mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
updatd list of tutorials, with latest brainstorm
This commit is contained in:
parent
027cc32a25
commit
60595ecb63
3 changed files with 42 additions and 20 deletions
|
@ -114,7 +114,11 @@
|
|||
</ol></br>
|
||||
|
||||
|
||||
|
||||
<p>💻 File Sharing</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ One on One large file sharing (Syncthing over VPN)</a></li>
|
||||
<li><a href="index.html">❌ P2P large file sharing (Torrents over VPN)</a></li>
|
||||
</ol></br>
|
||||
</div>
|
||||
<div style="float: right; width: 50%;">
|
||||
<p>💻 Privacy means Open Source (FOSS)</p>
|
||||
|
@ -127,6 +131,7 @@
|
|||
<li><a href="serversideencryption/index.html">✅ Serverside: Should I trust serverside encryption? Should I use PGP?</a></li>
|
||||
<li><a href="pgp/index.html">✅ Private Messaging (PGP encryption)</a></li>
|
||||
</ol></br>
|
||||
|
||||
<p>⚠️ Miscellaneous - In real life</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ Hide the contents of a mail package</a></li>
|
||||
|
@ -154,8 +159,8 @@
|
|||
<li><a href="anonuse/index.html">✅ Why isn't Privacy enough for Anonymous use ? </a></li>
|
||||
<li><a href="torvsvpns/index.html">✅ The main source of Anonymity: The Tor Network</a></li>
|
||||
<li><a href="torthroughvpn/index.html">✅ Using Tor Safely: Tor through VPN or VPN through Tor ? </a></li>
|
||||
<li><a href="anonpersona/index.html">🟠 Shifting from a public to an Anonymous online persona</a></li>
|
||||
<li><a href="phonenumbers/index.html">🟠 Phone Numbers are incompatible with Anonymity</a></li>
|
||||
<li><a href="index.html">❌ Stylography protection (Running a Local LLM and copy pasting messages)</a></li>
|
||||
|
||||
</ol></br>
|
||||
<p>💻 Clientside - Getting Started (<a href="torthroughvpn/index.html">⚠️ Check if your ISP allows Tor or Not!</a>)</p>
|
||||
|
@ -164,10 +169,15 @@
|
|||
<li><a href="MobileTor/index.html">✅ How to use the Tor Browser on Mobile</a></li>
|
||||
<li><a href="tailsqemuvm/index.html">✅ Tails OS QEMU VM for Temporary Anonymity</a></li>
|
||||
<li><a href="whonixqemuvms/index.html">✅ VMs for Long-term Anonymity (Whonix QEMU VMs)</a></li>
|
||||
<li><a href="index.html">❌ How to send files Anonymously (Onionshare)</a></li>
|
||||
|
||||
</ol></br>
|
||||
|
||||
<p>💻 File Sharing</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ How to send small files Anonymously (Onionshare)</a></li>
|
||||
<li><a href="index.html">❌ One on One large file sharing (Syncthing over Tor)</a></li>
|
||||
<li><a href="index.html">❌ P2P large file sharing (Torrents over i2p or Tor)</a></li>
|
||||
</ol></br>
|
||||
|
||||
|
||||
<p>💻 Clientside - Decentralized Finances ⭐</p>
|
||||
|
@ -261,27 +271,15 @@
|
|||
<ol>
|
||||
<li><a href="encryption/index.html">✅ What is Plausible Deniability ? Why is it Important ?</a></li>
|
||||
<li><a href="anonsensitive/index.html">✅ Why Anonymity isn’t enough for Sensitive use ? </a></li>
|
||||
<li><a href="index.html">❌ The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
|
||||
<li><a href="sensitiveremotevshome/index.html">🟠 Sensitive Services: Self-Host or Host Remotely ?</a></li>
|
||||
</ol></br>
|
||||
|
||||
<p>💻 Clientside - Getting Started </p>
|
||||
<ol>
|
||||
<li><a href="veracrypt/index.html">✅ Plausible Deniability (Veracrypt Hidden Partition)</a></li>
|
||||
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Protection</a></li>
|
||||
<li><a href="veracrypt/index.html">✅ The main source of Plausible Deniability: Veracrypt Hidden Partitions</a></li>
|
||||
<li><a href="plausiblydeniabledataprotection/index.html">✅ Plausibly Deniable Critical Data Backups</a></li>
|
||||
<li><a href="anonymity/index.html">🟠 Plausibly Deniable Anonymity VMs (Whonix VMs in a Hidden Volume)⭐</a></li>
|
||||
</ol></br>
|
||||
</div>
|
||||
<div style="float: right; width: 50%;">
|
||||
|
||||
<p>🧅 Serverside - Protecting Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
|
||||
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
|
||||
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
|
||||
<li><a href="physicalsecurity/index.html">✅ Physical Protection for an .onion Service (SSH + USB + Physical intrusion detection, automatic mail notifications, emergency shutdowns)</a></li>
|
||||
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF service + Captcha) ⭐</a></li>
|
||||
</ol></br>
|
||||
<p>💻 Steganography - Hiding secrets in plain sight</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ Other sources of Plausible Deniability: Steganography</a></li>
|
||||
|
@ -289,6 +287,30 @@
|
|||
<li><a href="anonzulucrypt/index.html">✅ Hiding entire zipfiles into videofiles files (zulucrypt)</a></li>
|
||||
</ol></br>
|
||||
|
||||
</div>
|
||||
|
||||
<div style="float: right; width: 50%;">
|
||||
|
||||
<p>🧅 Serverside - Plausible Deniability at Home (⚠️ <a href="sensitiveremotevshome/index.html">Self Hosting = Risky!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="pf_virt/index.html">✅ Open source router VM setup (pfsense on QEMU/KVM)</a></li>
|
||||
<li><a href="failovers/index.html">✅ Electrical Failover (basic UPS setup)</a></li>
|
||||
<li><a href="failover-wan/index.html">✅ Internet Failover (Dual WAN pfsense setup)</a></li>
|
||||
<li><a href="index.html">❌ Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service)</a></li>
|
||||
<li><a href="physicalsecurity/index.html">✅ Automating Deniable Encryption Protection (USB Changes, detecting movements, and SSH bruteforce attempts)</a></li>
|
||||
<li><a href="endgame/index.html">✅ Endgame V3 (.onion service Anti DDOS / Load Balancer / WAF + Captcha) ⭐</a></li>
|
||||
</ol></br>
|
||||
<p>🧅 Serverside - Remote Plausible Deniability (⚠️ <a href="sensitiveremotevshome/index.html">Remote Hosting = Safer!</a>)</p>
|
||||
<ol>
|
||||
<li><a href="index.html">❌ When the Adversary is the cloud provider himself</a></li>
|
||||
<li><a href="index.html">❌ Protecting against cold boot attacks, with RAM encryption (no hardware access!)</a></li>
|
||||
<li><a href="index.html">❌ System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)</a></li>
|
||||
<li><a href="index.html">❌ Custom Linux OS making (debian-based)</a></li>
|
||||
<li><a href="index.html">❌ Obtaining a non-KYC dedicated server, with a custom OS</a></li>
|
||||
<li><a href="index.html">❌ Intrusion detection on remote servers </a></li>
|
||||
</ol></br>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue