new sensitive vm tutorial update

This commit is contained in:
nihilist 2025-04-02 21:05:04 +02:00
parent 20e60ff5c9
commit 0612d1844a
2 changed files with 10 additions and 1 deletions

View file

@ -313,7 +313,7 @@
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/92"></a><a href="tailsqemuvm/index.html"> Tails OS for Easy Temporary Sensitive Use</a><img src="logos/tails.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/92"></a><a href="tailsqemuvm/index.html"> Tails OS for Easy Temporary Sensitive Use</a><img src="logos/tails.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/160"></a><a href="livemode/index.html"> Using the Host-OS in live-mode to enable Sensitive Use</a><img src="logos/kicksecure.png" class="logo"><img src="logos/poweroff.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/160"></a><a href="livemode/index.html"> Using the Host-OS in live-mode to enable Sensitive Use</a><img src="logos/kicksecure.png" class="logo"><img src="logos/poweroff.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/255"></a><a href="veracrypt/index.html"> The main source of Plausible Deniability: Deniable Encryption</a><img src="logos/veracrypt.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/255"></a><a href="veracrypt/index.html"> The main source of Plausible Deniability: Deniable Encryption</a><img src="logos/veracrypt.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/256">🚧</a><a href="sensitivevm/index.html"> Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐</a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/whonix.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/256"></a><a href="sensitivevm/index.html"> Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐</a><img src="logos/poweroff.png" class="logo"><img src="logos/veracrypt.png" class="logo"><img src="logos/whonix.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/130">🚧</a><a href="plausiblydeniabledataprotection/index.html"> Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li> <li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/130">🚧</a><a href="plausiblydeniabledataprotection/index.html"> Plausibly Deniable Critical Data Backups</a><img src="logos/veracrypt.png" class="logo"></li>
</ol></br> </ol></br>
<p>💻 Steganography - Hiding secrets in plain sight</p> <p>💻 Steganography - Hiding secrets in plain sight</p>

View file

@ -9,6 +9,14 @@
<description>Nihilist`s Technical Blog</description> <description>Nihilist`s Technical Blog</description>
<atom:link href='https://blog.nihilism.network/rss/feed.xml' rel='self' type='application/rss+xml' /> <atom:link href='https://blog.nihilism.network/rss/feed.xml' rel='self' type='application/rss+xml' />
<item>
<title>Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) (April 2025 Update)</title>
<link>http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/sensitivevm/index.html</link>
<guid isPermaLink='false'></guid>
<description>In this tutorial we're going to cover how to setup Whonix VMs for Sensitive use. This means that our OPSEC requirement is that we need to be able to deny the existance of the Sensitive Whonix VM if the adversary ever gets access to our laptop.</description>
</item>
<item> <item>
<title>The main source of Plausible Deniability: Deniable Encryption (April 2025 update)</title> <title>The main source of Plausible Deniability: Deniable Encryption (April 2025 update)</title>
<link>http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/veracrypt/index.html</link> <link>http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/veracrypt/index.html</link>
@ -919,6 +927,7 @@
</channel> </channel>