mirror of
https://github.com/Start9Labs/documentation.git
synced 2026-03-26 10:21:53 +00:00
More typos
This commit is contained in:
@@ -21,7 +21,7 @@ EmbassyOS refers to a custom Linux distribution along with a suite of software t
|
||||
|
||||
EmbassyOS is a forked branch of the Buster Lite version of Raspberry Pi OS. Start9 Labs augmented this base operating system to include:
|
||||
|
||||
* a custom application management layer specialized for installing, running, and backing up .s9pk packaged services
|
||||
* a custom application management layer, specialized for installing, running, and backing up .s9pk packaged services
|
||||
* a layer responsible for Embassy specific operations, such as Tor, Backups, and Notifications
|
||||
|
||||
The .s9pk extension is Start9 Labs' custom package format based on tar. It encompasses the necessary components to compress, host, and install a service on the marketplace.
|
||||
@@ -34,11 +34,11 @@ Open Source
|
||||
|
||||
The Internet itself was built on free and publicly available code, with the values of collaboration, peer review, communication, and openness built into its very foundation. This decentralized model evolved into the open source movement, which uses these values to discover new ways to solve problems across boundaries and industries.
|
||||
|
||||
Open source software centered around the concept of user freedoms: freedom to see, modify, and redistribute the code to make it work for the user in whatever way they needed. It does not necessarily mean free to use. It means that the software will be better, cheaper, and more flexible if it is freely accessible, openly modifiable, and shared.
|
||||
Open source software centered around the concept of user freedoms: freedom to see, modify, and redistribute the code to make it work for the user in whatever way they needed. It does not necessarily mean free to use. It means that the software will be better, cheaper, and more flexible if it is freely accessible, openly modifiable, and shared.
|
||||
|
||||
If anyone can inspect, modify, and distribute the code, bugs are more rapidly resolved, security vulnerabilities are more quickly audited and exposed. Community driven development efforts enable diverse collaboration which increases project reliability and longevity.
|
||||
If anyone can inspect, modify, and distribute the code, bugs are more rapidly resolved, security vulnerabilities are more quickly audited and exposed. Community driven development efforts enable diverse collaboration which increases project reliability and longevity.
|
||||
|
||||
Distinct from open source software is propriety, or closed source, software. Closed source software is strictly moderated, cannot legally be altered, copied, or distributed, and is paid for to be used as intended without modification. Only the code owners have the right to access the code.
|
||||
Distinct from open source software is proprietary, or closed source, software. Closed source software is strictly moderated, cannot legally be altered, copied, or distributed, and is paid for to be used as intended without modification. Only the code owners have the right to access the code.
|
||||
|
||||
As a company founded on the principles of freedom, every service we support is open source. We believe in contributing to the future of this vibrant and passionate ecosystem.
|
||||
|
||||
@@ -48,7 +48,7 @@ As a company founded on the principles of freedom, every service we support is o
|
||||
LAN
|
||||
===
|
||||
|
||||
A Local Area Network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
|
||||
A Local Area Network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building.
|
||||
|
||||
Devices on a LAN are private and protected, such that only devices connected to the same Ethernet or WiFi network can see or communicate with them.
|
||||
|
||||
@@ -62,13 +62,13 @@ Your Embassy hosts itself on the LAN and is reachable by visiting its *.local* U
|
||||
SSL
|
||||
===
|
||||
|
||||
Visiting websites on the Tor network is slow. We wanted to provide a better option to access the Embassy at home. That’s why we created an address for the Embassy that can be accessed on your Local Area Network.
|
||||
Visiting websites on the Tor network is slow. We wanted to provide a better option to access the Embassy at home. That’s why we created an address for the Embassy that can be accessed on your Local Area Network.
|
||||
|
||||
By default, this `.local` address is served like a regular website, over HTTP. Browser's makes it noticeable visiting a site over HTTP in the URL bar - it could be red, show an unlocked lock, or warn the connection is not secure.
|
||||
By default, this `.local` address is served like a regular website, over HTTP. Browsers make it noticeable when visiting a site over HTTP in the URL bar - it could be red, show an unlocked lock, or warn that the connection is not secure.
|
||||
|
||||
SSL certificates are what enable websites to move from HTTP to HTTPS, which increases security and makes browsers happy. Using the Secure Sockets Layer protocol, HTTPS enabled websites use certificates to establish authenticated and encrypted links between networked computers. It’s the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two devices, preventing third parties from reading and modifying any personal information transferred. They also verify ownership of a website.
|
||||
SSL certificates are what enable websites to move from HTTP to HTTPS, which increases security and makes browsers happy. Using the Secure Sockets Layer protocol, HTTPS enabled websites use certificates to establish authenticated and encrypted links between networked computers. It’s the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two devices, preventing third parties from reading and modifying any personal information transferred. They also verify ownership of a website.
|
||||
|
||||
Valid SSL certificates are typically issued and obtained from Certificate Authorities. These trusted third parties generate and distribute certificates, signing them with their trusted private key, which allows the clients who use them to verify its authenticity. Websites obtain a certificate from a CA then load it on to their website’s hosting service or server, allowing the website to load over HTTPS and have all traffic to and from the website be encrypted and secure.
|
||||
Valid SSL certificates are typically issued and obtained from Certificate Authorities. These trusted third parties generate and distribute certificates, signing them with their trusted private key, which allows the clients who use them to verify their authenticity. Websites obtain a certificate from a CA then load it onto their website’s hosting service or server, allowing the website to load over HTTPS and have all traffic to and from the website be encrypted and secure.
|
||||
|
||||
We decided to have the Embassy act as a Certificate Authority. It creates a self-signed certificate, which means that the private key used to sign the digital certificate is the Embassy’s own private key instead of a third party’s.
|
||||
|
||||
|
||||
@@ -11,7 +11,7 @@ The internet as we know it is organized into questioners, or clients, and answer
|
||||
|
||||
The Embassy is exactly that: your very own "answerer", just like Google's, except managed simply and with ease by and for you alone.
|
||||
|
||||
In other words, it is a generalized private personal server capable of running all sorts of self hosted open source software.
|
||||
In other words, it is a generalized private personal server capable of running all sorts of self hosted open source software.
|
||||
|
||||
When you see your credit card information on your banking app, your messages in your texting app, your passwords in your password management app, all of that information comes from somewhere in the cloud: some server run by some company somewhere on the planet. Who can see the data stored in that server? Who can edit it? It's not always clear, but the increasingly common practice of selling your data to advertisers and the high-profile cyber-security breaches of the last decade suggest a pessimistic outlook.
|
||||
|
||||
@@ -25,7 +25,7 @@ The Embassy runs on the Raspberry Pi 4B hardware with a Cortex-a72 CPU, 4GB of R
|
||||
|
||||
EmbassyOS is a stripped down version of Raspbian Buster Lite and handles all operations of your Embassy device. This core element of the technology stack is what enables you to set up, login, access your Embassy’s dashboard, and download and install services.
|
||||
|
||||
One of these operations is creating and managing Tor addresses, which are uniquely attributed to each service you download, as well as to the Embassy device itself. You can see your uniquely generated Tor address when you complete the setup process using the Setup App. This address is how you view your Embassy’s dashboard, which is actually just a website served up from your Embassy itself! It is authenticated, of course, so only you can access it.
|
||||
One of these operations is creating and managing Tor addresses, which are uniquely attributed to each service you download, as well as to the Embassy device itself. You can see your uniquely generated Tor address when you complete the setup process using the Setup App. This address is how you view your Embassy’s dashboard, which is actually just a website served up from your Embassy itself! It is authenticated, of course, so only you can access it.
|
||||
|
||||
In depth
|
||||
--------
|
||||
@@ -61,7 +61,7 @@ The list of services will grow rapidly over the coming months, such that many th
|
||||
Are my Internet requests anonymous and secure?
|
||||
==============================================
|
||||
|
||||
EmbassyOS and every service on the Embassy are served on their own Tor Hidden Services with unique Tor addresses. The private keys used to create these addresses are generated on your phone or computer when you first set up the Embassy. No one, not even Start9, has any idea what your Tor addresses are, let alone the password(s) you choose to authenticate with them.
|
||||
EmbassyOS and every service on the Embassy are served on their own Tor Hidden Services with unique Tor addresses. The private keys used to create these addresses are generated on your phone or computer when you first set up the Embassy. No one, not even Start9, has any idea what your Tor addresses are, let alone the password(s) you choose to authenticate with them.
|
||||
|
||||
There is also the option to communicate with your Embassy using standard :ref:`ssl` encryption and a uniquely generated `.local` address. This method is faster than Tor, but can only be used on your home network.
|
||||
|
||||
@@ -75,12 +75,12 @@ Make sure the service is started by viewing it in the Services tab in the Embass
|
||||
Can I run multiple Embassies?
|
||||
=============================
|
||||
|
||||
Yes, but there is currently no way to synchronize them. Each Embassy will be isolated from the others. In the future, we plan to enable a local mesh network so you enable features storing backup data across devices.
|
||||
Yes, but there is currently no way to synchronize them. Each Embassy will be isolated from the others. In the future, we plan to enable a local mesh network so you can store backup data across devices.
|
||||
|
||||
Is the software open source?
|
||||
============================
|
||||
|
||||
Yes! `EmbassyOS <https://github.com/Start9Labs/embassy-os>`_ is open sourced under the `Start9 Personal Use License <https://start9labs.com/license>`_.
|
||||
Yes! `EmbassyOS <https://github.com/Start9Labs/embassy-os>`_ is open sourced under the `Start9 Personal Use License <https://start9labs.com/license>`_.
|
||||
|
||||
Some of our other projects are currently open sourced under MIT. You can find these in the Start9 Labs GitHub `repository <https://github.com/Start9Labs/>`_.
|
||||
|
||||
@@ -88,9 +88,9 @@ Some of our other projects are currently open sourced under MIT. You can find th
|
||||
Is there a product warranty?
|
||||
============================
|
||||
|
||||
Yes. Start9 commits to serving each beta Embassy product released until the wild. We commit, to the best of our ability, to resolve any issue encountered with our provided hardware or software in a personalized matter until resolved.
|
||||
Yes. Start9 commits to serving each beta Embassy product released into the wild. We commit, to the best of our ability, to resolve any issue encountered with our provided hardware or software in a personalized manner until resolved.
|
||||
|
||||
Do not hesitate to :ref:`contact`. We strive to also provide quality and available customer service upfront.
|
||||
Do not hesitate to :ref:`contact`. We strive to also provide quality and available customer service upfront.
|
||||
|
||||
|
||||
Can I run EmbassyOS on a VPS or VM?
|
||||
@@ -104,4 +104,4 @@ Is it possible to DIY the EmbassyOS on my own hardware?
|
||||
|
||||
Yes! You can follow the diy guide :ref:`here <diy>`. This option is great for people who already own the necessary hardware or who live outside the US and want to save on shipping and customs fees.
|
||||
|
||||
Additionally, EmbassyOS is available to build from `source <https://github.com/Start9Labs/embassy-os>`_ under the `Start9 Personal Use License <https://start9labs.com/license>`_. If you have the time and energy, it will be possible to download and compile EmbassyOS yourself, for free, with the caveat that your "Embassy" will not have a product key generated by us. This means you will miss out on the perks that come along with purchasing from us, which will grow over time.
|
||||
Additionally, EmbassyOS is available to build from `source <https://github.com/Start9Labs/embassy-os>`_ under the `Start9 Personal Use License <https://start9labs.com/license>`_. If you have the time and energy, it is possible to download and compile EmbassyOS yourself, for free, with the caveat that your "Embassy" will not have a product key generated by us. This means you will miss out on the perks that come along with purchasing from us, which will grow over time.
|
||||
|
||||
Reference in New Issue
Block a user