privacy-toolkit/TOOLS-REFERENCE.md
2025-12-31 19:44:07 -07:00

6.2 KiB

Privacy Toolkit - Tool Candidates

🛡️ Document Sanitization

  • Dangerzone - PDF/Office document sanitizer using container isolation

    • Threat: Malicious documents with embedded exploits
    • Status: Installation script ready (needs chmod fix for GPG key)
    • Source: Freedom of the Press Foundation
    • Platform: Linux (Debian/Ubuntu/Fedora)
  • ExifCleaner - Metadata removal from images/PDFs/videos

  • mat2 (Metadata Anonymization Toolkit)

    • Threat: Document metadata revealing identity/system info
    • Source: apt package, part of Tails
    • Platform: Linux

🔐 Encryption & Secure Storage

  • VeraCrypt - Full disk encryption and encrypted containers

    • Threat: Physical device seizure, data theft
    • Status: Already in use
    • Source: https://veracrypt.fr
    • Platform: Cross-platform
  • age - Modern file encryption (simpler than GPG)

  • Cryptomator - Client-side cloud storage encryption

📡 Secure Communication

  • Signal Desktop - E2E encrypted messaging

    • Threat: Message interception, surveillance
    • Source: https://signal.org
    • Platform: Linux (official .deb)
  • SimpleX - E2E encrypted messaging without identifiers

    • Threat: Metadata correlation, phone number linking
    • Status: Already documented in PAI
    • Source: https://simplex.chat
    • Platform: Cross-platform
  • Jami - P2P encrypted video/audio calls

    • Threat: Centralized communication surveillance
    • Source: https://jami.net
    • Platform: Cross-platform

🌐 Anonymity & Network Privacy

  • Tor Browser - Anonymous web browsing

  • ProtonVPN - Privacy-focused VPN

  • OnionShare - Anonymous file sharing over Tor

🔍 Metadata & Privacy Analysis

  • ExifTool - View/edit metadata in files

    • Threat: Understanding what metadata you're leaking
    • Source: apt package
    • Platform: Cross-platform
  • Sherlock - Username enumeration across platforms

🗑️ Secure Deletion

  • BleachBit - Secure file deletion and system cleaning

    • Threat: Forensic recovery of deleted files
    • Source: apt package
    • Platform: Linux/Windows
  • shred - Overwrite files securely

    • Threat: File recovery after deletion
    • Source: GNU coreutils (already installed)
    • Platform: Linux

🔒 Password & Secret Management

  • KeePassXC - Offline password manager

  • Bitwarden - Open source password manager (self-hostable)

    • Threat: Password reuse, weak passwords
    • Source: https://bitwarden.com
    • Platform: Cross-platform + self-hosted

📧 Email Privacy

  • Thunderbird + Enigmail - PGP email encryption

    • Threat: Email content surveillance
    • Source: apt package
    • Platform: Cross-platform
  • ProtonMail Bridge - Use ProtonMail with desktop clients

    • Threat: Email metadata, provider access
    • Source: https://proton.me
    • Platform: Cross-platform

🛡️ System Hardening

  • firejail - Application sandboxing

    • Threat: Application exploits compromising system
    • Source: apt package
    • Platform: Linux
  • AppArmor - Mandatory Access Control

    • Threat: Privilege escalation
    • Source: Built into Debian
    • Platform: Linux

🌐 DNS Privacy

  • dnscrypt-proxy - Encrypted DNS queries

  • Unbound - Validating DNS resolver

    • Threat: DNS spoofing, MITM
    • Source: apt package
    • Platform: Linux

📱 Mobile Companion Tools

  • scrcpy - Control Android via ADB (for testing privacy apps)
    • Source: apt package
    • Platform: Linux/Windows/macOS

🎯 Priority Tools (Install First)

  1. Dangerzone - Document sanitization
  2. mat2 - Metadata removal
  3. Signal Desktop - Secure messaging
  4. Tor Browser - Anonymous browsing
  5. BleachBit - Secure deletion
  6. firejail - App sandboxing

📁 Repository Structure Proposal

privacy-toolkit/
├── README.md                          # Overview, threat model intro
├── install.sh                         # Master handler script
├── tools/
│   ├── dangerzone/
│   │   ├── install.sh                # Individual install script
│   │   ├── README.md                 # What it does, why you need it
│   │   └── verify.sh                 # Post-install verification
│   ├── mat2/
│   │   ├── install.sh
│   │   ├── README.md
│   │   └── examples/                 # Usage examples
│   ├── signal-desktop/
│   └── tor-browser/
├── categories.md                      # Tools organized by threat model
├── threat-models.md                   # Common threat scenarios
└── docs/
    ├── installation-guide.md
    ├── verification-guide.md          # How to verify tools work
    └── threat-modeling.md             # Help users choose tools

🔧 Installation Script Template

Each tool should have:

  • Distro detection (Debian/Ubuntu/Fedora/Arch)
  • GPG key verification (with chmod fix for keyrings!)
  • Dependency checking
  • Version verification
  • Post-install testing
  • Cleanup on failure
  • Usage examples

📝 Notes

  • Focus on FOSS tools (auditability)
  • Prefer official repositories
  • Include threat model for each tool
  • Provide usage examples
  • Link to official documentation
  • Security-focused: verify signatures, check hashes