listed the new tutorials

This commit is contained in:
nihilist 2025-03-02 11:56:22 +01:00
parent dabc06f9fb
commit 09da7b3b4f

View file

@ -70,6 +70,8 @@
<p>📝 Explaining Concepts</p></br>
<ol>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/235">❌ The State is the Enemy</a></li>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/236">❌ The Individual reigns Supreme, no matter what the State says.</a></li>
<li><a href="manifesto/index.html">✅ a Nihilist's Manifesto</a></li>
<li><a href="aps/index.html">✅ Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days</a><img src="logos/ce2.png" class="logo"><img src="logos/ce1.png" class="logo"><img src="logos/ce0.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="governments/index.html">✅ Governments, Centralisation, and Law Enforcement</a><img src="logos/ce2.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/on2.png" class="logo"></li>
@ -83,6 +85,7 @@
<li><a href="internetsegmentation/index.html">✅ Internet usage segmentation (QEMU VMs + Identity Management)</a><img src="logos/kvm.png" class="logo"><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="opsec/index.html">✅ OPSEC: Using the right Technology and Behavior </a><img src="logos/su2.png" class="logo"><img src="logos/su0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/de0.png" class="logo"></li>
<li><a href="multiple_identities/index.html">✅ How to maintain multiple Identities Online</a><img src="logos/on0.png" class="logo"></li>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/232">❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats</a></li>
</ol></br>
@ -105,6 +108,8 @@
<li><a href="closedsource/index.html">✅ Why can't I trust closed-source software for Privacy? </a><img src="logos/tr0.png" class="logo"></li>
<li><a href="openhardware/index.html">✅ The lack of Open Source Hardware (CPUs, Motherboards, GPUs)<img src="logos/openhw.png" class="logo"></a></li>
<li><a href="serversideencryption/index.html">✅ Why can't I trust Server-side Encryption ?</a><img src="logos/gnupg.png" class="logo"></li>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/215">❌ Cloudflare : The world's largest Man in the Middle</a></li>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/212">❌ Why is metadata detrimental to my privacy ?</a></li>
</ol>
<p>💻 Getting started</p>
<ol>
@ -170,6 +175,7 @@
<li><a href="anonymityexplained/index.html">✅ What is Anonymity ? Why is it Important ? </a><img src="logos/on0.png" class="logo"></li>
<li><a href="anonuse/index.html">✅ Why isn't Privacy enough for Anonymous use ? </a><img src="logos/su0.png" class="logo"><img src="logos/on2.png" class="logo"></li>
<li><a href="phonenumbers/index.html">✅ Phone Numbers are incompatible with Anonymity</a><img src="logos/on2.png" class="logo"><img src="logos/sim.png" class="logo"></li>
<li><a href="git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/237">❌ Why is metadata detrimental to Anonymity ?</a></li>
<li><a href="torvsvpns/index.html">✅ The main source of Anonymity: The Tor Network</a><img src="logos/ce0.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="torthroughvpn/index.html">✅ How to use Tor Safely: (Tor + VPN combinations)</a><img src="logos/su0.png" class="logo"><img src="logos/mullvad.png" class="logo"><img src="logos/on0.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
@ -181,7 +187,8 @@
</ol></br>
<p>💻 Clientside Anonymity (<a href="torthroughvpn/index.html">⚠️ Check if your ISP allows Tor or Not!</a>)</p>
<ol>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/170">❌ How to get internet access without any KYC ?</a><img src="logos/wan.png" class="logo"></li>
<li><a href="http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/170">❌ How to obtain Internet access anonymously</a><img src="logos/wan.png" class="logo"></li>
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a><img src="logos/kvm.png" class="logo"><img src="logos/whonix.png" class="logo"><img src="logos/Tor.png" class="logo"></li>
<li><a href="torbrowsing/index.html">✅ Tor Web Browser setup</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>
<li><a href="MobileTor/index.html">🟠 How to use the Tor Browser on Mobile</a><img src="logos/Tor.png" class="logo"><img src="logos/torbrowser.png" class="logo"></li>