From 5f5b9d8830985864e78409e3304e61d9c3a3cebc Mon Sep 17 00:00:00 2001
From: anarsec <anarsec@riseup.net>
Date: Wed, 28 Jun 2023 16:51:29 +0000
Subject: [PATCH] cwtch on tails, argon2id tails 6.0, relative hrefs

---
 content/posts/e2ee/index.md                   | 19 +++++++++----------
 content/posts/tails-best/index.md             |  4 ++--
 .../templates/categories/list.html            |  2 +-
 themes/DeepThought/templates/tags/list.html   |  2 +-
 4 files changed, 13 insertions(+), 14 deletions(-)

diff --git a/content/posts/e2ee/index.md b/content/posts/e2ee/index.md
index d8d3edd..29fe7d9 100644
--- a/content/posts/e2ee/index.md
+++ b/content/posts/e2ee/index.md
@@ -64,22 +64,21 @@ Any Cwtch user can turn the app on their phone or computer into an untrusted ser
 <li>Compare the hash of the file with what is listed on the download page </li>
 </ul>
 </li>
-<li>As per our <a href="/posts/tails-best/#using-a-write-protect-switch">Tails Best Practices</a>, personal data should be stored on a second LUKS USB, not on the Tails Persistent Storage. Copy the file to such a personal data LUKS USB and extract it with the file manager (right click, select &quot;Extract Here&quot;). We will not be using the Additional Software Persistent Storage feature - Cwtch is an AppImage so doesn't require it. </li>
+<li>As per our <a href="/posts/tails-best/#using-a-write-protect-switch">Tails Best Practices</a>, personal data should be stored on a second LUKS USB, and the Persistent Storage is not enabled.  Extract the file with the file manager (right click, select &quot;Extract Here&quot;), then copy the folder <code>cwtch</code> to such a personal data LUKS USB. <ul>
+<li>OPTIONAL - If you do enable Persistent Storage: with Persistent Storage unlocked, in Terminal run <code>sudo sed -i '$ a /home/amnesia/.cwtch source=cwtch' /live/persistence/TailsData_unlocked/persistence.conf && sudo sed -i '$ a /home/amnesia/.local source=cwtch_install' /live/persistence/TailsData_unlocked/persistence.conf</code> then reboot Tails for the changes to take effect, again with an Adminstration Password.</li>
+</ul>
+</li>
 <li>Run the install script<ul>
-<li>In the File Manager, enter to directory you just created, <code>cwtch</code>. Right click in the File Manager and select "Open a Terminal Here"</li>
-<li>Run <code>install-tails.sh</code></li>
+<li>In the File Manager, enter the directory you just created, <code>cwtch</code>. Right click in the File Manager and select "Open a Terminal Here"</li>
+<li>Run <code>install-tails.sh</code> and enter the Administration Password when prompted.</li>
 </ul>
 </li>
 <li>As the <a href="https://docs.cwtch.im/docs/platforms/tails">documentation</a> specifies, "When launching, Cwtch on Tails should be passed the CWTCH_TAILS=true environment variable". In the Terminal, run:<ul>
 <li><code>exec env CWTCH_TAILS=true LD_LIBRARY_PATH=~/.local/lib/cwtch/:~/.local/lib/cwtch/Tor ~/.local/lib/cwtch/cwtch</code></li>
 </ul>
 </li>
-<li>How you use Cwtch depends on whether you have enabled Persistent Storage: <ul>
-<li>With Persistent Storage disabled, Cwtch must be re-installed every session you need to use it. Backup <code>`/home/amnesia/.cwtch/`</code> to the personal data LUKS USB, and copy it back into <code>/home/amnesia/</code> the next time you install Cwtch. </li>
-<li>With Persistent Storage enabled and unlocked, in Terminal run <code>sudo sed -i '$ a /home/amnesia/.cwtch source=cwtch' /live/persistence/TailsData_unlocked/persistence.conf</code></li>
-</ul>
-</li>
-<li>Updates must be made manually - back up your profile first.</li>
+<li>With Persistent Storage disabled, Cwtch must be re-installed every session you need to use it. Backup <code>`/home/amnesia/.cwtch/`</code> to the personal data LUKS USB, and copy it back into <code>/home/amnesia/</code> the next time you install Cwtch.</li>
+<li>Updates to new versions must be made manually - back up your profile first.</li>
 <br>
 </details>
 
@@ -175,7 +174,7 @@ https_proxy = 127.0.0.1:8082
 * **Peer-to-peer**: No 
 * **Tor**: Not default
 
-Element is the name of the application (the client), and Matrix is the name of the network. A comparison to email may be helpful to understand it; Element is the equivalent of Thunderbird, whereas Matrix is the equivalent of the Simple Mail Transfer Protocol (SMTP) which underlies email. Element/Matrix is not peer-to-peer; you need to trust the server. However, unlike Signal, the servers are not centralized but rather federated - anyone can host their own. Unfortunately, the 'federation model' has the trade off that Matrix does [not have metadata protection](https://web.archive.org/web/https://serpentsec.1337.cx/matrix): "Federated networks are naturally more vulnerable to metadata leaks than peer-to-peer or centralized networks". To minimize this, see [Notes on the safe use of the Matrix service from Systemli](https://wiki.systemli.org/howto/matrix/privacy). 
+Element is the name of the application (the client), and Matrix is the name of the network. A comparison to email may be helpful to understand it; Element is the equivalent of Thunderbird, whereas Matrix is the equivalent of the Simple Mail Transfer Protocol (SMTP) which underlies email. Element/Matrix is not peer-to-peer; you need to trust the server. However, unlike Signal, the servers are not centralized but rather federated - anyone can host their own. Unfortunately, the 'federation model' has the trade off that Matrix does [not have metadata protection](https://web.archive.org/web/https://serpentsec.1337.cx/matrix): "Federated networks are naturally more vulnerable to metadata leaks than peer-to-peer or centralized networks". To minimize this, see [Notes on the safe use of the Matrix service from Systemli](https://wiki.systemli.org/en/howto/matrix/privacy). 
 
 Element will work with Tor if it is used on an operating system that forces it; such as Whonix or Tails. 
 
diff --git a/content/posts/tails-best/index.md b/content/posts/tails-best/index.md
index c43a185..6858b53 100644
--- a/content/posts/tails-best/index.md
+++ b/content/posts/tails-best/index.md
@@ -4,7 +4,7 @@ date=2023-04-08
 
 [taxonomies]
 categories = ["Defensive"]
-tags = ["best practice", "linux", "tails", "easy"]
+tags = ["linux", "tails", "easy"]
 
 [extra]
 blogimage="/images/tails1.png"
@@ -138,7 +138,7 @@ Another reason to not use Persistent Storage features is that many of them persi
 
 >In the terminology used by KeePassXC, a [*password*](/glossary/#password) is a randomized sequence of characters (letters, numbers and other symbols), whereas a [*passphrase*](/glossary/#passphrase) is a random series of words. 
 
-Never reuse a password/passphrase for multiple things ("password recycling") - KeePassXC makes it easy to save unique ones that are dedicated to one purpose. [LUKS](/glossary/#luks) encryption **is only effective when the device is powered down** - when the device is on, the password can be retrieved from memory. Any encryption can be [brute-force attacked](/glossary#brute-force-attack) with [massive amounts of cloud computing](https://blog.elcomsoft.com/2020/08/breaking-luks-encryption/). The newer version of LUKS (LUKS2 using Argon2id) is [less vulnerable to brute-force attacks](https://mjg59.dreamwidth.org/66429.html); this is the default from [Tails 5.13](https://tails.boum.org/security/argon2id/index.en.html) onwards, and Qubes OS 4.1 onwards. If you'd like to learn more about this change, we recommend [Systemli's overview](https://www.systemli.org/en/2023/04/30/is-linux-hard-disk-encryption-hacked/). 
+Never reuse a password/passphrase for multiple things ("password recycling") - KeePassXC makes it easy to save unique ones that are dedicated to one purpose. [LUKS](/glossary/#luks) encryption **is only effective when the device is powered down** - when the device is on, the password can be retrieved from memory. Any encryption can be [brute-force attacked](/glossary#brute-force-attack) with [massive amounts of cloud computing](https://blog.elcomsoft.com/2020/08/breaking-luks-encryption/). The newer version of LUKS (LUKS2 using Argon2id) is [less vulnerable to brute-force attacks](https://mjg59.dreamwidth.org/66429.html); this is the default from Tails 6.0 ([forthcoming](https://gitlab.tails.boum.org/tails/tails/-/issues/19733)) onwards, and Qubes OS 4.1 onwards. If you'd like to learn more about this change, we recommend [Systemli's overview](https://www.systemli.org/en/2023/04/30/is-linux-hard-disk-encryption-hacked/). 
 
 Password strength is measured in "[bits of entropy](https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength)". Your passwords/passphrases should ideally have an entropy of around 128 bits (diceware passphrases of approximately **ten words**, or passwords of **21 random characters**, including uppercase, lowercase, numbers and symbols) and shouldn't have less than 90 bits of entropy (approximately seven words).
 
diff --git a/themes/DeepThought/templates/categories/list.html b/themes/DeepThought/templates/categories/list.html
index c78c7b0..2671db5 100644
--- a/themes/DeepThought/templates/categories/list.html
+++ b/themes/DeepThought/templates/categories/list.html
@@ -13,7 +13,7 @@
       <p class='subtitle is-4'>{{ terms | length }} categories in total</p>
       <p>
         {% for category in terms %}
-        <a href="{{ get_taxonomy_url(kind='categories', name=category.name) }}" class="mr-4">
+	  <a href="/categories/{{category.name | lower}}" class="mr-4">
           <span class="icon">
             <i class="fas fa-cube"></i>
           </span>
diff --git a/themes/DeepThought/templates/tags/list.html b/themes/DeepThought/templates/tags/list.html
index 4100e8d..74780a8 100644
--- a/themes/DeepThought/templates/tags/list.html
+++ b/themes/DeepThought/templates/tags/list.html
@@ -13,7 +13,7 @@
       <p class='subtitle is-4'>{{ terms | length }} tags in total</p>
       <p>
         {% for tag in terms %}
-        <a href="{{ get_taxonomy_url(kind='tags', name=tag.name) }}" class="mr-4">
+		<a href="/tags/{{tag.name | lower}}" class="mr-4">
           <span class="icon">
             <i class="fas fa-tag"></i>
           </span>
-- 
GitLab