Commit 95b1353d authored by Tad's avatar Tad
Browse files

Typos

parent f9b7fa13
......@@ -42,7 +42,7 @@
<li>GrapheneOS is a trademark of the GrapheneOS Project</li>
<li>CopperheadOS is a trademark of Copperhead Limited (87236999)</li>
<li>Mozilla Firefox is a trademark of The Mozilla Foundation</li>
<li>Tor is a tradmark of The Tor Project, Inc. (3465432)</li>
<li>Tor is a trademark of The Tor Project, Inc. (3465432)</li>
<li>Divested Computing Group is not affiliated with Google, AOSP, LineageOS, Mozilla, Cisco, The Linux Foundation, or The Tor Project</li>
<li>DivestOS is not sponsored or endorsed by Google, AOSP, or LineageOS</li>
<li>Mull is not sponsored or endorsed by Mozilla</li>
......@@ -79,7 +79,7 @@
<li>postmarketOS: <a href="https://gitlab.com/postmarketOS/pmaports/-/issues/213" target="_blank" rel="nofollow noopener noreferrer">blob removal</a></li>
<li>Replicant: Related work for the removal of the proprietary AmbientSDK blob <a href="https://lists.osuosl.org/pipermail/replicant/2020-November/003138.html" target="_blank" rel="nofollow noopener noreferrer">1</a> and <a href="https://git.replicant.us/replicant/packages_apps_Contacts/tag/?h=cm-13-before-ambientsdk" target="_blank" rel="nofollow noopener noreferrer">2</a></li>
</ul>
<p>Work that we never attemped to upstream:</p>
<p>Work that we never attempted to upstream:</p>
<ul>
<li>Remove proprietary libraries: <a href="https://gist.github.com/SkewedZeppelin/504bfde878ab6f195f3b75c427828c8c" target="_blank" rel="nofollow noopener noreferrer">AnySoftKeyboard</a>, <a href="https://gist.github.com/SkewedZeppelin/0f7fe63664f8dc6adf8b5e49c45dbb11" target="_blank" rel="nofollow noopener noreferrer">D-Sub</a>, Muzei, <a href="https://gist.github.com/SkewedZeppelin/123d4551ecc7a6e4c95692f696b69984" target="_blank" rel="nofollow noopener noreferrer">Substratum</a></li>
<li>RedReader: <a href="https://gist.github.com/SkewedZeppelin/9b2a63e7cc6c68f873e85a0cbbf26609" target="_blank" rel="nofollow noopener noreferrer">WebView hardening</a></li>
......
......@@ -142,7 +142,7 @@
<div class="section" id="heimdall">
<h3>Heimdall<a href="#heimdall"></a></h3>
<ul>
<li>Devices Supported: SelectSamsung devices</li>
<li>Devices Supported: Select Samsung devices</li>
<ol>
<li>[TO BE COMPLETED]</li>
</ol>
......
......@@ -9,7 +9,7 @@
<li>Devices using 'encryptable=footer' in their fstab will not be encrypted by default. [patcher]</li>
<li>Devices with 1GB of RAM or less will likely out-of-memory more often than usual. [slub_debug fragmentation?]<a href="https://forum.f-droid.org/t/divestos-an-aftermarket-system/10105/64" target="_blank" rel="nofollow noopener noreferrer">[report]</a></li>
<li>IMS may or may not work. [upstream? deblobber?]</li>
<li>Incremental updates will often fail to successfuly apply on non A/B devices. [releasetools]</li>
<li>Incremental updates will often fail to successfully apply on non A/B devices. [releasetools]</li>
<li>MediaProvider error toast on some boots. [permission whitelist?]<a href="https://gitlab.com/divested-mobile/divestos-build/-/issues/3" target="_blank" rel="nofollow noopener noreferrer">[tracking]</a></li>
<li>Most devices will take longer to acquire a GPS lock. Please test using GPSTest app with *clear* and *direct* line of sky. [deblobber]<a href="https://f-droid.org/en/packages/com.android.gpstest.osmdroid" target="_blank" rel="nofollow noopener noreferrer">[link]</a></li>
<li>Recovery will not be updated on each boot on 14.1. [upstream]</li>
......@@ -71,7 +71,7 @@
<ul>
<li>Camera is non-functional. [upstream blobs?]</li>
<li>Encryption is not supported. [upstream device tree?]</li>
<li>GPS is non-funtional. [deblobber]</li>
<li>GPS is non-functional. [deblobber]</li>
</ul>
<h4 id="shamu">shamu<a href="#shamu"></a></h4>
<ul>
......
......@@ -57,7 +57,7 @@
<p>Many carriers are phasing out their 2G/3G cell towers. Soon it will only be possible to make calls using VoLTE.</p>
<h4 id="networkOnly">Should I use the 'XG only' network mode option (if available)?<a href="#networkOnly"></a></h4>
<p>2G has no encryption, 3G has decent encryption, and LTE has end-to-end encryption (simplified, 3G and LTE still have many leaks). Malicious cell interception devices capable of intercepting 3G/LTE are very expensive kits, so the lesser ones downgrade you to 2G where they can work. These network modes offer enhanched protection against interception by pinning to a mode. As always there are various other ways for your device to be compromised or to have your data intercepted.</p>
<p>2G has no encryption, 3G has decent encryption, and LTE has end-to-end encryption (simplified, 3G and LTE still have many leaks). Malicious cell interception devices capable of intercepting 3G/LTE are very expensive kits, so the lesser ones downgrade you to 2G where they can work. These network modes offer enhanced protection against interception by pinning to a mode. As always there are various other ways for your device to be compromised or to have your data intercepted.</p>
<p>Which to use? If your device has VoLTE available, you should choose 'LTE only'. If it has LTE but you can make calls over 3G, choose 'LTE/3G only'. If it does not have LTE, but can make calls over 3G, choose '3G only'. If you can't make calls over 3G, you will sadly have to use the regular LTE or 3G modes (which happily downgrade to 2G).</p>
<h4 id="dns">Why haven't you completely changed the default DNS servers?<a href="#dns"></a></h4>
......
......@@ -23,7 +23,7 @@
</div>
<div class="card centero large" id="hypatia">
<h3>Malware Scanner<a href="#hypatia"></a></h3>
<p>We created Hypatia, the first ever open source realtime malware scanner for Android. Backed by the standard and trusted <a href="https://www.clamav.net/" target="_blank" rel="nofollow noopener noreferrer">ClamAV</a> signatures, it can detect over 690k malware signatures.</p>
<p>We created Hypatia, the first ever open source real-time malware scanner for Android. Backed by the standard and trusted <a href="https://www.clamav.net/" target="_blank" rel="nofollow noopener noreferrer">ClamAV</a> signatures, it can detect over 690k malware signatures.</p>
</div>
<div class="card centero large" id="mull">
<h3>Privacy Oriented Browser<a href="#mull"></a></h3>
......
......@@ -7,19 +7,19 @@
<ul>
<li>November and December ASB builds have been released.</li>
<li>Mull is now on its 3rd Fenix based release, with the latest 84.1.0. Huge thanks to @relan for their build scripts. <a href="https://gitlab.com/divested-mobile/mull-fenix" target="_blank" rel="nofollow noopener noreferrer">repo link</a></li>
<li>Hypatia has been updated to show database release/update dates in addition to a multithreading fix.</li>
<li>Hypatia has been updated to show database release/update dates in addition to a multi-threading fix.</li>
<li>Etar is now used for the calendar app across all versions.</li>
<li>A handful of more proprietary blob variants have been removed.</li>
<li>Vendor build fingerprints are now all replaced.</li>
<li>Lots of miscellaneous fixes and cleanup.</li>
<li>All 15.1 builds and higher are now fully dexpreopted, this allows for reduced memory usage and also decreased boot times on FDE devices.</li>
<li>TCP SACK is no longer disabled. SACK PANIC has now been patched on nearly all kernels supported. It has vaulable bandwidth saving benefits.</li>
<li>TCP SACK is no longer disabled. SACK PANIC has now been patched on nearly all kernels supported. It has valuable bandwidth saving benefits.</li>
<li>There have been many new CVE patches, especially for 3.18 kernels.</li>
</ul>
<h4>Roster Updates</h4>
<ul>
<li>clark has been updated from 14.1 to 17.1 (potential modem issues). In-place upgrade to work, but your mileage may vary.</li>
<li>flo has been updated from 15.1 to 17.1, but requires repartitioning.</li>
<li>flo has been updated from 15.1 to 17.1, but requires re-partitioning.</li>
<li>cheeseburger/dumpling are compiling for 17.1, but not booting.</li>
<li>coral and flame 17.1 builds are available (untested).</li>
<li>rs988 and h990 17.1 builds are available (untested).</li>
......@@ -56,7 +56,7 @@
<li>Most 3.18 devices should expect 10-40 more kernel CVE patches. <a href="https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/-/commit/5a07867289e1236fd35c894860abca79b9ce402f" target="_blank" rel="nofollow noopener noreferrer">git commit</a></li>
<li>A handful of other kernel CVE patches are available for all other devices as per usual.</li>
<li>Lots of work has been done on making the CVE patcher easier for other projects to use. <a href="https://gitlab.com/divested-mobile/cve_checker" target="_blank" rel="nofollow noopener noreferrer">repo link</a></li>
<li>Mull is now severly out of date. There hasn't been the time to rebase it. It is strongly suggested to use Bromite or the new Fennec F-Droid until then. Bromite repo is already included in DivestOS F-Droid.</li>
<li>Mull is now severely out of date. There hasn't been the time to rebase it. It is strongly suggested to use Bromite or the new Fennec F-Droid until then. Bromite repo is already included in DivestOS F-Droid.</li>
<li>victara build failed last month due to recovery image being too large, however it is now once again available.</li>
<li>h850 and zenfone3 builds have been pulled as they were last updated in 2018 and 2019 respectively.</li>
<li>[Upstream] Updated to October security bulletin.</li>
......@@ -84,7 +84,7 @@
<li>2020/12/21: The umask for the build scripts was adjusted, fixing many small issues.</li>
<li>2020/12/11: All non-LTS Linux CVE patches were dropped from the repository.</li>
<li>2020/11/06: Added many missing Linux CVE patches missed by the CIP scripts from Debian retired tracker.</li>
<li>2020/10/22: Mull was rebased onto Fenix, built on top of much effort from Relan.</li>
<li>2020/10/22: Mull was rebased onto Fenix, based on top of much effort from Relan.</li>
<li>2020/10/15: A critical issue was identified and resolved that affected many devices. It caused slow performance and boot issues. Originally introduced 2018/10/01.</li>
<li>2020/10/11: Initial inclusion of Etar for Calendar.</li>
<li>2020/10/06: Added many Linux 3.4 CVE patches thanks to @haggertk.</li>
......@@ -92,10 +92,10 @@
<li>2020/08/07: Initial import of Linux CVE patches from the Civil Infrastructure Platform tracker.</li>
<li>2020/06/17: The start of providing GPG signatures for all builds.</li>
<li>2020/06/14: The CodeAurora CVE patch list was created.</li>
<li>2020/06/12: DivestOS is publically released, initially on the F-Droid Forum.</li>
<li>2020/06/12: DivestOS is publicly released, initially on the F-Droid Forum.</li>
<li>2020/06/07: The AOSP CVE patch list was created.</li>
<li>2020/04/14: Initial support for building on top of LineageOS 17.1.</li>
<li>2019/10/18: Automated kernel hardening via command line arguments was introducted.</li>
<li>2019/10/18: Automated kernel hardening via command line arguments was introduced.</li>
<li>2019/10/04: Initial import of Linux CVE patches from the Google Project Zero tracker.</li>
<li>2019/09/25: Most signing keys were switched to RSA-4096.</li>
<li>2019/09/13: Per-device signing keys were introduced.</li>
......@@ -127,28 +127,28 @@
<li>2018/04/28: Initial patches to support DNS66 loading defaults from system.</li>
<li>2018/04/01: The proprietary LOSCoins malware was removed before ever being included in DivestOS.</li>
<li>2018/03/13: The PrebuiltApps repo was created for including official/F-Droid builds of apps.</li>
<li>2018/03/08: F-Droid approved the inclusion of F-Droid into the system.</li>
<li>2018/03/04: LineageOS approved the rebranding was sufficient.</li>
<li>2018/03/08: F-Droid signed-off on the inclusion of F-Droid into the system.</li>
<li>2018/03/04: LineageOS signed-off on the re-branding being sufficient.</li>
<li>2018/02/13: Initial support for building on top of LineageOS 15.1</li>
<li>2018/01/04: Very basic Spectre mitigations were automatically applied to 3.10 kernels.</li>
<li>2018/01/03: Very basic Spectre mitigations were applied to Mull.</li>
<li>2017/12/25: Mull came into existance.</li>
<li>2017/12/13: Veritas, now called Hypatia, was created as the first FOSS realtime malware scanner for Android systems.</li>
<li>2017/12/25: Mull came into existence.</li>
<li>2017/12/13: Veritas, now called Hypatia, was created as the first FOSS real-time malware scanner for Android systems.</li>
<li>2017/12/09: Automatic kernel hardening via defconfig overrides was introduced.</li>
<li>2017/11/21: Initial work on building Firefox for Android without blobs began.</li>
<li>2017/11/11: A script for deblobbing separate /firmware partitions was created.</li>
<li>2017/11/10: Initial automatic applying of Linux incrementals.</li>
<li>2017/11/07: Creation of our initial original Linux CVE patch list.</li>
<li>2017/11/02: Initial versioning of CVE patches to reduce breakage.</li>
<li>2017/10/30: Utilzing the new CVE patcher, all devices were mitigated against KRACK.</li>
<li>2017/10/30: Utilizing the new CVE patcher, all devices were mitigated against KRACK.</li>
<li>2017/10/29: Introduction of automatic kernel CVE patching for all devices.</li>
<li>2017/10/29: The CVE downloader/patcher project was created.</li>
<li>2017/10/14: The repositories were relicensed GPLv3.</li>
<li>2017/10/14: The repositories were re-licensed to GPLv3.</li>
<li>2017/09/10: Extirpater saw its initial port to Android.</li>
<li>2017/08/01: A commit references a patch made four years earlier? Not too sure about this one.</li>
<li>2017/06/15: Silence was included in the images.</li>
<li>2017/06/04: Start of work on automated kernel CVE patching.</li>
<li>2017/06/04: The project was rebranded into DivestOS.</li>
<li>2017/06/04: The project was re-branded into DivestOS.</li>
<li>2017/05/30: OTA updates became supported.</li>
<li>2017/02/25: The dedicated website was created.</li>
<li>2017/01/25: The first revision of our automated deblobber was created.</li>
......@@ -161,9 +161,9 @@
<li>2016/03/03: Earliest recorded date of our UnifiedNLP backend, MergedWiFiNLP, utilizing simple CSV files.</li>
<li>2016/01/01: Public images were discontinued.</li>
<li>2015/11/20: First builds signed using proper release-keys.</li>
<li>2015/11/19: A PaX enabled kernel is sucessfully booted on bacon, with help from Daniel Micay.</li>
<li>2015/11/19: A PaX enabled kernel is successfully booted on bacon, based on work and with help from Daniel Micay.</li>
<li>2015/04/01: Our first CyanogenMod 12.1 based images made available.</li>
<li>2014/12/31: The earliest recorded date of publically offering custom images. They were based off of CyanogenMod 12 and available for five devices.</li>
<li>2014/12/31: The earliest recorded date of publicly offering custom images. They were based off of CyanogenMod 12 and available for five devices.</li>
</ul>
</div>
</div>
......@@ -3,7 +3,7 @@
<p>All of the following apps are FOSS and are available via our F-Droid repo. If you are running DivestOS the repo is already added. For others the repo information is available <a href="index.php?page=extras#Repos">here</a>.</p>
<div class="section" id="hypatia">
<h3>Hypatia (GPLv3)<a href="#hypatia"></a></h3>
<p>The first open source realtime malware scanner for Android. Powered by the standard ClamAV signatures, over 690k malware signatures can be detected. Realtime scanning can scan average sized files in 5-40ms and has a near zero impact on device performance and battery life. All operations are done locally on the device; Internet is only used to download signature databases, your files or their metadata will never be uploaded anywhere.</p>
<p>The first open source real-time malware scanner for Android. Powered by the standard ClamAV signatures, over 690k malware signatures can be detected. Real-time scanning can scan average sized files in 5-40ms and has a near zero impact on device performance and battery life. All operations are done locally on the device; Internet is only used to download signature databases, your files or their metadata will never be uploaded anywhere.</p>
</div>
<div class="section" id="extirpater">
<h3>Extirpater (GPLv3)<a href="#extirpater"></a></h3>
......
......@@ -5,7 +5,7 @@
<h3 id="messengers">On Messaging Apps</h3>
<p>Please see the messaging tables page <a href="index.php?page=messengers">here</a></p>
<h3 id="keyboards">On Keyboard Apps</h3>
<p>Do not ever use any keyboard apps that are proprietary and/or require network permission. It doesn't matter how great that autocomplete is, its garbage if its sending everything you type to a server somewhere just to be data mined. It doesn't even matter if it has a "good" privacy policy or if you trust the creator, sending it away incurs the chance of being intercepted by a less trusted party.</p>
<p>Do not ever use any keyboard apps that are proprietary and/or require network permission. It doesn't matter how great that auto-complete is, its garbage if its sending everything you type to a server somewhere just to be data mined. It doesn't even matter if it has a "good" privacy policy or if you trust the creator, sending it away incurs the chance of being intercepted by a less trusted party.</p>
<h3 id="keyboards">On Web Browsers</h3>
<p>Please see the browser tables page <a href="index.php?page=browsers">here</a></p>
......
......@@ -15,7 +15,7 @@
<p>Will continually use data while running.</p>
<h4 id="Chromium">Chromium</h4>
<p>Enabling the 'Data saver' feature routes ALL HTTP (non encrypted) traffic through Google's proprietary compression proxy servers. It also sends the 'Save-Data' HTTP header with all HTTPS connections. Usage of this feature is NOT recommended due to the insane privacy tradeoff.</p>
<p>Enabling the 'Data saver' feature routes ALL HTTP (non encrypted) traffic through Google's proprietary compression proxy servers. It also sends the 'Save-Data' HTTP header with all HTTPS connections. Usage of this feature is NOT recommended due to the insane privacy trade-off.</p>
<h4 id="Conversations">Conversations</h4>
<ul>
......@@ -46,7 +46,7 @@
<ul>
<li>Restrict image loading: Settings > Advanced > Show images</li>
<li>Downloading of fonts can be disabled: Settings > Advanced</li>
<li>Autoplay of media can be disabled: Settings > Advanced</li>
<li>Auto-play of media can be disabled: Settings > Advanced</li>
<li>Enable Tracking Protection: Settings > Privacy</li>
<li>[3rdParty] Install 'uBlock Origin' add-on to prevent loading of trackers/ads.</li>
<li>[3rdParty] Install 'Decentraleyes' add-on to load commonly used JavaScript libraries from disk.</li>
......@@ -62,7 +62,7 @@
</ul>
<h4 id="Forecastie">Forecastie</h4>
<p>Backround updates can be disabled.</p>
<p>Background updates can be disabled.</p>
<h4 id="FOSS_Browser">FOSS Browser</h4>
<ul>
......@@ -173,7 +173,7 @@
<li>Images can be disabled.</li>
<li>Stats can be disabled.</li>
<li>Note: the data saver/mobile detection seems to be broken.</li>
<li>Consider using Kiwix with an offiline 'Wikipedia Simple' database (400MB) and only using the Wikipedia app to supplement.</li>
<li>Consider using Kiwix with an offline 'Wikipedia Simple' database (400MB) and only using the Wikipedia app to supplement.</li>
</ul>
</div>
</div>
......@@ -47,7 +47,7 @@
<li>Theme.sh (14.1 only) is executed, this changes the teal accents to orange ones</li>
</ul>
<h4 id="changes">The Changes<a href="#changes"></a></h4>
<p>We currently support LineageOS 11.0 (KitKat), 14.1 (Nougat), 15.1 (Oreo), 16.0 (Pie), and 17.1 (Q). We try our best to ensure parity between them, but 11.0 is missing a number of features and isn't recommened unless necessary.</p>
<p>We currently support LineageOS 11.0 (KitKat), 14.1 (Nougat), 15.1 (Oreo), 16.0 (Pie), and 17.1 (Q). We try our best to ensure parity between them, but 11.0 is missing a number of features and isn't recommended unless necessary.</p>
<h5 id="includedApps">Included Apps<a href="#includedApps"></a></h5>
<ul>
<li>Mull: A browser hardened against trackers by default. Replaces AOSP Browser/LineageOS Jelly</li>
......@@ -59,7 +59,7 @@
<li>OpenCamera: An improved camera app. Replaces Camera2/Snap</li>
<li>Silence: An improved SMS app that allows for end-to-end encrypted messages between other Silence users. Replaces AOSP Messaging</li>
<li>Simple Gallery: An improved gallery app. Replaces AOSP Gallery</li>
<li>Vanilla: A lighweight and customizable music player. Replaces Eleven/Music</li>
<li>Vanilla: A lightweight and customizable music player. Replaces Eleven/Music</li>
</ul>
</div>
</div>
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment