README.md (700 lines): - Three-tier deployment model with ASCII diagram - Federation blueprint in web UI routes - deploy/ directory in architecture tree - Documentation index linking all guides CLAUDE.md (256 lines): - Updated architecture tree with all new docs and deploy files New guides: - docs/federation.md (317 lines) — gossip protocol mechanics, peer setup, trust filtering, offline bundles, relay deployment, jurisdiction - docs/evidence-guide.md (283 lines) — evidence packages, cold archives, selective disclosure, chain anchoring, legal discovery workflow - docs/source-dropbox.md (220 lines) — token management, client-side hashing, extract-then-strip pipeline, receipt mechanics, opsec - docs/index.md — documentation hub linking all guides Training materials: - docs/training/reporter-quickstart.md (105 lines) — printable one-page card: boot USB, attest photo, encode message, check-in, emergency - docs/training/emergency-card.md (79 lines) — wallet-sized laminated card: three destruction methods, 10-step order, key contacts - docs/training/admin-reference.md (219 lines) — deployment tiers, CLI tables, backup checklist, hardening checklist, troubleshooting Also includes existing architecture docs from the original repos. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
3.3 KiB
Reporter Quick-Start Card
Audience: Field reporters using a SooSeF Tier 1 bootable USB device. No technical background assumed.
Print this page on a single sheet, laminate it, and keep it with the USB stick.
Getting Started
- Plug the USB into any laptop
- Boot from USB (press F12 during startup, select the USB drive)
- Enter your passphrase when the blue screen appears (this unlocks your data)
- Wait for the browser to open automatically
You are now running SooSeF. The laptop's own hard drive is never touched.
Taking and Attesting a Photo
- Transfer your photo to the laptop (USB cable, SD card, AirDrop, etc.)
- In the browser, click Attest
- Select your photo and click Sign
- The photo is now cryptographically signed with your identity
This proves you took this photo, where, and when. It cannot be forged later.
Hiding a Message in a Photo
- Click Encode in the browser
- Select a carrier image (the photo that will carry the hidden message)
- Select a reference photo (a photo both you and the recipient have)
- Type your message
- Enter your passphrase and PIN (the recipient needs the same ones)
- Click Encode
To send via WhatsApp, Signal, or Telegram, select the platform from the Transport dropdown before encoding. This ensures the message survives the platform's image compression.
Checking In (Dead Man's Switch)
If your admin has enabled the dead man's switch, you must check in regularly.
- Click Fieldkit in the browser
- Click Check In
Or from a terminal:
soosef fieldkit checkin
If you miss your check-in window, the system will destroy all data after the grace period.
If you are unable to check in, contact your editor immediately.
Emergency: Destroying All Data
If you believe the device will be seized:
- Pull the USB stick -- the laptop retains nothing
- If you cannot pull the USB: click Fieldkit then Emergency Purge and
confirm with
CONFIRM-PURGE
Everything is gone. Keys, photos, attestations, messages -- all destroyed.
Shutting Down
- Close the browser
- Pull the USB stick
The laptop returns to its normal state. No trace of SooSeF remains.
Troubleshooting
| Problem | Solution |
|---|---|
| Laptop does not boot from USB | Press F12 (or F2, Del) during startup to enter boot menu. Select the USB drive. Disable Secure Boot in BIOS if needed. |
| "Certificate warning" in browser | Normal for self-signed certificates. Click "Advanced" then "Accept the risk" or "Proceed." |
| Cannot connect to web UI | Wait 30 seconds after boot. Try refreshing the browser. The URL is https://127.0.0.1:5000. |
| Forgot passphrase or PIN | You cannot recover encrypted data without the correct passphrase and PIN. Contact your admin. |
| USB stick lost or broken | Get a new USB from your admin. If you had a backup, they can restore your keys onto the new stick. |
Key Rules
- Never leave the USB in an unattended laptop
- Check in on time if the dead man's switch is enabled
- Back up your USB -- your admin can help with this
- Verify fingerprints before trusting a collaborator's key
- Use transport-aware encoding when sending stego images through messaging apps