diff --git a/about.html b/about.html index d946699..d01e6c3 100644 --- a/about.html +++ b/about.html @@ -1,37 +1,105 @@ -Inferencium Network - About - + Inferencium Network - About + -

About

-
-

About Me

-

I am Inference, a cybersecurity researcher based in United Kingdom.
-
-

I write about my research and experience in cybersecurity and also physical -security. Most of my postings are security-related, but I occasionally post -about other aspects of my life.

-
-

I am an open source advocate for the preservation and modifiability of -source code. I believe source code should be considered human knowledge as -much as past knowledge and teachings were; it is how modern humanity -survives and runs.
-Source code being modifiable allows it to be adapted -for use by anyone, whether to add features, harden it for increased security -and/or privacy, or provide accessibility for disabled users.
-I am also a modular design advocate for the ability to securely and -robustly make changes to hardware and software without the entire system -being affected.

+

About

+
+

About Me

+

I am Inference, a cybersecurity researcher based in United Kingdom.
+
+

I write about my research and experience in cybersecurity and also physical + security. Most of my postings are security-related, but I occasionally post + about other aspects of my life.

+
+

I am an open source advocate for the preservation and modifiability of + source code. I believe source code should be considered human knowledge as + much as past knowledge and teachings were; it is how modern humanity + survives and runs.
+ Source code being modifiable allows it to be adapted + for use by anyone, whether to add features, harden it for increased security + and/or privacy, or provide accessibility for disabled users.
+ I am also a modular design advocate for the ability to securely and + robustly make changes to hardware and software without the entire system + being affected.

+
+
+

Software I Use

+

Desktop

+ + + + + + + + + + + + + + +
TypeSoftwareDescriptionSource model (License)
Operating system
+
+ Gentoo Linux
Gentoo Linux is a highly modular, source-based Linux-based operating system + which allows vast customisation to tailor the operating system to suit your specific + needs. There are many advantages to such an operating system, with the most notable + being the ability to optimise the software for security, privacy, performance, + power usage; however, there are effectively unlimited other use cases, or a + combination of multiple use cases.
+ I have focused on security hardening and privacy hardening, placing performance below + those aspects, although my system is still very performant. Some of the hardening I + apply includes stack protection, signed integer overflow wrapping, and GrapheneOS' + hardened_malloc memory allocator.
+ You can find my personal Gentoo Linux hardening configuration + here.
Open source
+
+ (GPLv2)
+

Smartphone

+ + + + + + + + + + + + + +
TypeSoftwareDescriptionSource model (License)
Operating system
+
+ GrapheneOS
GrapheneOS is a security-hardened, privacy-hardened, secure-by-default + Android-based operating system which implements extensive, systemic security + and privacy hardening to the Android Open Source Project used as its base + codebase. Its hardening includes closing gaps for apps to access sensitive + system information, a secure app spawning feature which avoids sharing address + space layout and other secrets AOSP's default Zygote app spawning model would + share, GrapheneOS' own hardened memory allocator (hardened_malloc) to protect + against common memory corruption vulnerabilties, hardened Bionic standard C library, + and local and remote hardware-backed attestation (Auditor) to ensure the OS has + not been corrupted or tampered with. GrapheneOS only supports devices which receive + full support from their manufacturers, including firmware updates and device-specific + updates, long support lifecycles, secure hardware, and overall high security practices.
+ For an extensive list of features GrapheneOS provides, visit its + official website.
Open source
+
+ (MIT)
+
+
diff --git a/blog.html b/blog.html index f86b0a9..ed8dfdb 100644 --- a/blog.html +++ b/blog.html @@ -1,32 +1,32 @@ -Inferencium Network - Blog - + Inferencium Network - Blog + -

Blog

-
-

2022-06-30

-

#2 - Untrusted: The Issue with Decentralisation

-
-
-

2022-01-29

-

#1 - systemd Insecurity

-
-
-

2022-01-27

-

#0 - FOSS is Working Against Itself

-
-
+

Blog

+
+

2022-06-30

+

#2 - Untrusted: The Issue with Decentralisation

+
+
+

2022-01-29

+

#1 - systemd Insecurity

+
+
+

2022-01-27

+

#0 - FOSS is Working Against Itself

+
+
diff --git a/blog/foss-is-working-against-itself.html b/blog/foss-is-working-against-itself.html index 5bec4d8..498bd08 100644 --- a/blog/foss-is-working-against-itself.html +++ b/blog/foss-is-working-against-itself.html @@ -2,16 +2,16 @@ Inferencium Network - Blog - FOSS is Working Against Itself - +

Blog - #0

diff --git a/blog/systemd-insecurity.html b/blog/systemd-insecurity.html index ffc3750..64660d0 100644 --- a/blog/systemd-insecurity.html +++ b/blog/systemd-insecurity.html @@ -2,16 +2,16 @@ Inferencium Network - Blog - systemd Insecurity - +

Blog - #1

diff --git a/blog/untrusted-the-issue-with-decentralisation.html b/blog/untrusted-the-issue-with-decentralisation.html index 9fea3d0..f4a9d98 100644 --- a/blog/untrusted-the-issue-with-decentralisation.html +++ b/blog/untrusted-the-issue-with-decentralisation.html @@ -2,16 +2,16 @@ Inferencium Network - Blog - Untrusted: The Issue with Decentralisation - +

Blog - #2

diff --git a/contact.html b/contact.html index cffed5b..716564a 100644 --- a/contact.html +++ b/contact.html @@ -1,56 +1,56 @@ -Inferencium Network - Contact - + Inferencium Network - Contact + -

Contact

-
-

E2EE Contact Methods

-
-

Preferred

-

Whenever possible, use the following contact methods; -they allow verification to mitigate man-in-the-middle attacks, -have solid security, and reasonable privacy.
-
-

Use the keys for each contact method to verify my devices. -Note that verification does not verify a person, only their devices, -and can be defeated via coercion or other force.

-
-

Signal

-

XMPP

-

Threema

-
-

Metadata-free

-

If metadata leakage is an issue for you, you can use the following -contact methods. Note that these services do not have verification -functionality, and will be treated as less secure; unless you really -need to use these services, use a preferred method instead.

-
-

Briar

-

Session

-
-
-
-

Non-private Methods

-

The following contact methods do not utilise end-to-end encryption, -or I do not use such functionality; they are suitable for public contact -only, including directly and groups. Do not use these methods if -confidentiality and/or privacy is required.

-
-

Fediverse

-

Twitter

-
-
+

Contact

+
+

End-to-end Encrypted Contact Methods

+
+

Preferred

+

Whenever possible, use the following contact methods; + they allow verification to mitigate man-in-the-middle attacks, + have solid security, and reasonable privacy.
+
+

Use the keys for each contact method to verify my devices. + Note that verification does not verify a person, only their devices, + and can be defeated via coercion or other force.

+
+

Signal

+

XMPP

+

Threema

+
+

Metadata-free

+

If metadata leakage is an issue for you, you can use the following + contact methods. Note that these services do not have verification + functionality, and will be treated as less secure; unless you really + need to use these services, use a preferred method instead.

+
+

Briar

+

Session

+
+
+
+

Non-private Methods

+

The following contact methods do not utilise end-to-end encryption, + or I do not use such functionality; they are suitable for public contact + only, including directly and groups. Do not use these methods if + confidentiality and/or privacy is required.

+
+

Fediverse

+

Twitter

+
+
diff --git a/contact/briar.html b/contact/briar.html index 8eaaf1a..562bce1 100644 --- a/contact/briar.html +++ b/contact/briar.html @@ -1,31 +1,31 @@ -Inferencium Network - Contact - Briar - + Inferencium Network - Contact - Briar + -

Contact

-
-

Briar

-
-

Updated: 2022-08-03 (UTC+00:00)

-
-
-
-Unavailable
-
-
-
-
+

Contact

+
+

Briar

+
+

Updated: 2022-08-03 (UTC+00:00)

+
+
+				
+						Unavailable
+				
+		
+
+
diff --git a/contact/session.html b/contact/session.html index 286aadc..fc2e885 100644 --- a/contact/session.html +++ b/contact/session.html @@ -1,31 +1,31 @@ -Inferencium Network - Contact - Session - + Inferencium Network - Contact - Session + -

Contact

-
-

Session

-
-

Updated: 2022-08-03 (UTC+00:00)

-
-
-
-0538eec32cf00661270afc186a40fefe771d1c39c91d79d02be6b95359eb171a42
-
-
-
-
+

Contact

+
+

Session

+
+

Updated: 2022-08-03 (UTC+00:00)

+
+
+				
+						0538eec32cf00661270afc186a40fefe771d1c39c91d79d02be6b95359eb171a42
+				
+		
+
+
diff --git a/contact/signal.html b/contact/signal.html index 29a4953..377e73d 100644 --- a/contact/signal.html +++ b/contact/signal.html @@ -1,31 +1,31 @@ -Inferencium Network - Contact - Signal - + Inferencium Network - Contact - Signal + -

Contact

-
-

Signal

-
-

Updated: 2022-06-23 (UTC+00:00)

-
-
-
-+447549902964
-
-
-
-
+

Contact

+
+

Signal

+
+

Updated: 2022-06-23 (UTC+00:00)

+
+
+				
+						+447549902964
+				
+		
+
+
diff --git a/contact/threema.html b/contact/threema.html index 343a844..d8d31cf 100644 --- a/contact/threema.html +++ b/contact/threema.html @@ -1,29 +1,29 @@ -Inferencium Network - Contact - Threema - + Inferencium Network - Contact - Threema + -

Contact

-
-

Threema

-
-

Updated: 2022-01-28 (UTC+00:00)

-
-

MD649ERN

-

Key

- -
-
+

Contact

+
+

Threema

+
+

Updated: 2022-01-28 (UTC+00:00)

+
+

MD649ERN

+

Key

+ +
+
diff --git a/contact/xmpp.html b/contact/xmpp.html index ba284c9..2780bd9 100644 --- a/contact/xmpp.html +++ b/contact/xmpp.html @@ -1,58 +1,58 @@ -Inferencium Network - Contact - XMPP - + Inferencium Network - Contact - XMPP + -

Contact

-
-

XMPP

-
-

Updated: 2022-10-13 (UTC+00:00)

-
-

Whenever possible, open the links to pin the fingerprint directly from this -webpage. If that is not possible, manually verify the fingerprints.

-
-

inference@inferencium.net

-

Key

-
Smartphone
-
-
-1bd03c6a 5e011655 2fafd697 da4fce70 63de5a83 a264a34a fcce78fe 6b06820c
-
-
-xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c -
-
-
Desktop
-
-
-87ffbf5a 40f271c7 4615d84c 5816ef07 b7e7a90a 5406edb1 b2b8378f 0439551d
-
-
-
-
-

inference@plus.st

-

Key

-
Smartphone
-
-
-9f9b50e4 3bb5ae5d 886213ad 43015719 7c40aa99 e436445d e0e360a9 24076015
-
-
-xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015 -
-
-
+

Contact

+
+

XMPP

+
+

Updated: 2022-10-13 (UTC+00:00)

+
+

Whenever possible, open the links to pin the fingerprint directly from this + webpage. If that is not possible, manually verify the fingerprints.

+
+

inference@inferencium.net

+

Key

+
Smartphone
+
+				
+						1bd03c6a 5e011655 2fafd697 da4fce70 63de5a83 a264a34a fcce78fe 6b06820c
+				
+		
+ xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c +
+
+
Desktop
+
+				
+						87ffbf5a 40f271c7 4615d84c 5816ef07 b7e7a90a 5406edb1 b2b8378f 0439551d
+				
+		
+
+
+

inference@plus.st

+

Key

+
Smartphone
+
+				
+						9f9b50e4 3bb5ae5d 886213ad 43015719 7c40aa99 e436445d e0e360a9 24076015
+				
+		
+ xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015 +
+
+
diff --git a/contact/key-threema.png b/img/key-threema.png similarity index 100% rename from contact/key-threema.png rename to img/key-threema.png diff --git a/contact/briar.png b/img/logo-briar.png similarity index 100% rename from contact/briar.png rename to img/logo-briar.png diff --git a/img/logo-gentoo_linux.png b/img/logo-gentoo_linux.png new file mode 100644 index 0000000..0f297d9 Binary files /dev/null and b/img/logo-gentoo_linux.png differ diff --git a/img/logo-grapheneos.png b/img/logo-grapheneos.png new file mode 100644 index 0000000..b164496 Binary files /dev/null and b/img/logo-grapheneos.png differ diff --git a/contact/pleroma.png b/img/logo-pleroma.png similarity index 100% rename from contact/pleroma.png rename to img/logo-pleroma.png diff --git a/contact/session.png b/img/logo-session.png similarity index 100% rename from contact/session.png rename to img/logo-session.png diff --git a/contact/signal.png b/img/logo-signal.png similarity index 100% rename from contact/signal.png rename to img/logo-signal.png diff --git a/contact/threema.png b/img/logo-threema.png similarity index 100% rename from contact/threema.png rename to img/logo-threema.png diff --git a/contact/twitter.png b/img/logo-twitter.png similarity index 100% rename from contact/twitter.png rename to img/logo-twitter.png diff --git a/contact/xmpp.png b/img/logo-xmpp.png similarity index 100% rename from contact/xmpp.png rename to img/logo-xmpp.png diff --git a/index.html b/index.html index 61a2c0d..78ef954 100644 --- a/index.html +++ b/index.html @@ -1,17 +1,17 @@ -Inferencium Network - + Inferencium Network + diff --git a/infnet.css b/infnet.css index b00b6f8..efb0807 100644 --- a/infnet.css +++ b/infnet.css @@ -28,7 +28,14 @@ color: #ffffff; } -.logo { +.table-link { + font-family: Roboto, sans-serif; + font-size: 16px; + color: #ffffff; + text-decoration: underline; +} + +.logo-small { transform: translate(0px, 8px); } @@ -86,3 +93,13 @@ a { color: #000000; text-decoration: none; } + +table, th, td { + border: 2px solid; + border-collapse: collapse; + border-color: #ffffff; + padding: 15px; + font-family: Roboto, sans-serif; + font-size: 16px; + color: #ffffff; +} diff --git a/source.html b/source.html index a5f4673..0a8aae9 100644 --- a/source.html +++ b/source.html @@ -1,38 +1,39 @@ -Inferencium Network - Source - + Inferencium Network - Source + -

Source

-
-

My Personal Source Code Repositories

-

These repositories contain source code which is used on my personal -systems.
-No guarantees are made that they will work correctly on your systems, and they -are not targeted towards a public release.
-Usage of these repositories is at your own risk.

-
-

- Configuration files

-

- Script files

-
-

Inferencium Network Source Code Repositories

-

These repositories contain source code targeted towards a public release and -are suitable for a wide range of systems.

-
-

- Website

-

- Gentoo - Multimedia

-
-
+

Source

+
+

My Personal Source Code Repositories

+

These repositories contain source code which is used on my personal + systems.
+ No guarantees are made that they will work correctly on your systems, and they + are not targeted towards a public release.
+ Usage of these repositories is at your own risk.

+
+

- Configuration files

+

- Script files

+
+

Inferencium Network Source Code Repositories

+

These repositories contain source code targeted towards a public release and + are suitable for a wide range of systems.

+
+

- Website

+

- Gentoo - Multimedia

+

- Graphene-chan

+
+