Guide:Resisting technological domestic abuse: Difference between revisions

adding images and media
No edit summary
(adding images and media)
Line 51:
* Remove the apps you do not use. This will narrow down the list of apps that the stalkerware hides under.
====Canary trap====
[[File:Peter Dinklage by Gage Skidmore.jpg|thumb|If you've seen Game of Thrones, you've seen a 'canary trap' in action. [https://www.imdb.com/title/tt2070135/trivia Tyron Lannister uses it in season two of the show].]]
One method of narrowing down how and were you're being spied upon is the use of so-called '[[w:canary trap|canary trap]]'.
 
Line 71 ⟶ 72:
The basic idea is that we will setup a portable computing environment consisting of an operating system and persistent storage on an encrypted USB device. This portable computing environment will be protected by strong encryption and designed to resist even the most capable adversary. It may look a bit daunting, but if you persist, you will finally have one way of accessing the internet in a way that you can completely trust (as long as you keep your encryption password secret).
===About Tails===
[[File:Tails-logo-flat-inverted.svg|thumb|If you suspect stalkerware or man-in-the-middle, Tails is the only way you can be sure you're not being spied upon.]]
To achieve this, we will rely on the excellent work of the Tails project. Their objective is to produce a safe computing environment for journalists, activists, human rights defenders and domestic abuse survivors.
You may read more about the project [https://tails.boum.org/index.en.html on their website], but in short Tails:
Line 79 ⟶ 81:
* '''separate from your compromised computer''' - because all the files that Tails needs to run are on the USB device which you control, it does not matter if the device you're using it on is riddled with stalkerware; Tails uses it's own trusted operating system, and can be used safely on computers that are actively monitored
** because all the contents are encrypted, it also cannot be tampered with while in the shut down state
* '''amensiacamnesiac''' - by default, when shut down after use, Tails will forget and discard all the files that may have been generated (such as browsing history) which leaves less opportunity to somebody to compromise you further should they obtain your encryption password
** you can, optionally, set it up to remember certain files. This is called persistence. It is generally safe to enable persistence (those files are encrypted as well), but if you do, you have to be sure to not disclose your encryption password
 
This point cannot be overstated, but <u>'''everything really depends on the strength of the encryption password you select'''</u> while creating a Tails USB stick. If you reuse a password that the perpetrator knows, you will be putting yourself at risk (particularly if you use persistence). For advice on how to come up with better passwords, see [[Passwords#Choosing_better_passwords]].
===Installing Tails===
[[File:Etcher-gif.gif|thumb|Installing (so-called, flashing) of Tails is really simple and can be done using a free program called Etcher. Just remember to remove it once you're done.]]
Rather than reinventing the wheel, we will instead point you to the excellent installation guide maintained by the Tails project itself.<br>
https://tails.boum.org/install/index.en.html
===Using Tails===
[[File:TAILS 4.14 ENG 05 01 2021 15 39 25.png|thumb|Once you start up Tails, it looks like any ordinary computer you've used before.]]
Using Tails is much like using any other desktop operating system. You have access to a browser, email client, and an office suite. You can connect to all your normal online services. It may look slightly differently, but don't let that intimidate you. 95% of the normal use of Tails is same as Windows or Mac.
=Taking back control and reasserting your privacy rights=