[or-cvs] r16081: Updated documentation and added the Incognito Walkthrough. (in incognito/trunk/root_overlay/usr/share: applications incognito incognito/walkthrough incognito/walkthrough/img)

anonym at seul.org anonym at seul.org
Sun Jul 20 03:01:53 UTC 2008


Author: anonym
Date: 2008-07-19 23:01:53 -0400 (Sat, 19 Jul 2008)
New Revision: 16081

Added:
   incognito/trunk/root_overlay/usr/share/applications/docs.desktop
   incognito/trunk/root_overlay/usr/share/applications/walkthrough.desktop
   incognito/trunk/root_overlay/usr/share/incognito/docs.html
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-1.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-2.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-firegpg.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-ssl.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-1.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-2.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/incognito-desktop.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/konq.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/nm-menu.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-chat.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-main.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-compose.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-main.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-main.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-menu.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-network.png
   incognito/trunk/root_overlay/usr/share/incognito/walkthrough/walkthrough.html
Removed:
   incognito/trunk/root_overlay/usr/share/applications/readme.desktop
   incognito/trunk/root_overlay/usr/share/incognito/readme.html
Log:
Updated documentation and added the Incognito Walkthrough.


Copied: incognito/trunk/root_overlay/usr/share/applications/docs.desktop (from rev 14941, incognito/trunk/root_overlay/usr/share/applications/readme.desktop)
===================================================================
--- incognito/trunk/root_overlay/usr/share/applications/docs.desktop	                        (rev 0)
+++ incognito/trunk/root_overlay/usr/share/applications/docs.desktop	2008-07-20 03:01:53 UTC (rev 16081)
@@ -0,0 +1,7 @@
+[Desktop Entry]
+Encoding=UTF-8
+Icon=html
+Type=Link
+URL=/usr/share/incognito/readme.html
+Name=__INCOGNITO__ Documentation
+Categories=Qt;KDE;Utility

Deleted: incognito/trunk/root_overlay/usr/share/applications/readme.desktop
===================================================================
--- incognito/trunk/root_overlay/usr/share/applications/readme.desktop	2008-07-19 20:01:06 UTC (rev 16080)
+++ incognito/trunk/root_overlay/usr/share/applications/readme.desktop	2008-07-20 03:01:53 UTC (rev 16081)
@@ -1,7 +0,0 @@
-[Desktop Entry]
-Encoding=UTF-8
-Icon=html
-Type=Link
-URL=/usr/share/incognito/readme.html
-Name=__INCOGNITO__ Documentation
-Categories=Qt;KDE;Utility

Added: incognito/trunk/root_overlay/usr/share/applications/walkthrough.desktop
===================================================================
--- incognito/trunk/root_overlay/usr/share/applications/walkthrough.desktop	                        (rev 0)
+++ incognito/trunk/root_overlay/usr/share/applications/walkthrough.desktop	2008-07-20 03:01:53 UTC (rev 16081)
@@ -0,0 +1,7 @@
+[Desktop Entry]
+Encoding=UTF-8
+Icon=html
+Type=Link
+URL=/usr/share/incognito/walkthrough/walkthrough.html
+Name=__INCOGNITO__ Walkthrough
+Categories=Qt;KDE;Utility

Copied: incognito/trunk/root_overlay/usr/share/incognito/docs.html (from rev 14941, incognito/trunk/root_overlay/usr/share/incognito/readme.html)
===================================================================
--- incognito/trunk/root_overlay/usr/share/incognito/docs.html	                        (rev 0)
+++ incognito/trunk/root_overlay/usr/share/incognito/docs.html	2008-07-20 03:01:53 UTC (rev 16081)
@@ -0,0 +1,555 @@
+<html>
+<head>
+<title>__INCOGNITO_TITLE__ Documentation</title>
+</head>
+
+<body>
+
+<h2>Contents</h2>
+<ul>
+<li><a href="#intent">Intent</a></li>
+<li><a href="#download">Download</a></li>
+<li><a href="#contact">Contact</a></li>
+<li><a href="#approach">Approach</a></li>
+<li><a href="#impl">Implementation</a></li>
+<li><a href="#maintenance">Maintenance</a></li>
+<li><a href="#caveats">Caveats</a></li>
+<li><a href="#security">Security</a></li>
+<li><a href="#createusb">Copying to a USB Drive</a></li>
+</ul>
+
+<p>
+<strong>NOTICE</strong>: This CD is provided as-is with no warranty of fitness for a particular purpose, including total anonymity. Anonymity depends not only on the software but also on the user understanding the risks involved and how to overcome those risks.
+</p>
+
+<a name="intent">
+<h2>Intent / Goals</h2>
+<blockquote>What are we trying to do?</blockquote>
+
+<p>
+This CD provides software to use various Internet technologies while keeping the user anonymous. It is based primarily on <a href="https://www.torproject.org">Tor</a> while including supporting applications. The target use case is that of using a public computer, such as in a library, securely. This CD may also be copied to a USB drive to provide persisted user settings. The intended user base are those who would like to perform standard Internet communications such as WWW, mail, IRC, IM, etc, while being confident that their anonymity is not compromised. Power users who want precise control over the application and network configuration may be disappointed.
+</p>
+
+
+<dl>
+
+<dt>Target User Base</dt>
+<dd>
+The target user is one who is using a computer that does not necessarily have full control of said computer and desires to access Internet services. Examples would be a public computer in a library, coffee shop, university or a residence. Also, users not wanting to bother with configuring all applications appropriately (with respect to anonymity) could use __INCOGNITO__ on their home computers. The implementation should provide strong anonymity with no configuration. It should be difficult or impossible, for the user to unknowingly compromise anonymity. Users requiring more precise control over the application and network configuration may be disappointed.
+</dd>
+
+<dt></dt>
+<dd>
+</dd>
+
+<dt>Required Internet Services</dt>
+<dd>
+At minimum the following Internet services should be supported: WWW, E-Mail, IRC.
+</dd>
+
+<dt>Recommended Internet Services</dt>
+<dd>
+The following Internet services are recommended to be supported: Instant Messaging.
+</dd>
+
+<dt>Supported Instant Messaging Protocols</dt>
+<dd>
+The following instant messaging protocols should be supported based on the constraint that the protocol itself does not require information that compromises anonymity: (TODO)
+</dd>
+
+<dt>Discouraged Instant Messaging Protocols</dt>
+<dd>
+The following instant messaging protocols should NOT be supported based on the constraint that the protocol itself requiress information that compromises anonymity: (TODO)
+</dd>
+
+<dt>Maintainable</dt>
+<dd>
+The procedure to update the CD should not be prohibitive to provide timely software updates to address issues related to security or anonymity.
+</dd>
+
+<dt>Media</dt>
+<dd>
+The implementation should be able to run off either CD or a USB bootable drive. The media must be bootable, not run from the host operating system.
+</dd>
+
+<dt>Persisted User Settings on USB Drive</dt>
+<dd>
+User settings should be persisted when using a USB drive. The user should have the option to store these settings encrypted.
+</dd>
+
+</dl>
+
+
+<a name="download">
+<h2>Download</h2>
+
+<p>
+See the <a href="http://www.browseanonymouslyanywhere.com/incognito/index.php?option=com_content&task=view&id=26&Itemid=39">download section</a> on <a href="http://www.browseanonymouslyanywhere.com/incognito">__INCOGNITO__'s main site</a> for download information. Various development files (portage snapshot and stage3 tarball) as well as the current version of __INCOGNITO__ can be found at <a href="http://files1.cjb.net/incognito/">http://files1.cjb.net/incognito/</a>.
+</p>
+
+<p>
+The latest version of this document for the current relesase can be found <a href="http://www.anonymityanywhere.com/incognito/index.php?option=com_content&task=view&id=26&Itemid=39">here</a>. The development version of this document can be found at Incognito's subversion repository <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/share/incognito/docs.html">here</a>, although it should be noted that some information which is added dynamically at build will not be present (has mostly to do with information about which software packages that are installed).
+</p>
+
+<p>
+The build root for the CD is stored in a <a href="http://subversion.tigris.org">Subversion</a> repository. It can be viewed or checked out at <a href="https://tor-svn.freehaven.net/svn/incognito/">https://tor-svn.freehaven.net/svn/incognito/</a>.
+</p>
+
+<a name="contact">
+<h2>Contact</h2>
+
+<p>
+As of november 2007, the maintainace of this distribution has passed from the founder, Pat Double, to anonym, who can be contacted through anonym (at) lavabit (dot) com. Please do not contact Pat for anything relating to the current development of __INCOGNITO__. Feature requests and (especially) bug reports are welcome and should be sent to anonym, and please include "__INCOGNITO__" in the subject line to ease mail sorting. Also, please be considerate of any major technology choices, such as <a href="http://www.gentoo.org/proj/en/releng/catalyst">Catalyst</a> and <a href="http://www.gentoo.org">Gentoo Linux</a>, <a href="http://www.kde.org">KDE</a>, etc. These have been chosen because of the developers' familiarity with them and will likely not change ever. If someone would like to maintain a parallell version with, say, Gnome instead of KDE or similar that would probably work just fine. However, since the whole development process is centered around Gentoo Linux' Catalyst, neither of them are negotiable.
+</p>
+
+<a name="approach">
+<h2>Approach</h2>
+<blockquote>What is needed to reach our goals?</blockquote>
+
+<p>
+</p>
+
+<a name="impl">
+<h2>Implementation</h2>
+<blockquote>How did we implement our approach in order to reach our goals.</blockquote>
+
+<p>
+There are full and tiny versions of the CD. The tiny version is intended to fit on small media (such as a 'business card' CD) and basically provides an anonymous web browser. The full version supports a variety of Internet applications.
+</p>
+
+<h3>Software</h3>
+
+<p>
+The following software is present on both the full and tiny versions. The version of the packages used is included on the CD at /usr/share/packages.txt.
+</p>
+
+<dl>
+
+<dt><a href="http://www.gentoo.org">Gentoo Linux</a> (<a href="http://www.kernel.org">kernel 2.6</a> <!-- #version(sys-kernel/gentoo-sources) -->)</dt>
+<dd>The base operating system, provides hardware detection, infrastructure. Please note that the Gentoo Foundation does not provide or endorse this software distribution.</dd>
+
+<dt><a href="<!-- #homepage(net-misc/tor) -->">Tor</a> <!-- #version(net-misc/tor) --></dt>
+<dd><!-- #description(net-misc/tor) -->. Our attempt is to always use the latest stable version. This version is patched to allow controllers to access the cookie authentication file. The <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/portage.overlay/net-misc/tor/files/tor-cookieperm.patch">patch</a> is from the 0.2.0.x development branch.</dd>
+
+<dt><a href="<!-- #homepage(net-proxy/polipo) -->">polipo</a> <!-- #version(net-proxy/polipo) --></dt>
+<dd><!-- #description(net-proxy/polipo) --></dd>
+
+<dt><a href="<!-- #homepage(www-client/mozilla-firefox-bin) -->">Firefox</a> <!-- #version(www-client/mozilla-firefox-bin) --></dt>
+<dd><!-- #description(www-client/mozilla-firefox-bin) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/noscript-bin) -->">NoScript</a> <!-- #version(x11-plugins/noscript-bin) --></dt>
+<dd><!-- #description(x11-plugins/noscript-bin) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/cs-lite) -->">CS Lite</a> <!-- #version(x11-plugins/cs-lite) --></dt>
+<dd><!-- #description(x11-plugins/cs-lite) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/firegpg) -->">FireGPG</a> <!-- #version(x11-plugins/firegpg) --></dt>
+<dd><!-- #description(x11-plugins/firegpg) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/refcontrol) -->">refcontrol</a> <!-- #version(x11-plugins/refcontrol) --></dt>
+<dd><!-- #description(x11-plugins/refcontrol) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/adblock_plus) -->">Adblock Plus</a> <!-- #version(x11-plugins/adblock_plus) --></dt>
+<dd><!-- #description(x11-plugins/adblock_plus) --></dd>
+
+<dt><a href="<!-- #homepage(net-irc/xchat) -->">XChat</a> <!-- #version(net-irc/xchat) --></dt>
+<dd><!-- #description(net-irc/xchat) --></dd>
+
+<dt><a href="<!-- #homepage(app-crypt/truecrypt) -->">TrueCrypt</a> <!-- #version(app-crypt/truecrypt) --></dt>
+<dd><!-- #description(app-crypt/truecrypt) --></dd>
+
+<dt><a href="<!-- #homepage(net-misc/openssh) -->">ssh</a> <!-- #version(net-misc/openssh) --></dt>
+<dd><!-- #description(net-misc/openssh) --></dd>
+
+<dt><a href="<!-- #homepage(net-analyzer/macchanger) -->">macchanger</a> <!-- #version(net-analyzer/macchanger) --></dt>
+<dd><!-- #description(net-analyzer/macchanger) --></dd>
+
+<dt><a href="<!-- #homepage(www-servers/lighttpd) -->">lighthttpd</a> <!-- #version(www-servers/lighttpd) --> for hidden services</dt>
+<dd><!-- #description(www-servers/lighttpd) --></dd>
+
+<dt><a href="<!-- #homepage(net-proxy/3proxy) -->">3proxy</a> <!-- #version(net-proxy/3proxy) --></dt>
+<dd><!-- #description(net-proxy/3proxy) --></dd>
+
+<dt><a href="<!-- #homepage(mail-mta/mixminion) -->">Mixminion</a> <!-- #version(mail-mta/mixminion) --></dt>
+<dd><!-- #description(mail-mta/mixminion) --></dd>
+
+<dt><a href="<!-- #homepage(mail-mta/mixminion-smtp) -->">Mixminion SMTP</a> <!-- #version(mail-mta/mixminion-smtp) --></dt>
+<dd><!-- #description(mail-mta/mixminion-smtp) --></dd>
+
+<dt><a href="<!-- #homepage(mail-client/mozilla-thunderbird-bin) -->">Thunderbird</a> <!-- #version(mail-client/mozilla-thunderbird-bin) --></dt>
+<dd><!-- #description(mail-client/mozilla-thunderbird-bin) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/enigmail-bin) -->">Thunderbird OpenPGP (enigmail)</a> <!-- #version(x11-plugins/enigmail-bin) --></dt>
+<dd><!-- #description(x11-plugins/enigmail-bin) --></dd>
+
+<dt><a href="<!-- #homepage(x11-plugins/thunderplunger) -->">Thunder Plunger</a> <!-- #version(x11-plugins/thunderplunger) --></dt>
+<dd><!-- #description(x11-plugins/thunderplunger) --></dd>
+
+<dt><a href="<!-- #homepage(net-dns/pdnsd) -->">pdnsd</a> <!-- #version(net-dns/pdnsd) --></dt>
+<dd><!-- #description(net-dns/pdnsd) -->. Configured to do lookups through Tor.</dd>
+
+<dt><a href="<!-- #homepage(net-misc/vidalia) -->">Vidalia</a> <!-- #version(net-misc/vidalia) --></dt>
+<dd><!-- #description(net-misc/vidalia) --></dd>
+
+<dt><a href="<!-- #homepage(app-crypt/gnupg) --><">GnuPG</a> <!-- #version(app-crypt/gnupg) --></dt>
+<dd><!-- #description(app-crypt/gnupg) --></dd>
+
+<dt><a href="<!-- #homepage(app-admin/keepassx) --><">KeePassX</a> <!-- #version(app-admin/keepassx) --></dt>
+<dd><!-- #description(app-admin/keepassx) --></dd>
+
+<dt><a href="<!-- #homepage(net-analyzer/thcrut) -->">thcrut</a> <!-- #version(net-analyzer/thcrut) --></dt>
+<dd><!-- #description(net-analyzer/thcrut) --></dd>
+
+<dt><a href="<!-- #homepage(net-analyzer/nmap) -->">nmap</a> <!-- #version(net-analyzer/nmap) --></dt>
+<dd><!-- #description(net-analyzer/nmap) --></dd>
+
+<dt><a href="<!-- #homepage(net-wireless/airsnort) -->">airsnort</a> <!-- #version(net-wireless/airsnort) --></dt>
+<dd><!-- #description(net-wireless/airsnort) --></dd>
+
+<dt><a href="<!-- #homepage(app-misc/screen) -->">screen</a> <!-- #version(app-misc/screen) --></dt>
+<dd><!-- #description(app-misc/screen) --></dd>
+
+<dt><a href="<!-- #homepage(net-misc/openvpn) -->">OpenVPN</a> <!-- #version(net-misc/openvpn) --></dt>
+<dd><!-- #description(net-misc/openvpn) -->. Can operate over TCP or UDP. Due to limitations of the Tor software only TCP is anonymized. UDP is currently blocked.</dd>
+
+<dt><a href="<!-- #homepage(net-misc/vpnc) -->">vpnc</a> <!-- #version(net-misc/vpnc) --></dt>
+<dd><!-- #description(net-misc/vpnc) --></dd>
+
+<dt><a href="<!-- #homepage(net-misc/netkit-telnetd) -->">telnet</a> <!-- #version(net-misc/netkit-telnetd) --></dt>
+<dd><!-- #description(net-misc/netkit-telnetd) --></dd>
+
+<dt><a href="<!-- #homepage(net-misc/socat) -->">socat</a> <!-- #version(net-misc/socat) --></dt>
+<dd><!-- #description(net-misc/socat) --></dd>
+
+<dt><a href="<!-- #homepage(www-client/links) -->">links</a> <!-- #version(www-client/links) --></dt>
+<dd><!-- #description(www-client/links) --></dd>
+
+<dt><a href="http://www.kde.org">KDE 3.5</a></dt>
+<dd>K Desktop Environment, a reduced install with parts that could be useful on an anonymity CD.</dd>
+
+<dt><a href="<!-- #homepage(kde-base/kmail) -->">KDE - KMail</a> <!-- #version(kde-base/kmail) --></dt>
+<dd><!-- #description(kde-base/kmail) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/konqueror) -->">KDE - Konqueror </a> <!-- #version(kde-base/konqueror) --></dt>
+<dd><!-- #description(kde-base/konqueror) --></dd>
+
+<dt><a href="<!-- #homepage(kde-misc/tork) -->">TorK</a> <!-- #version(kde-misc/tork) --></dt>
+<dd><!-- #description(kde-misc/tork) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/kopete) -->">KDE - Kopete</a> <!-- #version(kde-base/kopete) --></dt>
+<dd><!-- #description(kde-base/kopete) --></dd>
+
+<dt><a href="<!-- #homepage(net-im/kopete-otr) -->">Kopete Off The Record plugin</a> <!-- #version(net-im/kopete-otr) --></dt>
+<dd><!-- #description(net-im/kopete-otr) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/kontact) -->">KDE - Kontact</a> <!-- #version(kde-base/kontact) --></dt>
+<dd><!-- #description(kde-base/kontact) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/ksnapshot) -->">KDE - KSnapShot</a> <!-- #version(kde-base/ksnapshot) --></dt>
+<dd><!-- #description(kde-base/ksnapshot) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/akregator) -->">KDE - Akregator</a> <!-- #version(kde-base/akregator) --></dt>
+<dd><!-- #description(kde-base/akregator) --></dd>
+
+<dt><a href="<!-- #homepage(kde-base/krfb) -->">KDE - krfb</a> <!-- #version(kde-base/krfb) --></dt>
+<dd><!-- #description(kde-base/krfb) --></dd>
+
+<dt><a href="<!-- #homepage(net-p2p/ktorrent) -->">KDE - KTorrent</a> <!-- #version(net-p2p/ktorrent) --></dt>
+<dd><!-- #description(net-p2p/ktorrent) --></dd>
+
+<dt><a href="<!-- #homepage(kde-misc/tcgui) -->">TrueCrypt UI (TCGUI)</a> <!-- #version(kde-misc/tcgui) --></dt>
+<dd><!-- #description(kde-misc/tcgui) --></dd>
+
+</dl>
+</p>
+
+<h3>Internationalization</h3>
+
+<p>
+The full version has the following locales. The tiny CD is English only, sorry but I could not fit the CD under 50MB without removing natural language support. If you'd like to see another locale for the full CD please let me know.
+</p>
+
+<ul>
+<li>de_DE (German)</li>
+<li>en_GB (British English)</li>
+<li>en_US (American English)</li>
+<li>es_ES (Spanish)</li>
+<li>fa_IR (Persian)</li>
+<li>fr_FR (French)</li>
+<li>it_IT (Italian)</li>
+<li>ja_JP (Japanese)</li>
+<li>pt_PT (Portugese)</li>
+<li>zh_CN (Chinese)</li>
+</ul>
+
+See <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/locale.gen">/etc/locale.gen</a> for the selected languages. See <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a> for how this configuration is applied.
+
+<h3>Configuration</h3>
+
+<h4>The Tor&trade; software</h4>
+<p>
+The Tor software is currently configured as a client only. The client listens on SOCKS port 9050, as a transparent proxy on port 9040 and control port 9051 (with cookie authentication). Only connections from localhost are accepted. It can be argued that running a server would increase your anonymity for a number for reasons but we still feel that most users probably would not want this.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/tor/torrc">/etc/tor/torrc</a></li>
+</ul>
+
+<h4>Mixminion</h4>
+<p>
+Mixminion cannot be configured as a server as these servers need to be very reliable. As a client the default configuration seems to be acceptable. Note that TorK has built-in support for Mixminion. KMail also has been configured to use Mixminion via a sendmail compatible shell script. In this way the signature and encryption features of KMail can be used. Thunderbird is configured to use the Mixminion SMTP server to send email.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/bin/sendmail-mixminion">/usr/bin/sendmail-mixminion</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/mixminion/mixminion-smtp.conf">/etc/mixminion/mixminion-smtp.conf</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kmailrc">/var/lib/kdesession/kmailrc</a> (copied to /home/__INCOGNITO_USER__/.kde/... during build)</li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/thunderbird-config">/var/lib/thunderbird-config</a> (copied to /home/__INCOGNITO_USER__/.thunderbird during build)</li>
+</ul>
+
+<h4>DNS</h4>
+<p>
+DNS leaks are controlled by using a local caching DNS server, pdnsd, that in turn performs its DNS lookups through the Tor network. pdnsd is the server configured in /etc/resolv.conf, listening on localhost. There is a security concerns that some application could attempt to do its own DNS resolution without consulting /etc/resolv.conf, and therefore UDP packets are blocked in order to prevent leaks. Another solution may be to use the Linux network filter to forward to the local DNS server.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/resolv.conf">/etc/resolv.conf</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/pdnsd">/etc/conf.d/pdnsd</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/tor/torrc">/etc/tor/torrc</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/net">/etc/conf.d/net</a></li>
+</ul>
+
+<h4>HTTP Proxy</h4>
+<p>
+Polipo is used as the HTTP proxy. It contacts the Tor software via SOCKS5 to make the real connections.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/polipo/config">/etc/polipo/config</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/env.d/99proxy">/etc/env.d/99proxy</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kioslaverc">/var/lib/kdesession/kioslaverc</a> (copied to /home/__INCOGNITO_USER__/.kde/... during build)</li>
+</ul>
+
+<h4>SOCKS libraries</h4>
+<p>
+tsocks and dante are installed. Note that it is unnecessary with the Linux network filter (see below) and the local DNS server to socksify or torify apps. This is done at a lower level. These libraries are here due to dependencies and configured for completeness.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/socks/">/etc/socks/</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/env.d/99proxy">/etc/env.d/99proxy</a></li>
+</ul>
+
+<h4>Random MAC Address</h4>
+<p>
+The macchanger program can be used to change the network card MAC addresses to a random value. Gentoo has direct support for macchanger so all we need to do is configure it. The configuration is set to "random-ending" which is equivalent to "macchanger -e", meaning the vendor and media type are not changed. This is done to not draw attention to the changed MAC address in case someone is watching. Using a random MAC address may improve anonymity with respect to the LAN and prevent mapping the user to a specific physical location.
+</p>
+
+</p>
+This functionality is not enabled by default as some DHCP servers may be configured with specific MAC addresses. In the boot menu there is an "Enable/Disable MAC changer" option that can be set before a language is chosen and the system starts booting.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/net">/etc/conf.d/net</a> (used by tiny)</li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/macchanger">/etc/init.d/macchanger</a> (used by full)</li>
+</ul>
+
+<h4>Mozilla Firefox</h4>
+<p>
+HTTP and SOCKS proxies are configured. SOCKS is configured to perform name resolution through the proxy. I started Firefox without a config, exited, and then copied the configuration directory to the CD build root. The NoScript extension has been installed.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/firefox-config/">/var/lib/firefox-config/</a> (copied to /home/__INCOGNITO_USER__/.mozilla during build)</li>
+</ul>
+
+<h4>Bookmarks</h4>
+<p>
+Firefox and Konqueror have preset bookmarks related to anonymity.
+</p>
+
+<ul>
+<li>Firefox: <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/firefox-config/firefox/m7m1jk79.Default%20User/bookmarks.html">bookmarks.html</a></li>
+<li>Konqueror: <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/bookmarks.xml">bookmarks.xml</a></li>
+</ul>
+
+<h4>Kopete</h4>
+<p>
+Kopete is configured with contacts to Freenode and OFTC IRC networks accessed via Tor hidden services. The Kopete ircnetworks.xml file is patched with these networks.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kopeterc">kopeterc</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
+</ul>
+
+<h4>XChat</h4>
+<p>
+XChat is configured to use the Tor software as a SOCKS5 proxy. It will pass the hostname through SOCKS5 so that the exit node does the DNS resolution.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/xchat-config">xchat-config</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
+</ul>
+
+<h4>Network Filter</h4>
+<p>
+One of the security issues is that we don't know what software will attempt to contact the network and whether their proxy settings are setup to use the Tor SOCKS proxy correctly. This is solved by forwarding all TCP connections that are not explicitly targetting the Tor proxy through a transparent proxy that in turn forwards it to the Tor proxy anyway. Linux has a kernel level network filter that accomplishes this.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/iptables/rules-save">/var/lib/iptables/rules-save</a> (loaded by the standard Gentoo /etc/init.d/iptables service)</li>
+</ul>
+
+
+<h4>Host system RAM</h4>
+<p>
+When shutting down the system RAM is securely wiped. RAM can actually be read after the machine shuts off with the right equipment. The software doing this is smem, part of the <a href="http://www.thc.org/">secure-delete</a> package. This process can take a while. If you are booting from a CD it should eject, and if you are booting from a USB drive you can remove the drive once prompted. In either case you can leave the computer and let it finish on its own.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/patches/secure_halt.patch">/var/patches/secure_halt.patch</a> (applied during build)</li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
+</ul>
+
+<h4>Passwords</h4>
+<p>
+There are two user's that are intended to be used for logins, '__INCOGNITO_USER__' and 'root'. Since this is a CD/USB the passwords are empty. This should not be a security concern because the user will remove the CD/USB when done and there should be no services allowing logins from the network.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
+</ul>
+
+<h4>Running the CD from RAM</h4>
+<p>
+The tiny version gives you the menu option of running the CD/USB from RAM. During the boot process the entire CD is copied into RAM and run from there. The CD will eject at this time or you may remove the USB drive when the boot progress screen is displayed. The full CD is too large for most computers to run from RAM but if you'd like to then hit [Tab] on the boot option and add " docache" after the boot line.
+</p>
+
+<h4>Running the CD from a Windows session</h4>
+<p>
+__INCOGNITO__ full may be run inside a Windows session in case the computer cannot boot media. <a href="http://fabrice.bellard.free.fr/qemu/">QEMU</a> is used to run the CD in a virtual PC. CTRL-ALT-F can be used to make the virtual machine full screen. Note that this will work for Windows 2000/XP or greater. A security concern that is not covered in this case is a keystroke logger. Keystrokes still run through the host operating system and can be logged, so beware.
+</p>
+
+<h3>Configuration copied from USB drive</h3>
+
+<p>
+Certain configurations are copied from the USB drive on boot. The following table lists the configuration, where it should exist on the USB drive and where it is copied into.
+</p>
+
+<table>
+<tr><th>Software</th><th>USB drive location</th><th>Destination</th></tr>
+<tr><td>OpenVPN</td><td>/keys/openvpn</td><td>/etc/openvpn</td>
+<tr><td colspan="3">The following are only copied if a persistent home cannot be created.</td></tr>
+<tr><td>Kopete</td><td>/config/kopeterc</td><td>/home/__INCOGNITO_USER__/.kde/share/config</td>
+<tr><td>SSH</td><td>/keys/ssh</td><td>/home/__INCOGNITO_USER__/.ssh</td>
+</table>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/external-config-setup">/etc/init.d/external-config-setup</a></li>
+</ul>
+
+<a name="persistent">
+
+<h3>Persistent User Settings for a USB drive</h3>
+
+<p>
+When the CD is copied to a USB drive (see <a href="#createusb">here</a>) the user settings may be persisted across sessions. The home volume can be stored as a <a href="http://www.truecrypt.org">TrueCrypt</a> volume or unencrypted. For the Un*x savvy, the unencrypted volume is stored as an ext3 file on the USB drive. The file home.tc (TrueCrypt) or home.ext3.img (unencrypted) on the USB drive stores these settings and can be removed to reset to the CD defaults or copied elsewhere for a backup. You will need to do a clean shutdown (described above) to make sure your settings are saved. When booting from a writable media and there is no home volume you will be prompted to create one, you may choose not to do so.
+</p>
+
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/external-config-setup">/etc/init.d/external-config-setup</a></li>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/sbin/create-homevol">/usr/sbin/create-homevol</a></li>
+</ul>
+
+<h3>Hidden Services</h3>
+
+<p>
+Hidden HTML content may be served if running from an USB drive. Content is limited to static HTML pages. The content is stored in the home directory and so takes advantage of TrueCrypt encryption. The directory structure follows.
+</p>
+
+<dl>
+<dt>/home/hidden/[name]</dt>
+<dd>Base directory for hidden content where [name] can be anything (sane) that you'd like.</dd>
+<dt>/home/hidden/[name]/conf</dt>
+<dd>Configuration directory mostly used for Tor hidden service information. It will include the hostname and private key, keep it safe, i.e. don't copy it over to your buddy's USB drive.</dd>
+<dt>/home/hidden/[name]/conf/port</dt>
+<dd>Optional port for the hidden service. This is what you'd give out to others. If you will have multiple services it is best to specify the port. The default is 80, increasing from there for each additional service.</dd>
+<dt>/home/hidden/[name]/conf/torrc</dt>
+<dd>Optional config to append to /etc/tor/torrc after the hidden service description. An example would be a HiddenServiceNodes directive, etc.</dd>
+<dt>/home/hidden/[name]/www</dt>
+<dd>The HTML content. Use index.html for your default page.</dd>
+</dl>
+
+<p>
+The <a href="<!-- #homepage(www-servers/lighttpd) -->">lighttpd</a> server is used to serve the content. Configuration of the server is done at boot time in the <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/hidden-service">/etc/init.d/hidden-service</a> init script.
+</p>
+<p>
+The host name to use for the hidden service can be found in the /home/hidden/[name]/conf/hostname file for that service. This file is created by the Tor software when configuring the hidden service. The host name will be the same across sessions and machines as it and the private key are stored in the /home/hidden/[name]/conf directory.
+</p>
+<p>
+Changes to /home/hidden (service addition/removal, /home/hidden/[name]/conf change) can be applied using the following command from a terminal. To get a terminal on full, type "Alt-F2", "konsole". On tiny right-click on the desktop and choose "xterm".
+<code>
+su -c /etc/init.d/hidden-service restart
+</code>
+Note that content changes in /home/hidden/[name]/www should take effect immediately without running the above command.
+</p>
+<ul>
+<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/hidden-service">/etc/init.d/hidden-service</a></li>
+</ul>
+
+<a name="maintenance">
+<h2>Maintenance</h2>
+<blockquote>(How to keep the implementation current for anonymity, security and usefulness.)</blockquote>
+
+<p>
+The Gentoo Catalyst release build tool is used to build the CD. This tool is designed to make the CD easy to maintain. For an update of only the Tor software it takes a simple version bump and 30 minutes for the tiny CD, two hours for the full version. Human effort is minimal, Catalyst does most of the work. A full update of all software takes several hours to compile, but this is seldom done or needed and again generally requires little human effort. Adding or removing software to/from the CD is also generally trivial.
+</p>
+
+<p>
+The following applications are kept up to date as soon as possible. Others may be updated sooner if a major security problem occurs (Firefox, etc.)
+<p>
+
+<ul>
+<li>Tor</li>
+<li>TorK</li>
+<li>Vidalia</li>
+<li>Polipo</li>
+<li>Mixminion</li>
+</ul>
+
+<p>
+Remaining applications, including the base system, will be updated on a roughly two month schedule. It takes a long time to compile everything from scratch and sometimes there are problems that need to be addressed. Most of the packages are marked stable by Gentoo so there are not many problems.
+</p>
+
+<a name="caveats">
+<h2>Caveats</h2>
+<blockquote>Side effects of the implementation that may be undesirable.</blockquote>
+
+<p>
+UDP is a problem. The Tor software does not provide anonymity using UDP yet. Outgoing UDP packets are dropped altogether.
+</p>
+
+<p>
+When using a USB drive your user settings are stored on the drive unsecured. If any personal information is stored by the applications you use then you must keep your drive secure from potential threats, for example by using the optional encryption and a strong passphrase.
+</p>
+
+<a name="security">
+<h2>Security</h2>
+<blockquote>Agreements and disagreements with our approach or implementation.</blockquote>
+
+<p>
+(It would be great to have links to peer reviews here.)
+</p>
+
+<a name="createusb">
+<h2>Copying to a USB Drive</h2>
+
+<p>
+The CD may be copied to a USB drive. Why do that? USB drives are easier to carry, harder to break, offer file storage and persistent user settings between sessions. There is a script provided that will copy the CD to a USB drive and make the drive bootable. When booting the user is presented with the option to create a persistent home directory with optional encryption (see <a href="#persistent">here</a> for details). On the desktop after booting the CD there will be an icon for copying to a USB drive (on tiny right click on the desktop and choose "Create USB" from the menu.) See the <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/sbin/create-usb">/usr/sbin/create-usb</a> script for technical details. Note the script depends on the Gentoo LiveCD structure, it probably won't work when run on another LiveCD setup.
+</p>
+
+</body>
+
+</html>

Deleted: incognito/trunk/root_overlay/usr/share/incognito/readme.html
===================================================================
--- incognito/trunk/root_overlay/usr/share/incognito/readme.html	2008-07-19 20:01:06 UTC (rev 16080)
+++ incognito/trunk/root_overlay/usr/share/incognito/readme.html	2008-07-20 03:01:53 UTC (rev 16081)
@@ -1,558 +0,0 @@
-<html>
-<head>
-<title>__INCOGNITO_TITLE__ Documentation</title>
-</head>
-
-<body>
-
-<h2>Contents</h2>
-<ul>
-<li><a href="#intent">Intent</a></li>
-<li><a href="#download">Download</a></li>
-<li><a href="#contact">Contact</a></li>
-<li><a href="#approach">Approach</a></li>
-<li><a href="#impl">Implementation</a></li>
-<li><a href="#maintenance">Maintenance</a></li>
-<li><a href="#caveats">Caveats</a></li>
-<li><a href="#security">Security</a></li>
-<li><a href="#createusb">Copying to a USB Drive</a></li>
-</ul>
-
-<p>
-<strong>NOTICE</strong>: This CD is provided as-is with no warranty of fitness for a particular purpose, including total anonymity. Anonymity depends not only on the software but also on the user understanding the risks involved and how to overcome those risks.
-</p>
-
-<a name="intent">
-<h2>Intent / Goals</h2>
-<blockquote>What are we trying to do?</blockquote>
-
-<p>
-This CD provides software to use various Internet technologies while keeping the user anonymous. It is based primarily on <a href="https://www.torproject.org">Tor</a> while including supporting applications. The target use case is that of using a public computer, such as in a library, securely. This CD may also be copied to a USB drive to provide persisted user settings. The intended user base are those who would like to perform standard Internet communications such as WWW, mail, IRC, IM, etc, while being confident that their anonymity is not compromised. Power users who want precise control over the application and network configuration may be disappointed.
-</p>
-
-
-<dl>
-
-<dt>Target User Base</dt>
-<dd>
-The target user is one who is using a computer that does not necessarily have full control of said computer and desires to access Internet services. Examples would be a public computer in a library, coffee shop, university or a residence. Also, users not wanting to bother with configuring all applications appropriately (with respect to anonymity) could use __INCOGNITO__ on their home computers. The implementation should provide strong anonymity with no configuration. It should be difficult or impossible, for the user to unknowingly compromise anonymity. Users requiring more precise control over the application and network configuration may be disappointed.
-</dd>
-
-<dt></dt>
-<dd>
-</dd>
-
-<dt>Required Internet Services</dt>
-<dd>
-At minimum the following Internet services should be supported: WWW, E-Mail, IRC.
-</dd>
-
-<dt>Recommended Internet Services</dt>
-<dd>
-The following Internet services are recommended to be supported: Instant Messaging.
-</dd>
-
-<dt>Supported Instant Messaging Protocols</dt>
-<dd>
-The following instant messaging protocols should be supported based on the constraint that the protocol itself does not require information that compromises anonymity: (TODO)
-</dd>
-
-<dt>Discouraged Instant Messaging Protocols</dt>
-<dd>
-The following instant messaging protocols should NOT be supported based on the constraint that the protocol itself requiress information that compromises anonymity: (TODO)
-</dd>
-
-<dt>Maintainable</dt>
-<dd>
-The procedure to update the CD should not be prohibitive to provide timely software updates to address issues related to security or anonymity.
-</dd>
-
-<dt>Media</dt>
-<dd>
-The implementation should be able to run off either CD or a USB bootable drive. The media must be bootable, not run from the host operating system.
-</dd>
-
-<dt>Persisted User Settings on USB Drive</dt>
-<dd>
-User settings should be persisted when using a USB drive. The user should have the option to store these settings encrypted.
-</dd>
-
-</dl>
-
-
-<a name="download">
-<h2>Download</h2>
-
-<p>
-See the <a href="http://www.browseanonymouslyanywhere.com/incognito/index.php?option=com_content&task=view&id=26&Itemid=39">download section</a> on <a href="http://www.browseanonymouslyanywhere.com/incognito">__INCOGNITO__'s main site</a> for download information. Various development files (portage snapshot and stage3 tarball) as well as the current version of __INCOGNITO__ can be found at <a href="http://files1.cjb.net/incognito/">http://files1.cjb.net/incognito/</a>.
-</p>
-
-<p>
-The latest version of this document for the current relesase can be found <a href="http://www.anonymityanywhere.com/incognito/index.php?option=com_content&task=view&id=26&Itemid=39">here</a>. The development version of this document can be found at Incognito's subversion repository <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/share/incognito/readme.html">here</a>, although it should be noted that some information which is added dynamically at build will not be present (has mostly to do with information about which software packages that are installed).
-</p>
-
-<p>
-The build root for the CD is stored in a <a href="http://subversion.tigris.org">Subversion</a> repository. It can be viewed or checked out at <a href="https://tor-svn.freehaven.net/svn/incognito/">https://tor-svn.freehaven.net/svn/incognito/</a>.
-</p>
-
-<a name="contact">
-<h2>Contact</h2>
-
-<p>
-As of november 2007, the maintainace of this distribution has passed from the founder, Pat Double, to anonym, who can be contacted through anonym (at) lavabit (dot) com. Please do not contact Pat for anything relating to the current development of __INCOGNITO__. Feature requests and (especially) bug reports are welcome and should be sent to anonym, and please include "__INCOGNITO__" in the subject line to ease mail sorting. Also, please be considerate of any major technology choices, such as <a href="http://www.gentoo.org/proj/en/releng/catalyst">Catalyst</a> and <a href="http://www.gentoo.org">Gentoo Linux</a>, <a href="http://www.kde.org">KDE</a>, etc. These have been chosen because of the developers' familiarity with them and will likely not change ever. If someone would like to maintain a parallell version with, say, Gnome instead of KDE or similar that would probably work just fine. However, since the whole development process is centered around Gentoo Linux' Catalyst, neither of them are negotiable.
-</p>
-
-<a name="approach">
-<h2>Approach</h2>
-<blockquote>What is needed to reach our goals?</blockquote>
-
-<p>
-</p>
-
-<a name="impl">
-<h2>Implementation</h2>
-<blockquote>How did we implement our approach in order to reach our goals.</blockquote>
-
-<p>
-There are full and tiny versions of the CD. The tiny version is intended to fit on small media (such as a 'business card' CD) and basically provides an anonymous web browser. The full version supports a variety of Internet applications.
-</p>
-
-<h3>Software</h3>
-
-<p>
-The following software is present on both the full and tiny versions. The version of the packages used is included on the CD at /usr/share/packages.txt.
-</p>
-
-<dl>
-
-<dt><a href="http://www.gentoo.org">Gentoo Linux</a> (<a href="http://www.kernel.org">kernel 2.6</a> <!-- #version(sys-kernel/gentoo-sources) -->)</dt>
-<dd>The base operating system, provides hardware detection, infrastructure. Please note that the Gentoo Foundation does not provide or endorse this software distribution.</dd>
-
-<dt><a href="<!-- #homepage(net-misc/tor) -->">Tor</a> <!-- #version(net-misc/tor) --></dt>
-<dd><!-- #description(net-misc/tor) -->. Our attempt is to always use the latest stable version. This version is patched to allow controllers to access the cookie authentication file. The <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/portage.overlay/net-misc/tor/files/tor-cookieperm.patch">patch</a> is from the 0.2.0.x development branch.</dd>
-
-<dt><a href="<!-- #homepage(net-proxy/polipo) -->">polipo</a> <!-- #version(net-proxy/polipo) --></dt>
-<dd><!-- #description(net-proxy/polipo) --></dd>
-
-<dt><a href="<!-- #homepage(www-client/mozilla-firefox-bin) -->">Firefox</a> <!-- #version(www-client/mozilla-firefox-bin) --></dt>
-<dd><!-- #description(www-client/mozilla-firefox-bin) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/noscript-bin) -->">NoScript</a> <!-- #version(x11-plugins/noscript-bin) --></dt>
-<dd><!-- #description(x11-plugins/noscript-bin) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/cs-lite) -->">CS Lite</a> <!-- #version(x11-plugins/cs-lite) --></dt>
-<dd><!-- #description(x11-plugins/cs-lite) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/firegpg) -->">FireGPG</a> <!-- #version(x11-plugins/firegpg) --></dt>
-<dd><!-- #description(x11-plugins/firegpg) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/refcontrol) -->">refcontrol</a> <!-- #version(x11-plugins/refcontrol) --></dt>
-<dd><!-- #description(x11-plugins/refcontrol) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/adblock_plus) -->">Adblock Plus</a> <!-- #version(x11-plugins/adblock_plus) --></dt>
-<dd><!-- #description(x11-plugins/adblock_plus) --></dd>
-
-<dt><a href="<!-- #homepage(net-irc/xchat) -->">XChat</a> <!-- #version(net-irc/xchat) --></dt>
-<dd><!-- #description(net-irc/xchat) --></dd>
-
-<dt><a href="<!-- #homepage(app-crypt/truecrypt) -->">TrueCrypt</a> <!-- #version(app-crypt/truecrypt) --></dt>
-<dd><!-- #description(app-crypt/truecrypt) --></dd>
-
-<dt><a href="<!-- #homepage(net-misc/openssh) -->">ssh</a> <!-- #version(net-misc/openssh) --></dt>
-<dd><!-- #description(net-misc/openssh) --></dd>
-
-<dt><a href="<!-- #homepage(net-analyzer/macchanger) -->">macchanger</a> <!-- #version(net-analyzer/macchanger) --></dt>
-<dd><!-- #description(net-analyzer/macchanger) --></dd>
-
-<dt><a href="<!-- #homepage(www-servers/lighttpd) -->">lighthttpd</a> <!-- #version(www-servers/lighttpd) --> for hidden services</dt>
-<dd><!-- #description(www-servers/lighttpd) --></dd>
-
-<dt><a href="<!-- #homepage(net-proxy/3proxy) -->">3proxy</a> <!-- #version(net-proxy/3proxy) --></dt>
-<dd><!-- #description(net-proxy/3proxy) --></dd>
-
-<dt><a href="<!-- #homepage(mail-mta/mixminion) -->">Mixminion</a> <!-- #version(mail-mta/mixminion) --></dt>
-<dd><!-- #description(mail-mta/mixminion) --></dd>
-
-<dt><a href="<!-- #homepage(mail-mta/mixminion-smtp) -->">Mixminion SMTP</a> <!-- #version(mail-mta/mixminion-smtp) --></dt>
-<dd><!-- #description(mail-mta/mixminion-smtp) --></dd>
-
-<dt><a href="<!-- #homepage(mail-client/mozilla-thunderbird-bin) -->">Thunderbird</a> <!-- #version(mail-client/mozilla-thunderbird-bin) --></dt>
-<dd><!-- #description(mail-client/mozilla-thunderbird-bin) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/enigmail-bin) -->">Thunderbird OpenPGP (enigmail)</a> <!-- #version(x11-plugins/enigmail-bin) --></dt>
-<dd><!-- #description(x11-plugins/enigmail-bin) --></dd>
-
-<dt><a href="<!-- #homepage(x11-plugins/thunderplunger) -->">Thunder Plunger</a> <!-- #version(x11-plugins/thunderplunger) --></dt>
-<dd><!-- #description(x11-plugins/thunderplunger) --></dd>
-
-<dt><a href="<!-- #homepage(net-misc/trans-proxy-tor) -->">dns-proxy-tor</a> <!-- #version(net-misc/trans-proxy-tor) --></dt>
-<dd>DNS server that uses the Tor network to resolve addresses.</dd>
-
-<dt><a href="<!-- #homepage(net-dns/pdnsd) -->">pdnsd</a> <!-- #version(net-dns/pdnsd) --></dt>
-<dd><!-- #description(net-dns/pdnsd) -->. Configured to use dns-proxy-tor to do the resolution.</dd>
-
-<dt><a href="<!-- #homepage(net-misc/vidalia) -->">Vidalia</a> <!-- #version(net-misc/vidalia) --></dt>
-<dd><!-- #description(net-misc/vidalia) --></dd>
-
-<dt><a href="<!-- #homepage(app-crypt/gnupg) --><">GnuPG</a> <!-- #version(app-crypt/gnupg) --></dt>
-<dd><!-- #description(app-crypt/gnupg) --></dd>
-
-<dt><a href="<!-- #homepage(app-admin/keepassx) --><">KeePassX</a> <!-- #version(app-admin/keepassx) --></dt>
-<dd><!-- #description(app-admin/keepassx) --></dd>
-
-<dt><a href="<!-- #homepage(net-analyzer/thcrut) -->">thcrut</a> <!-- #version(net-analyzer/thcrut) --></dt>
-<dd><!-- #description(net-analyzer/thcrut) --></dd>
-
-<dt><a href="<!-- #homepage(net-analyzer/nmap) -->">nmap</a> <!-- #version(net-analyzer/nmap) --></dt>
-<dd><!-- #description(net-analyzer/nmap) --></dd>
-
-<dt><a href="<!-- #homepage(net-wireless/airsnort) -->">airsnort</a> <!-- #version(net-wireless/airsnort) --></dt>
-<dd><!-- #description(net-wireless/airsnort) --></dd>
-
-<dt><a href="<!-- #homepage(app-misc/screen) -->">screen</a> <!-- #version(app-misc/screen) --></dt>
-<dd><!-- #description(app-misc/screen) --></dd>
-
-<dt><a href="<!-- #homepage(net-misc/openvpn) -->">OpenVPN</a> <!-- #version(net-misc/openvpn) --></dt>
-<dd><!-- #description(net-misc/openvpn) -->. Can operate over TCP or UDP. Due to limitations of the Tor software only TCP is anonymized. UDP is currently blocked.</dd>
-
-<dt><a href="<!-- #homepage(net-misc/vpnc) -->">vpnc</a> <!-- #version(net-misc/vpnc) --></dt>
-<dd><!-- #description(net-misc/vpnc) --></dd>
-
-<dt><a href="<!-- #homepage(net-misc/netkit-telnetd) -->">telnet</a> <!-- #version(net-misc/netkit-telnetd) --></dt>
-<dd><!-- #description(net-misc/netkit-telnetd) --></dd>
-
-<dt><a href="<!-- #homepage(net-misc/socat) -->">socat</a> <!-- #version(net-misc/socat) --></dt>
-<dd><!-- #description(net-misc/socat) --></dd>
-
-<dt><a href="<!-- #homepage(www-client/links) -->">links</a> <!-- #version(www-client/links) --></dt>
-<dd><!-- #description(www-client/links) --></dd>
-
-<dt><a href="http://www.kde.org">KDE 3.5</a></dt>
-<dd>K Desktop Environment, a reduced install with parts that could be useful on an anonymity CD.</dd>
-
-<dt><a href="<!-- #homepage(kde-base/kmail) -->">KDE - KMail</a> <!-- #version(kde-base/kmail) --></dt>
-<dd><!-- #description(kde-base/kmail) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/konqueror) -->">KDE - Konqueror </a> <!-- #version(kde-base/konqueror) --></dt>
-<dd><!-- #description(kde-base/konqueror) --></dd>
-
-<dt><a href="<!-- #homepage(kde-misc/tork) -->">TorK</a> <!-- #version(kde-misc/tork) --></dt>
-<dd><!-- #description(kde-misc/tork) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/kopete) -->">KDE - Kopete</a> <!-- #version(kde-base/kopete) --></dt>
-<dd><!-- #description(kde-base/kopete) --></dd>
-
-<dt><a href="<!-- #homepage(net-im/kopete-otr) -->">Kopete Off The Record plugin</a> <!-- #version(net-im/kopete-otr) --></dt>
-<dd><!-- #description(net-im/kopete-otr) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/kontact) -->">KDE - Kontact</a> <!-- #version(kde-base/kontact) --></dt>
-<dd><!-- #description(kde-base/kontact) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/ksnapshot) -->">KDE - KSnapShot</a> <!-- #version(kde-base/ksnapshot) --></dt>
-<dd><!-- #description(kde-base/ksnapshot) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/akregator) -->">KDE - Akregator</a> <!-- #version(kde-base/akregator) --></dt>
-<dd><!-- #description(kde-base/akregator) --></dd>
-
-<dt><a href="<!-- #homepage(kde-base/krfb) -->">KDE - krfb</a> <!-- #version(kde-base/krfb) --></dt>
-<dd><!-- #description(kde-base/krfb) --></dd>
-
-<dt><a href="<!-- #homepage(net-p2p/ktorrent) -->">KDE - KTorrent</a> <!-- #version(net-p2p/ktorrent) --></dt>
-<dd><!-- #description(net-p2p/ktorrent) --></dd>
-
-<dt><a href="<!-- #homepage(kde-misc/tcgui) -->">TrueCrypt UI (TCGUI)</a> <!-- #version(kde-misc/tcgui) --></dt>
-<dd><!-- #description(kde-misc/tcgui) --></dd>
-
-</dl>
-</p>
-
-<h3>Internationalization</h3>
-
-<p>
-The full version has the following locales. The tiny CD is English only, sorry but I could not fit the CD under 50MB without removing natural language support. If you'd like to see another locale for the full CD please let me know.
-</p>
-
-<ul>
-<li>de_DE (German)</li>
-<li>en_GB (British English)</li>
-<li>en_US (American English)</li>
-<li>es_ES (Spanish)</li>
-<li>fa_IR (Persian)</li>
-<li>fr_FR (French)</li>
-<li>it_IT (Italian)</li>
-<li>ja_JP (Japanese)</li>
-<li>pt_PT (Portugese)</li>
-<li>zh_CN (Chinese)</li>
-</ul>
-
-See <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/locale.gen">/etc/locale.gen</a> for the selected languages. See <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a> for how this configuration is applied.
-
-<h3>Configuration</h3>
-
-<h4>The Tor&trade; software</h4>
-<p>
-The Tor software is currently configured as a client only. The client listens on SOCKS port 9050, as a transparent proxy on port 9040 and control port 9051 (with cookie authentication). Only connections from localhost are accepted. It can be argued that running a server would increase your anonymity for a number for reasons but we still feel that most users probably would not want this.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/tor/torrc">/etc/tor/torrc</a></li>
-</ul>
-
-<h4>Mixminion</h4>
-<p>
-Mixminion cannot be configured as a server as these servers need to be very reliable. As a client the default configuration seems to be acceptable. Note that TorK has built-in support for Mixminion. KMail also has been configured to use Mixminion via a sendmail compatible shell script. In this way the signature and encryption features of KMail can be used. Thunderbird is configured to use the Mixminion SMTP server to send email.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/bin/sendmail-mixminion">/usr/bin/sendmail-mixminion</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/mixminion/mixminion-smtp.conf">/etc/mixminion/mixminion-smtp.conf</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kmailrc">/var/lib/kdesession/kmailrc</a> (copied to /home/gentoo/.kde3.5/... during build)</li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/thunderbird-config">/var/lib/thunderbird-config</a> (copied to /home/gentoo/.thunderbird during build)</li>
-</ul>
-
-<h4>DNS</h4>
-<p>
-DNS leaks are controlled by using a local caching server. Two software packages are used to effect this. dns-proxy-tor listens for DNS requests which are resolved through the Tor network. pdnsd is used to provide caching.  pdnsd is the server configured in /etc/resolv.conf, listening on localhost. It is configured to forward to dns-proxy-tor for the actual resoluton. There is a security concerns that some application could attempt to do its own DNS resolution without consulting /etc/resolv.conf. UDP packets are blocked to prevent leaks. Another solution may be to use the Linux network filter to forward to the local DNS server.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/resolv.conf">/etc/resolv.conf</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/dns-proxy-tor">/etc/conf.d/dns-proxy-tor</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/pdnsd">/etc/conf.d/pdnsd</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/net">/etc/conf.d/net</a></li>
-</ul>
-
-<h4>HTTP Proxy</h4>
-<p>
-Polipo is used as the HTTP proxy. It contacts the Tor software via SOCKS5 to make the real connections.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/polipo/config">/etc/polipo/config</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/env.d/99proxy">/etc/env.d/99proxy</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kioslaverc">/var/lib/kdesession/kioslaverc</a> (copied to /home/gentoo/.kde3.5/... during build)</li>
-</ul>
-
-<h4>SOCKS libraries</h4>
-<p>
-tsocks and dante are installed. Note that it is unnecessary with the Linux network filter (see below) and the local DNS server to socksify or torify apps. This is done at a lower level. These libraries are here due to dependencies and configured for completeness.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/socks/">/etc/socks/</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/env.d/99proxy">/etc/env.d/99proxy</a></li>
-</ul>
-
-<h4>Random MAC Address</h4>
-<p>
-The macchanger program can be used to change the network card MAC addresses to a random value. Gentoo has direct support for macchanger so all we need to do is configure it. The configuration is set to "random-ending" which is equivalent to "macchanger -e", meaning the vendor and media type are not changed. This is done to not draw attention to the changed MAC address in case someone is watching. Using a random MAC address may improve anonymity with respect to the LAN and prevent mapping the user to a specific physical location.
-</p>
-
-</p>
-This functionality is not enabled by default as some DHCP servers may be configured with specific MAC addresses. In the boot menu there is an "Enable/Disable MAC changer" option that can be set before a language is chosen and the system starts booting.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/conf.d/net">/etc/conf.d/net</a> (used by tiny)</li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/macchanger">/etc/init.d/macchanger</a> (used by full)</li>
-</ul>
-
-<h4>Mozilla Firefox</h4>
-<p>
-HTTP and SOCKS proxies are configured. SOCKS is configured to perform name resolution through the proxy. I started Firefox without a config, exited, and then copied the configuration directory to the CD build root. The NoScript extension has been installed.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/firefox-config/">/var/lib/firefox-config/</a> (copied to /home/gentoo/.mozilla during build)</li>
-</ul>
-
-<h4>Bookmarks</h4>
-<p>
-Firefox and Konqueror have preset bookmarks related to anonymity.
-</p>
-
-<ul>
-<li>Firefox: <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/firefox-config/firefox/m7m1jk79.Default%20User/bookmarks.html">bookmarks.html</a></li>
-<li>Konqueror: <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/bookmarks.xml">bookmarks.xml</a></li>
-</ul>
-
-<h4>Kopete</h4>
-<p>
-Kopete is configured with contacts to Freenode and OFTC IRC networks accessed via Tor hidden services. The Kopete ircnetworks.xml file is patched with these networks.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/kdesession/kopeterc">kopeterc</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
-</ul>
-
-<h4>XChat</h4>
-<p>
-XChat is configured to use the Tor software as a SOCKS5 proxy. It will pass the hostname through SOCKS5 so that the exit node does the DNS resolution.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/xchat-config">xchat-config</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
-</ul>
-
-<h4>Network Filter</h4>
-<p>
-One of the security issues is that we don't know what software will attempt to contact the network and whether their proxy settings are setup to use the Tor SOCKS proxy correctly. This is solved by forwarding all TCP connections that are not explicitly targetting the Tor proxy through a transparent proxy that in turn forwards it to the Tor proxy anyway. Linux has a kernel level network filter that accomplishes this.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/lib/iptables/rules-save">/var/lib/iptables/rules-save</a> (loaded by the standard Gentoo /etc/init.d/iptables service)</li>
-</ul>
-
-
-<h4>Host system RAM</h4>
-<p>
-When shutting down the system RAM is securely wiped. RAM can actually be read after the machine shuts off with the right equipment. The software doing this is smem, part of the <a href="http://www.thc.org/">secure-delete</a> package. This process can take a while. If you are booting from a CD it should eject, and if you are booting from a USB drive you can remove the drive once prompted. In either case you can leave the computer and let it finish on its own.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/var/patches/secure_halt.patch">/var/patches/secure_halt.patch</a> (applied during build)</li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
-</ul>
-
-<h4>Passwords</h4>
-<p>
-There are two user's that are intended to be used for logins, 'gentoo' and 'root'. Since this is a CD/USB the passwords are empty. This should not be a security concern because the user will remove the CD/USB when done and there should be no services allowing logins from the network.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/fsscript.sh">fsscript.sh</a></li>
-</ul>
-
-<h4>Running the CD from RAM</h4>
-<p>
-The tiny version gives you the menu option of running the CD/USB from RAM. During the boot process the entire CD is copied into RAM and run from there. The CD will eject at this time or you may remove the USB drive when the boot progress screen is displayed. The full CD is too large for most computers to run from RAM but if you'd like to then hit [Tab] on the boot option and add " docache" after the boot line.
-</p>
-
-<h4>Running the CD from a Windows session</h4>
-<p>
-__INCOGNITO__ full may be run inside a Windows session in case the computer cannot boot media. <a href="http://fabrice.bellard.free.fr/qemu/">QEMU</a> is used to run the CD in a virtual PC. CTRL-ALT-F can be used to make the virtual machine full screen. Note that this will work for Windows 2000/XP or greater. A security concern that is not covered in this case is a keystroke logger. Keystrokes still run through the host operating system and can be logged, so beware.
-</p>
-
-<h3>Configuration copied from USB drive</h3>
-
-<p>
-Certain configurations are copied from the USB drive on boot. The following table lists the configuration, where it should exist on the USB drive and where it is copied into.
-</p>
-
-<table>
-<tr><th>Software</th><th>USB drive location</th><th>Destination</th></tr>
-<tr><td>OpenVPN</td><td>/keys/openvpn</td><td>/etc/openvpn</td>
-<tr><td colspan="3">The following are only copied if a persistent home cannot be created.</td></tr>
-<tr><td>Kopete</td><td>/config/kopeterc</td><td>/home/gentoo/.kde3.5/share/config</td>
-<tr><td>SSH</td><td>/keys/ssh</td><td>/home/gentoo/.ssh</td>
-</table>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/external-config-setup">/etc/init.d/external-config-setup</a></li>
-</ul>
-
-<a name="persistent">
-
-<h3>Persistent User Settings for a USB drive</h3>
-
-<p>
-When the CD is copied to a USB drive (see <a href="#createusb">here</a>) the user settings may be persisted across sessions. The home volume can be stored as a <a href="http://www.truecrypt.org">TrueCrypt</a> volume or unencrypted. For the Un*x savvy, the unencrypted volume is stored as an ext3 file on the USB drive. The file home.tc (TrueCrypt) or home.ext3.img (unencrypted) on the USB drive stores these settings and can be removed to reset to the CD defaults or copied elsewhere for a backup. You will need to do a clean shutdown (described above) to make sure your settings are saved. When booting from a writable media and there is no home volume you will be prompted to create one, you may choose not to do so.
-</p>
-
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/external-config-setup">/etc/init.d/external-config-setup</a></li>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/sbin/create-homevol">/usr/sbin/create-homevol</a></li>
-</ul>
-
-<h3>Hidden Services</h3>
-
-<p>
-Hidden HTML content may be served if running from an USB drive. Content is limited to static HTML pages. The content is stored in the home directory and so takes advantage of TrueCrypt encryption. The directory structure follows.
-</p>
-
-<dl>
-<dt>/home/hidden/[name]</dt>
-<dd>Base directory for hidden content where [name] can be anything (sane) that you'd like.</dd>
-<dt>/home/hidden/[name]/conf</dt>
-<dd>Configuration directory mostly used for Tor hidden service information. It will include the hostname and private key, keep it safe, i.e. don't copy it over to your buddy's USB drive.</dd>
-<dt>/home/hidden/[name]/conf/port</dt>
-<dd>Optional port for the hidden service. This is what you'd give out to others. If you will have multiple services it is best to specify the port. The default is 80, increasing from there for each additional service.</dd>
-<dt>/home/hidden/[name]/conf/torrc</dt>
-<dd>Optional config to append to /etc/tor/torrc after the hidden service description. An example would be a HiddenServiceNodes directive, etc.</dd>
-<dt>/home/hidden/[name]/www</dt>
-<dd>The HTML content. Use index.html for your default page.</dd>
-</dl>
-
-<p>
-The <a href="<!-- #homepage(www-servers/lighttpd) -->">lighttpd</a> server is used to serve the content. Configuration of the server is done at boot time in the <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/hidden-service">/etc/init.d/hidden-service</a> init script.
-</p>
-<p>
-The host name to use for the hidden service can be found in the /home/hidden/[name]/conf/hostname file for that service. This file is created by the Tor software when configuring the hidden service. The host name will be the same across sessions and machines as it and the private key are stored in the /home/hidden/[name]/conf directory.
-</p>
-<p>
-Changes to /home/hidden (service addition/removal, /home/hidden/[name]/conf change) can be applied using the following command from a terminal. To get a terminal on full, type "Alt-F2", "konsole". On tiny right-click on the desktop and choose "xterm".
-<code>
-su -c /etc/init.d/hidden-service restart
-</code>
-Note that content changes in /home/hidden/[name]/www should take effect immediately without running the above command.
-</p>
-<ul>
-<li><a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/etc/init.d/hidden-service">/etc/init.d/hidden-service</a></li>
-</ul>
-
-<a name="maintenance">
-<h2>Maintenance</h2>
-<blockquote>(How to keep the implementation current for anonymity, security and usefulness.)</blockquote>
-
-<p>
-The Gentoo Catalyst release build tool is used to build the CD. This tool is designed to make the CD easy to maintain. For an update of only the Tor software it takes a simple version bump and 30 minutes for the tiny CD, two hours for the full version. Human effort is minimal, Catalyst does most of the work. A full update of all software takes several hours to compile, but this is seldom done or needed and again generally requires little human effort. Adding or removing software to/from the CD is also generally trivial.
-</p>
-
-<p>
-The following applications are kept up to date as soon as possible. Others may be updated sooner if a major security problem occurs (Firefox, etc.)
-<p>
-
-<ul>
-<li>Tor</li>
-<li>TorK</li>
-<li>Vidalia</li>
-<li>Polipo</li>
-<li>Mixminion</li>
-</ul>
-
-<p>
-Remaining applications, including the base system, will be updated on a roughly two month schedule. It takes a long time to compile everything from scratch and sometimes there are problems that need to be addressed. Most of the packages are marked stable by Gentoo so there are not many problems.
-</p>
-
-<a name="caveats">
-<h2>Caveats</h2>
-<blockquote>Side effects of the implementation that may be undesirable.</blockquote>
-
-<p>
-UDP is a problem. The Tor software does not provide anonymity using UDP yet. Outgoing UDP packets are dropped altogether.
-</p>
-
-<p>
-When using a USB drive your user settings are stored on the drive unsecured. If any personal information is stored by the applications you use then you must keep your drive secure from potential threats, for example by using the optional encryption and a strong passphrase.
-</p>
-
-<a name="security">
-<h2>Security</h2>
-<blockquote>Agreements and disagreements with our approach or implementation.</blockquote>
-
-<p>
-(It would be great to have links to peer reviews here.)
-</p>
-
-<a name="createusb">
-<h2>Copying to a USB Drive</h2>
-
-<p>
-The CD may be copied to a USB drive. Why do that? USB drives are easier to carry, harder to break, offer file storage and persistent user settings between sessions. There is a script provided that will copy the CD to a USB drive and make the drive bootable. When booting the user is presented with the option to create a persistent home directory with optional encryption (see <a href="#persistent">here</a> for details). On the desktop after booting the CD there will be an icon for copying to a USB drive (on tiny right click on the desktop and choose "Create USB" from the menu.) See the <a href="https://tor-svn.freehaven.net/svn/incognito/trunk/root_overlay/usr/sbin/create-usb">/usr/sbin/create-usb</a> script for technical details. Note the script depends on the Gentoo LiveCD structure, it probably won't work when run on another LiveCD setup.
-</p>
-
-</body>
-
-</html>

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-1.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-1.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-2.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-compose-2.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-firegpg.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-firegpg.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-ssl.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-ssl.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-1.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-1.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-2.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/ff-youtube-2.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/incognito-desktop.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/incognito-desktop.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/konq.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/konq.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/nm-menu.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/nm-menu.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-chat.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-chat.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-main.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/pidgin-main.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-compose.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-compose.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-main.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tb-main.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-main.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-main.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-menu.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-menu.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-network.png
===================================================================
(Binary files differ)


Property changes on: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/img/tork-network.png
___________________________________________________________________
Name: svn:mime-type
   + application/octet-stream

Added: incognito/trunk/root_overlay/usr/share/incognito/walkthrough/walkthrough.html
===================================================================
--- incognito/trunk/root_overlay/usr/share/incognito/walkthrough/walkthrough.html	                        (rev 0)
+++ incognito/trunk/root_overlay/usr/share/incognito/walkthrough/walkthrough.html	2008-07-20 03:01:53 UTC (rev 16081)
@@ -0,0 +1,233 @@
+<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN">
+<html>
+<head>
+	<title>Incognito Walkthrough</title>
+</head>
+<body>
+
+<h1>Incognito Walkthrough</h1>
+<h2>Contents</h2>
+
+<ul>
+	<li><a href="#intro">Introduction</a>
+	<ul>
+		<li><a href="#what">What is Incognito?</a>
+		<li><a href="#why">Why do you need anonymity?</a>
+		<li><a href="#how">How does Incognito provide with anonymity?</a>
+	</ul>
+	<li><a href="#howto">How to use Incognito</a>
+	<ul>
+		<li><a href="#nm">Networking with NetworkManager</a>
+		<li><a href="#tork">Controlling Tor with TorK</a>
+		<li><a href="#ff">Browsing the web with Firefox</a>
+		<li><a href="#tb">Emailing with Thunderbird</a>
+		<li><a href="#pidgin">Chatting with Pidgin</a>
+		<li><a href="#konq">Managing files with Konqueror</a>
+		<li><a href="#misc">Other applications</a>
+		<li><a href="#usb">Running Incognito from USB</a>
+		<li><a href="#windows">Running Incognito from within Microsoft Windows</a>
+	</ul>
+	<li><a href="#conclusion">Conclusion</a>
+</ul>
+<h2><a name="intro"></a>Introduction</h2>
+
+<p><a name="what"></a>In this document we try to present the Incognito LiveCD in an easy to understand and reasonably thorough manner in hope to give the new user a crash course in what might be a completely new set of applications and concepts. However, if you have experience with these applications and concepts from elsewhere and feel comfortable with the user interface in general, reading this document is not necessary although reading the <a href="#what">what, why and how</a> sections might still be of some interest. A word of caution to all users is not to poke around to much with the network, proxy and firewall settings &ndash; doing that might spoil the built-in defences of Incogntio. Proceed with that at your own risk.</p>
+
+
+<h3>What is Incognito?</h3>
+
+<p>Incognito, <strong>noun</strong>:</p>
+
+<ol>
+	<li>One unknown or in disguise, or under an assumed character or name.
+	<li>The assumption of disguise or of a feigned
+	character; the state of being in disguise or not recognized.
+</ol>
+
+<p>Incognito is an open source <a href="http://en.wikipedia.org/wiki/Livedistro">LiveDistro</a> based on <a href="http://www.gentoo.org/">Gentoo Linux</a> assisting you to securely and anonymously use the Internet almost anywhere you go, e.g. your home, work, university, favourite Internet caf&eacute; or local library. Incognito can be used from either a CD or a USB drive and has several Internet applications (Web browser, IRC client, Mail client, Instant messenger, etc.) pre-configured with security in mind, and all Internet traffic will be anonymized. To use it, you simply insert the CD or USB that you have installed Incognito on in a computer and restart it. Incognito should then start as an independent operating system instead of Microsoft Windows or whatever operating system you have installed. It is also possible to run Incognito as a guest operating system inside Microsoft Windows by simply inserting the media while Windows is running which should present you with a menu.</p>
+
+<p>Incognito is Free Software released under the GNU/GPL (version 2).</p>
+
+
+<h3><a name="why"></a>Why do you need anonymity?</h3>
+
+<p>In case you didn't know, we currently find ourselves in a state of steady decline of our freedoms and privacy, with increasing levels of mass surveillance and repression all over the world (see <a href="http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597">this report from Privacy International</a>). Without taking any precautions, your Internet service provider, the state, the police and global surveillance systems like <a href="http://en.wikipedia.org/wiki/ECHELON">ECHELON</a> (which is <em>not</em> a conspiracy theory; see <a href="http://www.fas.org/irp/program/process/rapport_echelon_en.pdf">this report from the European Parliament</a>) can record what you do online: what you read, what you write and who you communicate with. This is possible since all messages sent over the Internet contain the <a href="http://en.wikipedia.org/wiki/Ip_address">IP addresses</a> of both the sender and receiver, much like an ordinary mail sent through the postal system contain addresses of both sender and receiver for two-way communication. IP addresses can easily be traced back to the physical location of the computers and their owners, and from that ultimately back to you. If you don't mind this fact, then more power to you, but if you do mind, then Incognito might be just what you need.</p>
+
+
+<h3><a name="how"></a>How does Incognito provide with anonymity?</h3>
+
+<p>First of all, true anonymity is impossible. Given enough resources an attacker will get you. What one can do is to make the cost of doing that so high that it becomes infeasible Incognito tries to do this by sending all your Internet traffic through the <a href="https://www.torproject.org/">Tor&trade; network</a> which makes your Internet traffic very hard to trace. So if someone tries to trace you when you are using Incognito, the trail will stop somewhere in Tor network with the IP address of some of its participants, not your. Similarly, if someone tried to see where you ultimately want to send your traffic, they will only reach as far as some computer in the Tor network. In fact, you will be the only one knowing exactly what is going on &ndash; not even the computers in the Tor network that you send your traffic through will know the whole picture!</p>
+
+<p>As at least a rudimentary understanding of Tor currently is essential for using it securely (and knowing its limits) we strongly recommend reading the <a href="https://www.torproject.org/overview.html">Tor overview</a> and <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorALaymansGuide">Understanding and Using Tor &ndash; An Introduction for the Layman</a>. We also encourage you to read the following paragraphs about common misconceptions about the service offered by the Tor software:</p>
+
+<p>By relaying your Internet traffic through the Tor network (which Incognito does per default) your communications should <em>only</em> be considered to be untraceable back to the computer you used, not encrypted or in any other way hidden. While the traffic <em>is</em> encrypted when it leaves your computer and when you get back your responses, it will not be so when sent between the Tor network and your destination (this is unavoidable for technical reasons). This means that an eavesdropper at some later point will be able see your traffic without Tor's encryption, but will not be able to link it back to your computer.</p>
+
+<p>As such, if you are sending or receiving sensitive data whose disclosure would be damaging in itself even if it is untraceable, you need to use end-to-end encryption to hide the meaning of your data to everyone except the recipient. Examples of such sensitive information that you need to protect in this way are your real identity or other personal information linkable to you, login details and passwords, bank account or financial details, anything illegal or political, and secrets in general.</p>
+
+<p>There are several tools bundled with Incognito offering end-to-end encryption for various applications: <a href="http://www.gnupg.org/">GnuPG</a> provides with encryption for email, <a href="http://www.cypherpunks.ca/otr">OTR</a> is for instant messaging (MSN, ICQ, IRC etc.) among others. Also, bear in mind that web browsing on sites for whom the addresses begin with &quot;http://&quot; are not encrypted and thus dangerous to transmit sensitive information to, but those starting with &quot;http<strong>s</strong>://&quot; (notice the additional <strong>s</strong>) are encrypted and thus <strong>s</strong>ecure (many web browsers also display a lock or a similar symbol in the address field or status bar indicating that the connection is secure).</p>
+
+<p>Furthermore, some applications have features and services that may compromise the anonymity offered by the Tor network. All modern web browsers, such as Firefox, support <a href="http://en.wikipedia.org/wiki/Javascript">JavaScript</a>, <a href="http://en.wikipedia.org/wiki/Adobe_flash">Adobe Flash</a>, <a href="http://en.wikipedia.org/wiki/HTTP_cookie">Cookies</a> and other services which have been shown to be able to defeat the anonymity provided by the Tor network. For instance, a web page using JavaScript can make your web browser send your real IP address to the web server hosting the web page which possibly can disclose it not only to the web server's owner but also eavesdroppers that happen to fetch the message when it is sent from the Tor network to the web server. Even if most web pages using JavaScript does not do this, it is important to be vary cautious when determining which sites you allow to use these extra features. When running Firefox in Incognito all such features are handled by an extension called <a href="https://www.torproject.org/torbutton/">Torbutton</a> which does all sorts of things to prevent the above type of attacks. But that comes at a price &ndash; since this will disable some functionality, certain sites might not work as intended.</p>
+
+
+<h2><a name="howto"></a>How to use Incognito</h2>
+
+<p>In this section we will briefly present the main applications included in Incognito. All the pictures are clickable to get them undistorted and in full size. Users are encouraged to look for further information about them elsewhere and to experiment (while not doing anything sensitive!) for their own benefit. But first, let's take a look at the Incognito desktop:</p>
+
+<p align=center><a href="img/incognito-desktop.png"><img src="img/incognito-desktop.png" width=512 height=384 border=0></a></p>
+
+<p>There are not many things to say unless you are completely unfamiliar with this kind of graphical user interface. It is called KDE and share many fundamentals with Microsoft Windows, Mac OS X and other modern graphical user interfaces, so if you have used any of them, getting used to KDE will take no time. But there are a few things we will say right away to spare you some time. First of all, in the lower left corner of the screen there is a blue button with a K in it, called the K-menu button. Pressing it opens the K-menu where applications are started, KDE is configured, you can choose to shutdown etc. Please explore the different categories of applications and try out those that seem interesting. Also, in the lower right corner you will find something referred to as the system tray, or simply systray, that has a couple of icons in it, each which offers an interface for some application. One of them helps you keep an eye on the battery level (if you run from a laptop), one allows to instantly change the keyboard layout, and one helps you control the network settings, for instance. You are encouraged to check them out, but we will say more about some of them later on in this walkthrough.</p>
+
+<p>Some other important things that needs to be understood before proceeding are the concepts of a <a href="http://en.wikipedia.org/wiki/Livedistro">LiveDistro, LiveCD and LiveUSB</a>. In essence a LiveDistro is an operating system (e.g. Windows, Linux, Mac OS X) that is run from some removable media like a CD or USB memory stick. Most likely you are running Incognito from a CD, which makes it into a LiveCD, and this brings some limitations to its operation. Most importantly, since a CD is read-only once it has been burned by CD recording software it is locked down so that no changes persist through reboots. So, if you download a file or make some application settings they will disappear when you shutdown. This is both good and bad &ndash; on the plus side, if you screw up anything or get a virus, they will be gone if you restart. But not being able to save stuff is of course inconvenient in some cases. In that case you might want to run Incognito from and USB memory stick instead, making it into a LiveUSB, which is writeable and where changes <em>will</em> persist through reboots. You can read more about this and its implications later in this <a href="#usb">walkthrough</a>.</p>
+
+
+<h3><a name="nm"></a>Networking with NetworkManager</h3>
+
+<p>The name is quite self-explanatory &ndash; this is what you should use to set up your network, usually to establish an Internet connection. In many cases this is automatic. For example, if you are connecting through a wire and it is inserted in the computer, NetworkManager will try to obtain network access automatically with DHCP. If you are using a wireless connection you are basically one click away. Right-click its icon in the systray to summon this menu:</p>
+
+<p align=center><a href="img/nm-menu.png"><img src="img/nm-menu.png" width=240 height=194 border=0></a></p>
+
+<p>All wireless networks your computer is picking up are listed there, as are all wired networks you have access to (usually one per wire). There are other options also, like connecting using dial-up and setting up VPNs although these will require further setup in the &quot;Options -&gt; Configure...&quot; section. Hopefully all your networking needs will be satisfied using this interface.</p>
+
+
+<h3><a name="tork"></a>Controlling Tor with TorK</h3>
+
+<p>TorK is described as an anonymity manager. Basically this means that it can be used to control Tor, and is used here as an alternative to Vidalia which some of you might be familiar with (Vidalia is also included in Incognito if you prefer it to TorK). But TorK can do a few more things than just control Tor, one which is evident from the following picture of its main window:</p>
+
+<p align=center><a href="img/tork-main.png"><img src="img/tork-main.png" width=380 height=340 border=0></a></p>
+
+<p>The &quot;Anonymous Email&quot; entry is pretty interesting. Pressing the envelope icon will bring forth a dialogue which makes it possible to send anonymous email. Besides first routing the mail through the Tor network, it will also be routed through the <a href="http://en.wikipedia.org/wiki/Mixminion">Mixminion</a> network, which offers even greater anonymity than the Tor network, at least in theory. In practice the Mixminion network is a bit to small to offer much anonymity, but that extra layer of indirection will probably not hurt. Also, notice that this is one-way only, so the recipient cannot answer unless you specify a response address in the message. But that could defeat the whole purpose of sending email anonymously. If you want the recipient to be able to answer you be attaching a response address you should consider encrypting the message. TorK does not offer an interface to GnuPG, who will have to do that manually, most likely by using the command-line gpg tool.</p>
+
+<p>Next we will have a look at the &quot;Tor Network&quot;
+tab:</p>
+
+<p align=center><a href="img/tork-network.png"><img src="img/tork-network.png" width=380 height=340 border=0></a></p>
+
+<p>In here, all the Tor nodes in the Tor network are listed, as are all your circuits and connections that go through the Tor network. All this requires a bit of technical knowledge of how Tor works in order to understand and use, but it is not strictly necessary. One very useful thing when working with Tor is the following option, found in the TorK-menu that you get by right-clicking its systray icon:</p>
+
+<p align=center><a href="img/tork-menu.png"><img src="img/tork-menu.png" width=182 height=98 border=0></a></p>
+
+<p>The &quot;Change Identity&quot; option will tear down all you current circuits and build new ones. This is very useful if you experience bad performance or even timeouts accessing some Internet resource as you might have better luck with the new circuits that are built. Also, if you ever want to make sure that one thing you are doing will not be linkable to the next thing you are going to do you should use this feature.</p>
+
+
+<h3><a name="ff"></a>Browsing the web with Firefox</h3>
+
+<p>Given Mozilla Firefox's recent surge in popularity many of you have probably used it before. Its user interface is like any other modern web browser, but there are a few things we want to mention, some that is special with this particular installation. Do you remember what we said <a href="#how">earlier</a> about end-to-end encryption and its importance while using Tor? Here is how it looks in Firefox when you are using a secure, end-to-end encrypted connection:</p>
+
+<p align=center><a href="img/ff-ssl.png"><img src="img/ff-ssl.png" width=404 height=311 border=0></a></p>
+
+<p>Notice the locks in the status bar and address bar (which also has turned yellowish) &ndash; these are the indicators that a secure connection using <a href="http://en.wikipedia.org/wiki/Secure_Sockets_Layer">SSL</a> is being used. You should try to only use services that use secure connections when you are required to send sensitive information (like login credentials), otherwise its very easy for an eavesdropper to steal whatever information you are sending. In this case what we are trying to do is logging in on an email account at <a href="http://lavabit.com/">lavabit</a>, using their <a href="https://lavabit.com/apps/webmail/src/login.php">webmail interface</a>. Let us proceed with logging in there so we can se how it is possible to send end-to-end encrypted email with any webmail service out there with the nifty <a href="http://getfiregpg.org/">FireGPG</a> extension:</p>
+
+<p align=center><a href="img/ff-compose-1.png"><img src="img/ff-compose-1.png" width=404 height=311 border=0></a></p>
+
+<p>Here we have written a silly email to Bob, mentioning stuff like &quot;public&quot; and &quot;private&quot; keys. If you do not know what this means but are interested in sending encrypted email, we suggest you take yourself some time and read up on <a href="http://en.wikipedia.org/wiki/Public_key_cryptography">public key cryptography</a> and <a href="http://en.wikipedia.org/wiki/Pretty_Good_Privacy">PGP</a> just to get the basic concepts.</p>
+
+<p>What we will do next is first selecting all of the text in the message (by using the mouse or simply pressing Ctrl + A) and then right-clicking somewhere on the selected text. This will make the usual Firefox context menu appear, which has a FireGPG entry that we are interested in. Clicking it will expand the following menu:</p>
+
+<p align=center><a href="img/ff-firegpg.png"><img src="img/ff-firegpg.png" width=96 height=137 border=0></a></p>
+
+<p>In the menu we choose &quot;Sign and encrypt&quot; and we get a dialogue asking me to select the public key to encrypt it with (Bob's) and the private key to sign it with (mine). After doing this the message is only readable by Bob, and in addition Bob will be able to verify that it was in fact the sender who wrote it. The signed and encrypted text will look like this:</p>
+
+<p align=center><a href="img/ff-compose-2.png"><img src="img/ff-compose-2.png" width=404 height=311 border=0></a></p>
+
+<p>At this stage we are ready to press send. When Bob receives this email he can also use FireGPG to decrypt it in a very similar way &ndash; he will just have to select the encrypted text, get the FireGPG menu and choose &quot;Verify&quot; or &quot;Decrypt&quot;, or both. This can be done with any so called PGP block. There is one important limitation in FireGPG, though. It cannot generate new keys, so you will have to use another application for that. We recommend using the GNU Privacy Assistant, which can be found under the Utilities section of the K-menu.</p>
+
+<p>And then there is the issue with JavaScript, cookies and Adobe Flash that you might remember from an earlier section. To deal with these problems we use an extension called <a href="https://www.torproject.org/torbutton/">Torbutton</a> which is specifically designed for this purpose in combination with Tor. While switched (indicated by &quot;Tor enabled&quot; in the Firefox status bar) on it will disable a lot of these things and handle the others in a more secure manner. But as we mentioned, this might cause disruptions in your web experience. For example, the popular video service <a href="http://www.youtube.com/">youtube</a> will not work properly as you can see here when we are trying to watch <a href="http://www.youtube.com/watch?v=XIDxDMwwlsw">this clip</a>:</p>
+
+<p align=center><a href="img/ff-youtube-1.png"><img src="img/ff-youtube-1.png" width=404 height=311 border=0></a></p>
+
+<p>In order to get the video player to show up, we will have to disable Torbutton by clicking its panel in the Firefox status bar. Normally this would disable the use of Tor completely, but as we have mentioned earlier, nothing escapes Tor while running Incognito so your connection will still be anonymized. However, you will have to trust that Google (the current owner of youtube) is not doing anything fishy with all their JavaScripts, cookies etc. that could break your anonymity.</p>
+
+<p>After disabling Torbutton we can finally learn how onion routing (the technique used by the Tor network) works from the guys in the TV series Numb3rs!</p>
+
+<p align=center><a href="img/ff-youtube-2.png"><img src="img/ff-youtube-2.png" width=404 height=311 border=0></a></p>
+
+<p>There is also another web-browser installed, namely KDE's Konqueror which we will deal with later on in this article, although for other uses than web browsing. We do not encourage you to use Konqueror, not because it is a bad web browser, but simply because there is no Torbutton equivalent tool for it. When possible you should use Firefox and Torbutton instead unless you really know what you are doing.</p>
+
+
+<h3><a name="tb"></a>Emailing with Thunderbird</h3>
+
+<p>Not everyone is happy using webmail (like the authors) but want to use a <em>real</em> email client instead. For that we have included Mozilla Thunderbird which looks like this:</p>
+
+<p align=center><a href="img/tb-main.png"><img src="img/tb-main.png" width=453 height=305 border=0></a></p>
+
+<p>Composing email looks like this:</p>
+
+<p align=center><a href="img/tb-compose.png"><img src="img/tb-compose.png" width=324 height=257 border=0></a></p>
+
+<p>Notice that there are buttons for PGP encryption in both of the above pictures. Pressing any of these for the first time will start a guide for setting up PGP, possibly generating new keys if you don't have any.</p>
+
+<p>Setting up your account requires some knowledge about POP vs IMAP etc. and indeed that your email service supports these. Also, doing this usually takes some time which is a problem when running Incognito from a CD, so you might only want to consider using Thunderbird if you have a persistent home directory by <a href="#usb">running Incognito from USB</a>.</p>
+
+
+<h3><a name="konq"></a>Managing files with Konqueror</h3>
+
+<p>Konqueror is KDE's file manager, (s)FTP client, web browser and more and it looks like this while in file managing mode:</p>
+
+<p align=center><a href="img/konq.png"><img src="img/konq.png" width=354 height=257 border=0></a></p>
+
+<p>As we already have mentioned, we recommend that you do your web browsing in Firefox instead since there is nothing like Torbutton for Konqueror. If you <em>really</em> want to use Konqueror you should make sure to disable all plugins, JavaScript and cookies if you want to expect some anonymity, but even then Firefox and Torbutton is probably a more secure (and usable) alternative. There are no problems using Konqueror for file managing and as an FTP client however. In the latter case, just enter &quot;ftp://&quot; followed by the address to the FTP server in order to connect, and the same applies for SFTP although you prepend &quot;sftp://&quot; to the address.</p>
+
+
+<h3><a name="pidgin"></a>Chatting with Pidgin</h3>
+
+<p>For instant messaging Incognito includes the Pidgin Instant Messenger. It is a multi-protocol client, so you can run MSN, ICQ, IRC, AIM, Jabber and many other protocols at the same time, even with several instances of the same protocol. See the following protocol for a user with three different protocols enabled at the same time:</p>
+
+<p align=center><a href="img/pidgin-main.png"><img src="img/pidgin-main.png" width=109 height=196 border=0></a></p>
+
+<p>Of course the issue of end-to-end encryption arises again. As we mentioned earlier, we have <a href="http://www.cypherpunks.ca/otr">Off-the-record messaging</a> (commonly called simply OTR) for instant messaging, and Pidgin and many other instant messengers have support for that. There are several resources on how it works and how to use it on their web site, so we will just present you with a picture of how the chat window looks once you have established an encrypted conversation:</p>
+
+<p align=center><a href="img/pidgin-chat.png"><img src="img/pidgin-chat.png" width=370 height=218 border=0></a></p>
+
+<p>OTR and other Pidgin plugins are enabled in the &quot;Tools -&gt; Plug-ins&quot; section. Simply check the appropriate box for enabling any plugin you want. When the OTR plugin is enabled you can press the &quot;Confifure Plug-in&quot; button which opens a window where you can generate and manage keys. The use of OTR is heavily encouraged as many instant messaging protocols are sent in plaintext. Force your friends to migrate to clients with support for OTR!</p>
+
+<h3><a name="misc"></a>Other applications</h3>
+
+<p>There are several other interesting security or Internet related applications included in Incognito which we list and present briefly here. We encourage the user to check them out.</p>
+
+<ul>
+	<li><a href="http://www.gnupg.org/">GNU Privacy Guard of GPG</a> &ndash; A Free implementation of PGP used for encryption of all sorts.
+	<li><a href="http://www.gnupg.org/gpa.html">GNU Privacy Assistant</a> &ndash; A graphical user interface for GnuPG.
+	<li><a href="http://mixminion.net/">Mixminion</a> &ndash; A type III anonymous remailer.
+	<li><a href="http://keepassx.sourceforge.net/">KeePassX</a> &ndash; A password manager and generator.
+	<li><a href="http://www.kde-apps.org/content/show.php/Kvkbd?content=56019">Kvkbd</a> &ndash; A virtual keyboard that can be used to safely enter passwords when suspecting that a hardware keylogger is present.
+	<li><a href="http://www.truecrypt.org/">TrueCrypt</a> &ndash; Disk encryption software.
+	<li><a href="http://www.vidalia-project.net/">Vidalia</a> &ndash; An alternative Tor controller.
+	<li><a href="http://ktorrent.org/">KTorrent</a> &ndash; A Bittorrent client. Please use this with care as it puts and relatively high burden on the Tor network. Only use it for small files if absolutely necessary.
+	<li><a href="http://kopete.kde.org/">kopete</a> &ndash; Another multi-protocol instant messenger with OTR support.
+	<li><a href="http://www.kde.org/">KSirc</a> &ndash; Another IRC client.
+	<li><a href="http://www.xchat.org/">XChat</a> &ndash; Yet another IRC client.
+	<li><a href="http://www.kde.org/">Krdc</a> &ndash; A Remote Desktop client supporting VNC and RDP.
+</ul>
+
+
+<h3><a name="usb"></a>Running Incognito from USB</h3>
+
+<p>Running Incognito from a CD has its virtues but it certainly also have its restrictions. While CDs are portable they usually don't fit in your pocket in a comfortable manner. But a USB memory stick certainly fits any pocket. In addition, CDs are read-only and thus no data can be saved to it, but that is, again, not the case with USB memory sticks. However, storing sensitive data on a USB memory stick could be dangerous if it got into the wrong hands. Similarly, if we get a virus or manages to damage the system in other ways, the system is tainted or unusable from that point, either with or without your knowledge. Clearly that is not good.</p>
+
+<p>It is actually possible to get the best out of these two worlds at the same time. When running Incognito from a USB memory stick you have the option to create an encrypted container wherein your home directory is stored so that any files stored and settings made are saved persistently to the next boot. If you use a good password this deals with the dangers of storing sensitive data on it. But what about virus threats and the like? Well, when running from a USB memory stick, the system is still set up to not be writeable &ndash; it is loaded to RAM and any changes stays only there. It is only you persistent home directory which indeed is persistent.</p>
+
+<p>In order to get Incognito running on USB you currently first have to get the usual LiveCD installation first. Once Incognito has started up you will find a short cut to an installation guide in the desktop, called &quot;Install to USB&quot;. The guide will tell you about your options and is self contained, basically you only need to insert a USB memory stick and hit the OK button to get it done. Then you restart the computer without the CD in, but with the USB memory stick connected instead. Incognito will start to boot just like from the CD but at a certain point a guide will start asking about if you want a persistent home directory or not. The encryption we mentioned earlier is optional but definitely recommended. Do <em>not</em> use at your own risk!</p>
+
+<p>The encryption is protected with a password, so it is very important to choose a strong password. But what's a strong password? Well, there are many different opinions on that. What can be said is that to utilize the encryption algorithm used to its full extent you will need a password consisting of 40 randomly chosen characters of those available on the standard (western) keyboard. There should be around 90 different characters. Of course, such a password is almost impossible to memorize, so you will probably have to go for a shorter password. It can also help to device mnemonics to help remember them. Be creative!</p>
+
+
+<h3><a name="windows"></a>Running Incognito from within Microsoft Windows</h3>
+
+<p>Thanks to the QEMU virtual machine Incognito can be run as a process inside Microsoft Windows without the need to restart the computer. Simply insert the media when Windows is running and a menu should appear with the option to start Incognito. This is especially useful when you are using a computer you are not allowed to shutdown, which can be the case for public computers in certain Internet caf&eacute;s or libraries. There are a few problems with this approach though. First of all, if the Windows installation is compromised with a software keylogger or virus, Incognito provides no protection against this. Secondly, performance is a low worse compared to running it on its own. As such, this is only recommended when the other alternative isn't an option.</p>
+
+<p>Since the Incognito developers do not have access to any Windows computers at the moment, any input if this actually works and how it performs etc. is welcome.</p>
+
+
+<h2><a name="conclusion"></a>Conclusion</h2>
+
+<p>By offering you Incognito we hope that you have the technological means to stay anonymous on the Internet. However, we want to emphasize that staying anonymous is <em>not</em> only a technological problem &ndsah; there is no tool, including Incognito and Tor, that will magically make you anonymous. You will have to behave as well. While a precise knowledge of the architecture of the Internet, cryptology and traffic analysis techniques certainly can help you with that, we believe that good ol' fashioned common sense and a handful of caution will get you far enough. Among other things, that includes choosing good passwords and not writing them down in stupid places, using end-to-end encryption whenever possible, not trusting everyone and everything but being a bit suspicious in general, being very careful when dealing with identifying information such as name, whereabouts and so on &ndash; any such piece of information will help a would be adversary to get closer to you.</p>
+
+<p>Also, please try to follow any instructions given by security tools as much to the letter as possible. There are situations where one can be creative or improvise solutions, but you should really try to learn when that is appropriate. For instance, when using PGP you are often asked to verify the authenticity of any key that you have just got. Usually this works by presenting you with the key's so called fingerprint, which is a unique identifier for that key. Verification should then be done by asking the other party to send you the fingerprint through some safe channel, which could be anything from telling it by telephone or VoiP (which is hard for an attacker to manipulate on the fly) or even face-to-face. This is of course not always possible, but here is one of those places you can be creative. For example, you could send the fingerprint hidden in an image by some means and so on. An alternative method to fingerprints, used by OTR, is to simply ask both parties of a shared secret that both should know. In this case, don't choose just anything &ndash; if someone is watching you they probably know which high school you went to, your maiden name and similar.</p>
+
+<p>This is probably the place where we are expected to wish you good luck, but we won't. Relying on luck simply isn't good practice. Stay cool and be smart! Thanks for you time!</p>
+
+
+<p>The Tor&trade; trademark and the Tor Onion Logo are trademarks of The Tor Project.</p>
+
+</body>
+</html>



More information about the tor-commits mailing list