Create a gist now

Instantly share code, notes, and snippets.

What would you like to do?

Simple Security Guidelines

  • Use an iDevice

    • Use an iPod or an iPad without a SIM card
    • Use an iPhone
    • Do not jailbreak
    • Always upgrade to new iOS versions
  • Use Signal (iOS + Android)

  • Android?

    • Do not root your device
    • Do not enable Developer Mode
    • Use a Nexus (gets latest patches w/o carrier/vendor barrier)
      • Run the latest version, always
    • Don't have a Nexus? Install CyanogenMod (official builds only)
      • Run the latest version, always
  • Use a ChromeBook

  • Using Windows?

    • Use 10 or 8.1, nothing earlier.
    • Use EMET
  • Using Office?

    • Do not enable macros.
  • Enable full disk encryption (FDE)

  • Require a password to unlock

  • Apply patches

  • Use a password manager

  • Use Chrome

  • Do not use Safari

  • Do not use IE

  • Use an ad blocker

    • Install uBlock Origin
    • Install HTTPS Everywhere
  • Disable Flash (on Chrome you can still right click to play)

  • Use a VPN

    • (One self hosted option: algo)

One could argue that if knowledgeable enough, rooting the Nexus 6 could result in a more secure device.

Owner

grugq commented Aug 22, 2015

If you are knowledgeable enough you are not taking security advice from a gist on the internet.

sneak commented Aug 22, 2015

Shouldn't this be "use chromium" instead of Chrome (with all its Google RCE auto-update and flash and such)?

Also: Windows?! Seriously? I expect better from you. :P

sneak commented Aug 22, 2015

Would change "use an ad blocker" to "use uBlock origin in default-3p-deny mode" (but the docs on the ublock site about how to use this, as well as the UI, are respectively buried and confusing)

sneak commented Aug 22, 2015

Q: Which password manager works best on a Chromebook and an iOS device and OSX?

wbic16 commented Aug 22, 2015

It'd be nice to have some more organization, like so:
https://gist.github.com/wbic16/5c7caa3eac5d874f3817

@ghost

ghost commented Aug 22, 2015

Assuming this is aimed at people who're not exactly info sec nerds, you might want to use "Full Disk Encryption" instead of FDE to avoid confusions.

Also, people should note that this is a "Security Guidelines" gist, not a "Privacy Guidelines" one.

Safari...is this strictly Windows or OS X as well?

ttilley commented Aug 22, 2015

@grugq - if you have an iOS device, use the configurator to pair-lock it to communicate only with your desktop, thus thwarting the bulk of existing forensics tools: http://www.zdziarski.com/blog/?p=2589

If you are using a development version of iOS, you may also need to use a development version of the apple configurator: https://developer.apple.com/ios/download/

jvasile commented Aug 22, 2015

It might be useful to specify the audience for this, especially if it helps those people clue in that they should really pay attention to this list.

"Apply patches" is tough in practice for most users. "Favor automatic updates" might be the corollary.

Passphrase might be a better term than password. And you might want to specifically mention enabling the lock screen (so many people don't) and using numeric passes rather than swipe patterns.

jvasile commented Aug 22, 2015

@sneak, where is the setting for default-3p-deny mode in ublock?

cekage commented Aug 23, 2015

Android : do not enable developer mode

What is so wrong with developer mode? That flag alone does nothing.

The real danger is in "enable apps from unknown sources" but that's reachable without developer mode.

Other things in developer mode that might be problematic:

  • Bootloader unlocking
  • USB debugging

However the latter is no worse than iTunes sync, given it equally requires an explicit authorization for the computer you connect with.

Or where I am wrong?

Note that the attack surface argument stands: don't enable USB debugging if you're not using adb for e.g. file transfer or actual debugging.

Romanzo commented Jan 8, 2016

Un mio piccolo test per provare https://gist.github.com/Romanzo/2cd7b5cc382f5f419670
Non è scritto in inglese.

jhaddix commented Jan 8, 2016

Can we add, install EMET under Windows?

@sneak LastPass works well on all of those platforms.

@londonontech Safari on Windows was discontinued a long time ago and has not been receiving security updates, but the advice is for both OS X and Windows as in general it's not a very secure browser.

wmark commented Aug 17, 2016

After installing and enabling EMET 5.5 go to Trust and Pinning Rules and enable PublicKey Match for MicrosoftAccountCA.

(Allowed Country won't do any good if the use Symantec CA to spoof certificates for the updater.)

  • Do NOT use Chrome. Use Inox or ungoogled-chromium Its Chromium with everything-google removed, no Spyware.
  • Qupzilla is good browser too https://www.qupzilla.com 100% Open Source.
  • Do NOT use Google Search. Do NOT use DuckDuckGo. Use SearX its 100% Open Source.
  • LibreOffice is very good replacement for Office.
  • Try NOT using PDF, use ePub is the same, but internally its HTML5/CSS3, cant run JS. PDF executes arbitrary code, ePub dont, by design.
  • Use an Unicode Emoji on Passwords.
  • Put sticker on WebCam if you dont use it.
  • Put sticker on IR Remote Receiver if your notebook has that and you dont use it.
@ghost

ghost commented Aug 18, 2016 edited by ghost

Mac OS X:

Just some general tips for Mac OS X, feedback welcome.

OS:

  • Enable FileVault 2 with a STRONG password
  • Set a STRONG firmware password on your device
  • Be aware of the iCloud password-reset backdoor - see the second link under Read below
  • Disable all of Apple's iCloud Spyware, Backup, Drive, FindMyDevice, Calendar, Weather, etc.
  • Use a strong password on your Apple ID and enable 2FA, DO NOT REUSE THIS PASSWORD!
  • Install BlockBlock and RansomWhere - https://objective-see.com/ (has other nice tools aswell btw.)
  • Get a license for Little Snitch and Micro Snitch - https://www.obdev.at/products/
  • Ensure you are on the latest version + patchlevel, disable 'silent upgrades', check periodically by hand
  • Disable all unneeded interfaces and ports such as Firewire, Bluetooth, Ethernet, Wifi, etc.
  • Disable all Cloud-related shit such as iCloud, other sync shit like geod, ical, etc.
  • Some tape for Mic + Cam or better dissasemble and remove the hw parts if possible
  • Limit the app execution mode to signed App's from the App Store only
  • Set a short sleep timeout and enable FV2 key destruction on standby
  • Enable OSX's firewall and block all inbound traffic (advanced block mode)
  • Use custom DNS servers you trust and feel comfortable with such as OpenDNS
  • Personally I belive there is no need for anti-virus on a Mac, otherwise use ClamAV or MalwareBytes
  • Use a secure password manager such as Keepass - (Lastpass is ok too, but probably less secure)
  • Use VeraCrypt for usb drives or very sensitive data
  • Always use VPNs+Proxy if in public wifi
  • Disable IPv6 when not needed

Browser:

  • Firefox or Chromium (not Google Chrome) (always keep it up to date)
  • NoScript, uBlock and HTTPSEverywhere addons (optionally UserAgentSwitcher - nice to mitigate exploits by faking IE6 lol)
  • No flash, silverlight, java, etc. disable all plugins, use click2play or even better UNINSTALL them completely!
  • Disable WebRTC completely, too many holes in that cheese
  • Purge all creepy CAs from your browser (there are a plenty of them...)
  • For more Firefox hardening stuff see https://github.com/pyllyukko/user.js/

Mail:

  • Set-up your OWN, SECURE mail servers (if possible)
  • NEVER use imap/pop3/smtp without TLS, big fail!
  • Get the GPGTools suite for Apple Mail - https://gpgtools.org/
  • Sign and encrypt your mails and attachments whenever possible

Cron:

  • Regularly audit your system with the LockDown utility from https://objective-see.com/
  • Regularly run TaskExplorer, KnockKnock and DHS from https://objective-see.com/
  • Regularly check ALL system logs for anomalies including LittleSnitch's log
  • Regularly check kextstat + launchagents and launchdaemons and tmpdirs
  • Wipe stuff with diskutil secureErase if required (not recommended with SSDs)

Read:

taoeffect commented Aug 18, 2016 edited

That's a great list @schallertd! Regarding this:

Regularly audit your system with the LockDown utility from https://objective-see.com/
Regularly run TaskExplorer, KnockKnock and DHS from https://objective-see.com/

See cautions.

dguido commented Aug 27, 2016

@taoeffect, you're welcome to disassemble the binaries for Objective-See just like everyone else. There are no backdoors. Avoid useful tools at your peril. BlockBlock and TaskExplorer are the best things out there to keep yourself safe, and they come from someone who would know what it takes to do that! Last point to remember: everyone needs security. Patrick is an avid OS X user and wrote the tools as much for himself as for everyone else. There's no good reason to sabotage them.

Thanks for sharing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment