diff --git a/opsec/index.html b/opsec/index.html index 73ee17c..e14fce4 100644 --- a/opsec/index.html +++ b/opsec/index.html @@ -70,6 +70,8 @@

📝 Explaining Concepts


    +
  1. ❌ The State is the Enemy
  2. +
  3. ❌ The Individual reigns Supreme, no matter what the State says.
  4. ✅ a Nihilist's Manifesto
  5. ✅ Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days
  6. ✅ Governments, Centralisation, and Law Enforcement
  7. @@ -83,6 +85,7 @@
  8. ✅ Internet usage segmentation (QEMU VMs + Identity Management)
  9. ✅ OPSEC: Using the right Technology and Behavior
  10. ✅ How to maintain multiple Identities Online
  11. +
  12. ❌ Public Chats / Private Chats / Anonymous Chats / Deniable Chats

@@ -105,6 +108,8 @@
  • ✅ Why can't I trust closed-source software for Privacy?
  • ✅ The lack of Open Source Hardware (CPUs, Motherboards, GPUs)
  • ✅ Why can't I trust Server-side Encryption ?
  • +
  • ❌ Cloudflare : The world's largest Man in the Middle
  • +
  • ❌ Why is metadata detrimental to my privacy ?
  • 💻 Getting started

      @@ -170,6 +175,7 @@
    1. ✅ What is Anonymity ? Why is it Important ?
    2. ✅ Why isn't Privacy enough for Anonymous use ?
    3. ✅ Phone Numbers are incompatible with Anonymity
    4. +
    5. ❌ Why is metadata detrimental to Anonymity ?
    6. ✅ The main source of Anonymity: The Tor Network
    7. ✅ How to use Tor Safely: (Tor + VPN combinations)
    8. @@ -181,7 +187,8 @@

    💻 Clientside Anonymity (⚠️ Check if your ISP allows Tor or Not!)

      -
    1. ❌ How to get internet access without any KYC ?
    2. + +
    3. ❌ How to obtain Internet access anonymously
    4. ✅ VMs for Long-term Anonymity (Whonix QEMU VMs)
    5. ✅ Tor Web Browser setup
    6. 🟠 How to use the Tor Browser on Mobile