- 1 Passwords & 2FA
- 2 Using the command line
- 3 Communicating
- 4 Surfing the web
- 5 Cryptocurrency
- 6 Publishing
- 7 Why is anonymity important?
- 8 These tools are for everyone
There is some part of my personality that identifies with “preppers” who assemble “go bags” in case of emergency. It’s the same part that made me want to buy a manual Honda as my first car, so I could be sure I could drive any car I encountered.
My technological set-up is similar. There are a lot of things in place that one could argue I don’t need right now, or don’t use regularly. But it makes me feel better because they are already configured and set up in case I need them.
There are about a hundred little tricks like this that Hiro wouldn’t know about if he hadn’t been programming avatars for people like Vitaly Chernobyl for the last couple of years. To write a really good invisible avatar from scratch would take a long time, but he puts one together in several hours by recycling bits and pieces of old projects left behind in his computer. Which is how hackers usually do it. Neal Stephenson, Snow Crash, Bantam Books, 1992
The motivations behind doing this are not always clear to me. But in the end it comes from a core belief that computers can allow us to do amazing things. As I discover new pockets of knowledge, I also find new ways to string them together. Occasionally an idea will come to me and I can see how I would put it together because I had already experimented with some of the elements without necessarily even knowing why.
I’ve written a bit about how I believe the internet was built to be hacked and the tools to do so have been given to us- and they’re pretty well documented!
Part of this exercise has been going back to my roots to understand some of the root technologies (like email, mailing lists, usenet, IRC, PGP, etc.) can be remembered, reused, and repurposed to build a better online world.
I’ve also been watching a lot of Mr. Robot lately and it frankly just feels cool to make computers do what you want by typing the right magic words.
Passwords & 2FA
1password is the core of my set up. It allows me to have secure and complicated passwords for all of my accounts / logins / keys / etc. My golden rule lately is that if I can remember my password, it isn’t strong enough.
The iPhone with Face ID makes opening 1password on-the-go incredibly fast. On the desktop, I open 1password with Alfred, search for the login, and use the “CMD-shift-C” hotkey to copy the password which can be done exclusively from the keyboard relatively quickly.
I use two-factor authentication on every service that offers it. Wherever possible, I avoid 2FA that uses my phone number. I really like Authy. The app is designed intelligently and importantly they have planned for the occasion when you upgrade your phone. I recently had to go through the process of removing 2FA from all of my services when I upgraded my iPhone because I was using Google Authenticator which does not support backups. I’m not doing that again.
Using the command line
I’ve spent a long time halfway comfortable with the command line. Essentially swimming in shallow water with a
cd here and and
ls there. I wanted to take some concentrated time to become more familiar with the command line. The eventual goal would be to be able to sign onto any *nix command line and be able to navigate and get stuff done.
For now, I’m just focusing on using the command line more in my everyday life. I am finding there are certain tasks I prefer to tackle in different ways, but part of the process is exposing myself to all the different potential tools I could use.
iTerm hotkey window
At any time I can easily conjure a terminal by pressing “cmd-shift-I” which makes it easier to jump in and out of the CLI with basically no friction.
I’m also running tmux so creating a new window is a quick “ctrl-a c” and I’m off and running. I’ve also been using “ctrl-a w” which is basically a tmux version of alt-tab and lets you go between your different windows with the arrow keys.
- catimg allows you to preview images in the terminal which is pretty rad and marginally useful
- mutt lets me send and receive email from the command line which is rad and a nice no-frills interface that makes one feel like a Real Hacker
- newsboat is like mutt for RSS feeds
- mackup has been instrumental for me. It allows you to back up your application settings and dotfiles through Dropbox. It lets a lot of my hotkey and app settings stay the same between my personal and work machine without having to set everything up all the time. It also makes it really easy to spin up on new machines/VMs.
- jsonfui is a great CLI interface for JSON data, and a way more performant way of exploring large datasets than loading them into a Atom or a browser and waiting for the prettification. It’s also nice to be able to pipe outputs of node scripts to a quick UI.
- recon-ng is a tool used for OSINT research, using a variety of Python scripts and APIs to look up publicly available information for research purposes
- Guys have you heard of this vim thing? Turns out it’s pretty useful (I’d been using nano/textmate/atom this whole time). I still use atom in my day-to-day, but it’s nice to be able to log into a remote server or edit a huge JSON file in the terminal when I need to.
I really love Keybase! They make getting started with cryptography really fun. I’ve understood the concepts and methodology of PGP before, and even generated a key and promptly never used it. But Keybase bridged the gap for me.
I now have a keybase profile that lists a handful of verified identities and addresses that are provably me. I am also now hosting my public PGP key at https://ejfox.com/keybase.txt so that people who want to send me encrypted messages can do so. It’s also nice that, even as much as I trust keybase, the PGP key is hosted on an HTTPS website that I exclusively control.
I’ve got the GPG Suite for OS X which makes it so you can store your PGP key passphrase in the keychain. This makes it easier to do a handful of things, including signing git commits with your key without having to enter your passphrase every time.
I’m also using FlowCrypt which makes it easy to encrypt and decrypt emails in gmail through a Chrome extension. Like Keybase, it makes something that has been really complicated before really easy and accessible and low-friction.
I wish people still used IRC, but it really doesn’t seem like they do (invite me to your server). I think the future looks a lot less like Slack or Discord and a lot more like an anonymous decentralized encrypted IRC. As far as I can tell, that’s this thing called matrix.
Matrix even supports bridging with IRC channels and I like that kind of backwards compatibility. On the downside, however, it looks like literally no one uses these yet. I’ve been playing around with riot.im as my web/ios matrix client and don’t have many complaints, but I don’t use it that much.
Surfing the web
I recently got rid of the internet connection at my apartment. It doesn’t mean I don’t use the internet, but I no longer have the ability to sit around and watch Netflix or play video games online all day. It’s been an experiment that’s been going well- what started as two weeks has stretched to over 2 months.
I’ve been looking into getting rid of my cable connection while I wait for real consumer-facing 5G. In the meantime I’ve been looking into a group called NYC Mesh who are building a low-cost mesh wifi network across New York City. This ties into a lot of ideas I have about democratizing access to the internet and more general mutual aid.
I’ve been tethering to my iPhone a lot too, which has meant slightly adjusting my internet habits and figuring out ways to reduce my data usage and still get work done and enjoy myself. This adds to my sense of freedom- anywhere I have cell phone service I can do essentially anything.
I’ve been really interested in the work being done with the Brave Browser especially the Basic Attention Token which among other things, allows people who browse the web to give money to content publishers through automated microtransactions (which I think is probably the future of healthy content consumption on the internet).
I really like NordVPN last time I’d checked they had relatively good reviews from folks I trusted, they are pretty affordable, they take cryptocurrency, and their desktop and iOS apps are actually really nice. I usually have a VPN running on my desktop and phone in addition to the 22.214.171.124 app.
All of that is handy because do you know those LinkNYC things that are replacing phone booths across the city? They have incredibly fast and incredibly insecure (and high-target) wifi networks! But using a VPN makes me feel more comfortable.
I cannot see any downsides to making it easier for people to send me money.
BTC=3DE42VUyUKSikQ9eUeFKv2EkKVms7Pmd1G BCH=qrwzlfjhhn8jdx92a8m8e2kuxcchmmvdgguqgy23a7 ETH=0x63958715F8e9Fd6CF0652394a89bb2AdD0a11686 LTC=MDvtqRMS6QiiXpYgxtgZKHPrYnLovjdcsZ XLM=ejfox*keybase.io
If I was teaching a stranger or a relative about bitcoin, I would probably show them Yenom which makes it ridiculously easy to send/receive BCH. I sort of recommend Coinbase, but they’ve done things that make me nervous in the past and are incredibly bad at responding to support requests for a company that holds people’s money. I still use the Coinbase iOS app but I do it semi-warily.
I publish most of my prototypes and websites through Netlify using the Netlify CLI tools, which I’ve written about previously. It makes it easy to run one command to rebuild and redeploy my sites and even create little preview sites.
I’m also really excited about using Glitch to create smaller apps and explanations, especially those that I might want to others to modify or fork since Glitch makes that so easy. Glitch also makes it really easy to embed little apps in my blog posts. I’m excited about the future of Glitch and want to help their methodology and ecosystem grow.
Why is anonymity important?
A lot of good work and activism can be done anonymously but it takes work to set things up properly beforehand. It is worthwhile for anyone to have a process by which they can publish materials to the web anonymously in a way that is hard to scrub from the web even if they see no need to use them currently. Prepare for rain and hope for sun.
Some things need to be done anonymously… but how do you decide when?
- Will the work make you a target of harassment from dark corners of the internet?
- Will the work potentially annoy the rich and powerful who can afford to try to have you sued or silenced?
- Will the work potentially reveal truths that governments would rather not be publicized?
- Are you creating work that could have a large monetary value that could make you a target? (Think Bitcoin’s Satoshi)
- Could the work potentially be used by bad actors to commit crimes?
These tools are for everyone
I wrote this up because I was surprised at how easy it was to get set up. These are at their core very complicated systems, but over the past few decades really smart people have made them easy and approachable. Practice going through the motions of getting things set up now, you never know when that knowledge might come in handy.