling[^3] before you make your own decisions.
|
||||
|
||||
> - What do I want to protect?
|
||||
> - Who do I want to protect it from?
|
||||
> - How likely is it that I will need to protect it?
|
||||
> - How bad are the consequences if I fail?
|
||||
> - How much trouble am I willing to go through to try to prevent potential consequences?
|
||||
|
||||
Once you've completed this quick assessment, you're free to choose the software that you feel is best for your specific use case.
|
||||
|
||||
---
|
||||
## Mobile Web Browsers
|
||||
|
||||
See a [Browser Comparison Table](https://divestos.org/pages/browsers) by DivestOS to understand the key differences between all the mobile browsers available for Android.
|
||||
|
||||
### Mull for Android
|
||||
|
||||

|
||||
|
||||
[Mull](https://f-droid.org/en/packages/us.spotco.fennec_dos/) is a Gecko based privacy hardened fork of Firefox developed by [DivestOS](https://divestos.org/pages/our_apps#mull), with proprietary blobs removed. It enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from the [arkenfox](https://github.com/arkenfox/user.js) `user.js` project.
|
||||
|
||||
> **Warning**: Firefox-based browsers on Android lack [per-site process isolation](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196).
|
||||
|
||||
### Cromite for Android (Chromium based)
|
||||
|
||||

|
||||
|
||||
[Cromite](https://github.com/uazo/cromite) is a [Chromium](https://www.chromium.org/Home) fork based on [Bromite](https://github.com/bromite/bromite) with built-in support for ad blocking and an eye for privacy.
|
||||
|
||||
---
|
||||
## Desktop Web Browsers
|
||||
|
||||
### Firefox
|
||||
|
||||

|
||||
|
||||
[Firefox](https://firefox.com/), Open Source, independent browser. It requires some hardening and tweaking using preferences from the [arkenfox](https://github.com/arkenfox/user.js) `user.js` project to achieve better privacy.
|
||||
|
||||
### Tor Browser
|
||||
|
||||

|
||||
|
||||
[Tor Browser](https://www.torproject.org/) defends against surveillance by preventing anyone monitoring a user's connection from knowing what websites they visit. Blocks trackers by isolating each website visited so that third-party trackers and ads can't follow. Resists fingerprinting by making all users look the same, making it difficult to be fingerprint users based on their browser and device information. Multi-layered encryption, the traffic is relayed and encrypted three times as it passes over the Tor network.
|
||||
|
||||
---
|
||||
|
||||
### Web Browser Extension
|
||||
|
||||
I follow Arkenfox's [position](https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-foreword) which recommends *keeping extensions to a minimum: they have [privileged access](https://blog.mozilla.org/attack-and-defense/2020/06/10/understanding-web-security-checks-in-firefox-part-1/) within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation*. Therefore, I only use uBlock Origin.
|
||||
|
||||

|
||||
|
||||
[uBlock Origin](https://github.com/gorhill/uBlock) is an addon to Firefox (mobile) and Chrome/Chromium (desktop). It blocks ads, trackers and malware sites while conserving CPU and memory. Please read about [what the addon does](https://github.com/gorhill/uBlock/wiki/Blocking-mode) before installing, then choose one of the recommended modes to increase your privacy. If you don't understand what you're doing you could end up compromising your privacy.
|
||||
|
||||
In addition to the various blocklists that come pre-installed with the addon, I specifically use the [DNS Block List](https://sebsauvage.net/wiki/doku.php?id=dns-blocklist-en) maintained by Seb Sauvage, which is available in several formats:
|
||||
|
||||
- `hosts format (0.0.0.0 hostname)` https://sebsauvage.net/hosts/hosts for Android and computers. This hosts file can be used as is in Windows, Linux, MaOSX and in personalDNSFilterr and DNS66 on Android.
|
||||
- `AdGuard/uBlock-Origin format (||hostname^)` https://sebsauvage.net/hosts/hosts-adguard , for Android and computers. This list can be used in **AdGuard** Android and **uBlock Origin**.
|
||||
|
||||
## Email Services
|
||||
|
||||
According to your threat model, understanding the **key disclosure laws** for [Belgium](https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium) and [Germany](https://en.wikipedia.org/wiki/Key_disclosure_law#Germany), also known as mandatory key disclosure, the laws that require individuals or businesses to surrender cryptographic keys to law enforcement, could enter into the equation when it comes to choosing an email provider. The two providers I have been long using - Mailfence since 2016 - support PGP/GnuPG encryption and [two-factor authentication](https://en.wikipedia.org/wiki/Multi-factor_authentication) (2FA), custom domain names and aliases and are fairly privacy-friendly.
|
||||
|
||||
### Mailfence
|
||||
|
||||

|
||||
|
||||
[Mailfence](https://mailfence.com/) is an email services based in Belgium
|
||||
[About](https://mailfence.com/en/private-email.jsp) // [Privacy policy](https://mailfence.com/en/privacy.jsp) // [Transparency report](https://blog.mailfence.com/transparency-report-and-warrant-canary/)
|
||||
|
||||
### Mailbox
|
||||

|
||||
|
||||
[Mailbox.org](https://mailbox.org/) is based in Germany
|
||||
[About](https://mailbox.org/en/company#our-mission) // [Privacy policy](https://mailbox.org/en/data-protection-privacy-policy) // [Transparency report](https://mailbox.org/en/company#transparency-report)
|
||||
|
||||
## Email Clients
|
||||
|
||||
### Thunderbird
|
||||

|
||||
|
||||
[Thunderbird](https://thunderbird.net/) is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation.
|
||||
|
||||
### GNOME Evolution
|
||||

|
||||
|
||||
[Evolution](https://wiki.gnome.org/Apps/Evolution) is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive documentation to help you get started.
|
||||
|
||||
### Fairemail (Android)
|
||||

|
||||
|
||||
[Fairemail](https://email.faircode.eu/) is a fully-featured and easy mail client for Android, open-source email app, using open standards (IMAP, SMTP, OpenPGP). Supports unlimited accounts and email addresses with the option for a unified inbox. Clean user interface, with a dark mode option, it is also very lightweight and consumes minimal data usage
|
||||
|
||||
## Encryption Tools
|
||||
|
||||
### GnuPG/OpenPGP
|
||||

|
||||
|
||||
Tools for signing, verifying, encrypting and decrypting text and files using GnuPG standard
|
||||
|
||||
[GNU Privacy Guard](https://gnupg.org/) (GnuPG) is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government.
|
||||
|
||||
|
||||
### OpenKeychain (Android)
|
||||

|
||||
|
||||
[OpenKeychain](https://openkeychain.org/) is one of the very few an Android implementation of GnuPG/OpenPGP. It works flawlessly with mail clients such as K-9 Mail and [FairEmail](https://email.faircode.eu/) in providing encryption support.
|
||||
|
||||
### Veracrypt
|
||||

|
||||
|
||||
[Veracrypt](https://veracrypt.fr/) is a free open source disk encryption software for Windows, macOS and Linux. You can use it to either encrypt a specific file or directory, or an entire disk or partition. VeraCrypt is incredibly feature-rich, with comprehensive encryption options, yet the GUI makes it easy to use. It has a CLI version, and a portable edition. VeraCrypt is the successor of (the now deprecated) TrueCrypt
|
||||
|
||||
### LUKS
|
||||

|
||||
|
||||
Linux Unified Key Setup ([LUKS](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md)) is the default **full disk encryption** in Linux using `dm-crypt`. [Securing a root file system](https://wiki.archlinux.org/title/dm-crypt/Encrypting_an_entire_system#LUKS_on_a_partition) is where `dm-crypt` excels, feature and performance-wise. Unlike selectively encrypting non-root file systems, an encrypted root file system can conceal information such as which programs are installed, the usernames of all user accounts, and common data-leakage vectors such as `mlocate` and `/var/log/`. Furthermore, an encrypted root file system makes tampering with the system far more difficult, as everything except the boot loader and (usually) the kernel is encrypted. I use LVM on LUKS with Arch Linux.
|
||||
|
||||
|
||||
## Password Management
|
||||
|
||||
### KeypassXC
|
||||

|
||||
|
||||
[KeepassXC](https://keepassxc.org/) is a hardened, secure and offline password manager. Does not have cloud-sync baked in, deemed to be gold standard for secure password managers.
|
||||
|
||||
### KeypassDX (Android)
|
||||

|
||||
|
||||
[KeepassDX](https://keepassdx.com/) is the Android client.
|
||||
|
||||
## Search Engines
|
||||
|
||||
### Startpage
|
||||

|
||||
|
||||
[Startpage](https://www.startpage.com/) is a private search engine. One of Startpage's unique features is the [anonymous view](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding some network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity.
|
||||
|
||||
> **Warning**: Startpage's majority shareholder is System1 who is an adtech company although they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy).
|
||||
|
||||
### SearchXNG
|
||||

|
||||
|
||||
SearXNG is a metasearch engine that aggregates the results of other search engines while not storing any information itself. You can either self-host or use any of the multiple [public instances](https://searx.space/) of SearXNG.
|
||||
|
||||
I use [searx.envs.net](https://searx.envs.net/).
|
||||
|
||||
|
||||
|
||||
## VPN Service
|
||||

|
||||
|
||||
[Mullvad](https://mullvad.net/) is a Swedish based VPN provider that retains no logs, and uses a mostly open source and transparent infrastructure available to the public. Mullvad is one of the best for privacy, they have a totally anonymous sign up process, you don't need to provide any details at all, you can choose to pay anonymously too with Monero, BTC or cash.
|
||||
|
||||
## Collaborative Tools
|
||||
|
||||
### Nextcloud
|
||||

|
||||
|
||||
[Nextcloud](https://github.com/nextcloud) is is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It's a feature-rich productivity platform, that can be used to backup and selectively sync encrypted files and folders between 1 or more clients. A key benefit the wide range of plug-ins in the NextCloud App Store, maintained by the community.
|
||||
|
||||
### Cryptpad
|
||||

|
||||
|
||||
[Cryptpad](https://cryptpad.fr/) is a zero knowledge cloud productivity suite, alternative to popular office tools. All content is end-to-end encrypted (E2EE)[^4] and can be shared with other users easily. Provides Rich Text, Presentations, Spreadsheets, Kanban, Paint a code editor and file drive. All content is encrypted by default and can be accessed with specific URL. CryptPad is entirely web-based ans works in any browser, desktop and mobile. You can use their web service, or you can host your own instance.
|
||||
|
||||
### LibreOffice
|
||||

|
||||
|
||||
[LibreOffice](https://libreoffice.org/) is a free and open-source office suite with extensive functionality.
|
||||
|
||||
### Send
|
||||

|
||||
|
||||
[Send](https://github.com/timvisee/send#readme) is a fork of Mozilla's Firefox Send that Mozilla discontinued. It's actively maintained. Self-host or public [instances](https://github.com/timvisee/send-instances?tab=readme-ov-file#instances) including the maintainer [own public instance](https://send.vis.ee/).
|
||||
|
||||
### PrivateBin
|
||||

|
||||
|
||||
[Privatebin](https://privatebin.info/) self-hosted and [public instances](https://privatebin.info/directory) is minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
|
||||
|
||||
## Real-Time Communication
|
||||
|
||||
### Signal (centralized)
|
||||

|
||||
|
||||
[Signal](https://signal.org/) has developed what's become the [Gold Standard](http://en.wikipedia.org/wiki/Signal_Protocol) in message encryption. Developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy and post-compromise security.
|
||||
|
||||
> Warning: requires a phone number for registration
|
||||
|
||||
### Element/Matrix (decentralized)
|
||||

|
||||
|
||||
[Element](https://element.io/) is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/ecosystem/clients) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication.
|
||||
|
||||
Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls.
|
||||
|
||||
> **Warning**: No PFS (Perfect Forward Secrecy) and metadata-chatty
|
||||
|
||||
---
|
||||
Sources:
|
||||
- [Framasoft](https://framasoft.org/en/) - a 23yo French Non-Profit Association fighting against [surveillance capitalism](https://en.wikipedia.org/wiki/Surveillance_capitalism) and promoting the use of Free Software
|
||||
- [Catalogue des logiciels libres](https://code.gouv.fr/sill/list) - Socle Interministériel des Logiciels Libres (SIIL), Recommended Free Software for French public agencies
|
||||
- [Awesome Privacy List](https://github.com/pluja/awesome-privacy) by Pluja - Github (11.8k stars)
|
||||
- [Awesome Privacy List ](https://github.com/lissy93/awesome-privacy) by by Lissy93 - Github (5.9k stars)
|
||||
- [Awesome Privacy List](https://github.com/nikitavoloboev/privacy-respecting) by Nikita Voloboev - Github (1.9k stars)
|
||||
- [De-Google-ify Internet](https://degooglisons-internet.org/en/) - Framasoft (multilingual)
|
||||
- [The guide to restoring your online privacy](https://www.privacyguides.org/en/) - Privacyguides (multilingual)
|
||||
- [Manuel du parfait petit crypto-anarchiste (1/3)](https://blog.imirhil.fr/2013/09/01/manuel-du-parfait-petit-crypto-anarchiste-1.html) - [@aeris](https://imirhil.fr/)
|
||||
- [Manuel du parfait petit crypto-anarchiste (2/3)](https://blog.imirhil.fr/2013/09/02/manuel-du-parfait-petit-crypto-anarchiste-2.html) - [@aeris](https://imirhil.fr/)
|
||||
- [Manuel du parfait petit crypto-anarchiste (3/3)](https://blog.imirhil.fr/2013/09/06/manuel-du-parfait-petit-crypto-anarchiste-3.html) - [@aeris](https://imirhil.fr/)
|
||||
- [Librezo.fr](https://librezo.fr/) - A group of _digital artisans_ offering an alternative to the big online services by promoting self-hosting, individual support and free software solutions installed on your own server.
|
||||
- [Recommended apps for Android](https://divestos.org/pages/recommended_apps) - DivestOS
|
||||
- [Instant Messenger Comparison Table](https://divestos.org/pages/messengers) - DivestOS
|
||||
- [Mobile Browser Comparison Table](https://divestos.org/pages/browsers) - DivestOS
|
||||
- [Ethical Alternatives & Resources](https://ethical.net/resources/) - Ethical Networks
|
||||
- [Privacy](https://www.eff.org/issues/privacy) and [Tools](https://www.eff.org/pages/tools) - the Electronic Frontier Foundation
|
||||
- [Surveillance Self-Defense](https://ssd.eff.org/) Tips, Tools and How-Tos for Safer Online Communications - a project of the Electronic Frontier Foundation
|
||||
- [Ethical, easy-to-use and privacy-conscious alternatives to well-known software](https://switching.software/) - switching.software
|
||||
- [How to configure Firefox to enhance security and privacy](https://wiki.archlinux.org/title/Firefox/Privacy) - Arch Linux Wiki
|
||||
- [Arkenfox user.js for Firefox](https://github.com/arkenfox/user.js/releases) (releases) - Arkenfox `user.js` is a template which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage.
|
||||
- [The Secrets of Surveillance Capitalism](https://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-secrets-of-surveillance-capitalism-14103616.html) - "Governmental control is nothing compared to what Google is up to. The company is creating a wholly new genus of capitalism, a systemic coherent new logic of accumulation we should call surveillance capitalism" -- Shoshana Zuboff
|
||||
- [Edward Snowden](https://en.wikipedia.org/wiki/Edward_Snowden) on [Substack](https://edwardsnowden.substack.com/)
|
||||
- [Bruce Schneier](https://www.schneier.com/), cryptographer, computer security professional and privacy specialist
|
||||
- Thaddeus E. Grugq on [Medium](https://medium.com/@thegrugq), [Substack](https://grugq.substack.com), [Fediverse](https://infosec.exchange/@thegrugq)
|
||||
|
||||
|
||||
[^1]: The US [National Security Agency](https://en.wikipedia.org/wiki/National_Security_Agency) - Wikipedia
|
||||
[^2]: See [Privacy Tools](https://www.privacyguides.org/en/tools/) recommendations by privacyguides.org
|
||||
[^3]: A [threat model](https://www.privacyguides.org/en/basics/threat-modeling/) is a list of the most probable threats to your security and privacy endeavors - privacyguides.org
|
||||
[^4]: [End-to-end encryption](https://en.wikipedia.org/wiki/End-to-end_encryption) - Wikipedia
|
19
content/posts/tech/peugeot-http-404.md
Normal file
19
content/posts/tech/peugeot-http-404.md
Normal file
@ -0,0 +1,19 @@
|
||||
---
|
||||
title: "A HTTP 404 by Peugeot"
|
||||
date: 2017-11-09T04:43:49+06:00
|
||||
draft: false
|
||||
tags: ["tech","email"]
|
||||
author: "Olivier Falcoz"
|
||||
hidemeta: false
|
||||
ShowReadingTime: true
|
||||
ShowPostNavLinks: true
|
||||
showtoc: false
|
||||
cover:
|
||||
image: ""
|
||||
alt: ""
|
||||
caption: ""
|
||||
|
||||
---
|
||||

|
||||
|
||||
Nice pun [Mailfence](https://mailfence.com): the Peugeot 404, the first car I remember as a child. With red leather seats. What a beauty.
|
19
content/posts/tech/robots-the-new-yorker.md
Normal file
19
content/posts/tech/robots-the-new-yorker.md
Normal file
@ -0,0 +1,19 @@
|
||||
---
|
||||
title: "Robots are the future, aren't they?"
|
||||
date: 2017-10-16T05:38:00+06:00
|
||||
draft: false
|
||||
tags: ["tech",]
|
||||
author: "Olivier Falcoz"
|
||||
# canonicalURL: "https://9x0rg.com/posts/tech/robots-the-new-yorker/"
|
||||
hidemeta: false
|
||||
ShowReadingTime: true
|
||||
ShowPostNavLinks: true
|
||||
showtoc: false
|
||||
cover:
|
||||
image: ""
|
||||
alt: ""
|
||||
caption: "."
|
||||
|
||||
---
|
||||

|
||||
-- Cover of [The New Yorker](https://www.newyorker.com/), Oct. 23 2017
|
33
content/posts/tech/the-economics-of-warfare-have-changed.md
Normal file
33
content/posts/tech/the-economics-of-warfare-have-changed.md
Normal file
@ -0,0 +1,33 @@
|
||||
---
|
||||
title: "The economics of warfare have changed"
|
||||
date: 2017-06-13T01:42:00+06:00
|
||||
draft: false
|
||||
tags: ["security","tech"]
|
||||
author: "Olivier Falcoz"
|
||||
hidemeta: false
|
||||
ShowReadingTime: true
|
||||
ShowPostNavLinks: true
|
||||
showtoc: false
|
||||
cover:
|
||||
image: "<image path/url>"
|
||||
alt: "<alt text>"
|
||||
caption: "<text>"
|
||||
relative: false # To use relative path for cover image, used in hugo Page-bundles
|
||||
|
||||
---
|
||||
> All wars are won or lost due to either side's ability to secure supply lines, logistics, transportation, provisions, military hardware, and communications. And the ability to pay for all of them. Just as any business which can't finance its plans goes belly up so, too, does any army.
|
||||
>
|
||||
> Now, imagine an army with the ability to decentralise all of these elements.
|
||||
>
|
||||
> This army is actually technologically and economically backward. This doesn't sound threatening until you realise that:
|
||||
>
|
||||
> - This army can and does utilise the technology and economics of its enemy. No need to develop its own.
|
||||
> - Transportation is not only provided to them but provided by their enemy.
|
||||
> - This army benefits from acquiring its transport, provisions, and even military hardware from its enemy.
|
||||
> - This army uses the communication tools necessary to conduct attacks at fractional cost... tools produced more often than not by its enemy... now out in the public realm
|
||||
>
|
||||
> Remember, the most basic social contract a citizen has with his government is that of security and government cannot provide it.
|
||||
>
|
||||
> The answers lie with private enterprise.
|
||||
>
|
||||
> -- [Chris @ capitalistexploits.at](https://web.archive.org/web/20201024150212/https://www.zerohedge.com/news/2017-06-11/economics-warfare-have-changed) (internet archive.org)
|
Loading…
x
Reference in New Issue
Block a user